runZero Hour, Ep. 10: RDP security, ATG & PC-WORX OT protocols

Episode 10 of runZero Hour is officially on the books!

In this session, special guest Tyler Diderich, Manager of Customer Success Engineering at runZero joined us to unlock the secrets of how our exceptionally creative customers help drive innovation in our platform. 

We dug into the details of three different protocols, starting with the inner workings of the Automatic Tank Gauge (ATG) and PC-WORX OT protocols and their associated security models. Next, if you cross paths often with RDP (who doesn’t?!), we'll share how this workhorse protocol has evolved with Windows over time and why secure defaults are critical for better security practices. Check out our blog, RDP security: The impact of secure defaults and legacy protocols, to learn how to use runZero to audit RDP configurations in your own environment and discover legacy versions that may cause unknown, risky exposures. 

We round things out with a chat on the following vulnerabilities in our Rapid Response round-up:

Enjoy! 

Meet Our Speakers

Rob King

Director of Security Research

Tom Sellers

Principal Research Engineer

Blain Smith

Security Research Engineer

Tyler Diderich

Customer Success Engineering

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 19: Mission: Contextualize – LLMs, MCP, and the Future of Vulnerability Intelligence
Jerry Gamblin joins us for a deep dive into today’s vulnerability landscape — from CVE trends and statistics to the launch of his new MCP (Model...
Webcasts
Unknown Assets: A Lurking Threat to Network Security
In this EcoCast, presented by Tod Beardsley VP of Security Research, discusses proactive strategies for defending against zero-day exploits and...
Webcasts
Vulnerability management is broken: what's the fix?
HD Moore and Omdia analyst Rik Turner discuss why traditional vulnerability management is struggling in modern IT infrastructures, why CVEs don’t...
Webcasts
From Exposed to Empowered: Fixing Fatal Flaws in Vulnerability Management
In this on-demand session, HD Moore joins Secon Cyber to expose the limitations of legacy vulnerability management and show why many of today’s...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.