runZero Hour, Ep. 15: Network topology, detailed fingerprinting and MODBUS love

On this episode of runZero Hour, Rob King and Tom Sellers welcome Brianna Cluck, researcher extraordinaire from GreyNoise Intelligence, covering a range of topics including:

  • Network topology: We go under the hood on network topology mapping and see how to spot exposures and segmentation issues. Plus, we learn about Brianna’s new research on tags with suspicious intention!
  • Fingerprinting network devices in detail: We deconstruct our updated Palo Alto probes and show you how to uncover more attributes on your network devices using creative new techniques.
  • MODBUS love: It’s the ICS protocol so popular it’s got a ton of proprietary, vendor-based extensions! Brianna shares recent research and tips for staying on top of the variations to keep your OT secure.
  • runZero updates: We've got new queries and categorizations for you, plus the ability to age out attributes to improve fingerprinting accuracy and reprocess tasks to fine tune asset data without losing history.

Meet Our Speakers

Tom Sellers

Principal Research Engineer

Rob King

Director of Applied Research

Brianna Cluck

Special Guest, GreyNoise Researcher

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
How North Carolina secures K–12 schools with runZero
In this webcast we unpack how runZero supports a statewide exposure management program to protect 343 Public School Units across North Carolina.
Webcasts
runZero Hour, Ep. 23: Beyond the veil with end-of-life OSes
In this episode of runZero Hour Rob King, Tod Beardsley, and captn3m0 (creator of endoflife.date) summon insights from runZero’s latest research...
Webcasts
runZero Hour, Ep. 22: Poking the bear (safely) - our expanded vuln checks
We just added hundreds of new critical remote vulnerability checks to runZero that run safely across all your environments and are way faster than...
Webcasts
See + secure everything in your OT environment
Operational technology (OT) has always been tricky to secure because of legacy systems, tricky protocols, and fragile environments where downtime...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.