{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2F9f725ab8-9f725ab8","width":444,"version":"1.0","type":"rich","title":"Blackhat Briefings That Will Add to Your Tool Belt","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/5128d4/5128d4b9-97a3-46af-af2a-d5ffe821f6e2/b53ade0f-c629-42cf-b2a9-de2578d319c8/1500982903artwork.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/b53ade0f-c629-42cf-b2a9-de2578d319c8\" height=\"200\" width=\"100%\" title=\"Blackhat Briefings That Will Add to Your Tool Belt\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"In this podcast episode, we discussed not only sessions you should consider attending, but also questions you should be asking as well as why certain research methods like honeypots, while important, won’t save you from insider threats or other attacks."}