Ransomware Damage Claims Driving Insurance Hikes - Security Weekly

The costs of cyber insurance policies are rising exponentially while underwriters are tightening the rules around who qualifies for cyber insurance, and at the same time, insurer capacity is constricting dramatically. The numbers are all over the place, but the latest statistics from the Council of Insurance Agents and Brokers reported a 25.5% increase in […]

Security Weekly
Applying Math to Solve Risk-Based Vulnerability Management - The post Applying Math to Solve Risk-Based Vulnerability Management appeared first on Security Weekl... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/_w2yEKOYGMk/ #configurationmanagement #vulnerabilitymanagement #applicationsecurity #threatintelligence #exploitprevention #assetmanagement #patchmanagement #cloudsecurity #compliance #articles #blueteam
Applying Math to Solve Risk-Based Vulnerability Management - Security Weekly

The terms machine learning (ML) and artificial intelligence (AI) are way overused terms in our industry.  Every vendor seems to have the latest and greatest ML/AI solution to solve your security problem.  But when you really dig into the math, there are mathematical models that can actually help us.  So why don’t we focus on […]

Phishing: The Gift that Keeps on Giving - Security Weekly

When we talk about legacy security challenges and solutions, we can’t forget about our old friends email and phishing.  Phishing has been around for over 20 years and is still one of the most effect attack paths to steal credential, exploit endpoints, and deploy malware.  After 20 years, you’d think we could find effective solutions […]

Sysmon Endpoint Monitoring: Do You Really Need an EDR? - Security Weekly

The endpoint market has been hot for years.  At one point, there were over 80 new endpoint vendors trying to displace the traditional anti-virus vendors.  The endpoint security market was transitioning from endpoint protection to endpoint detection and response (EDR).  EDR is all the rage, but do you really need one? While the endpoint market […]

Phishing and Vishing Protection for Remote Workers - The post Phishing and Vishing Protection for Remote Workers appeared first on Security Weekly. http://feedproxy.google.com/~r/securityweekly/XBIC/~3/opN8vuz15uw/ #penetrationtesting #exploitprevention #securityawareness #socialengineering #attacksimulation #emailsecurity #remoteaccess #articles #osint
Phishing and Vishing Protection for Remote Workers - Security Weekly

Phishing is everywhere.  Couple that with a new remote workforce, video conferencing, and corporate messaging, now phishing and vishing are everywhere.  Why?  There are many reasons, including: Increased use of personal computers and phones to conduct our work remotely Increase in phishing emails targeting remote workers Increase in vishing calls to our personal phones targeting […]

Zero Trust Data Security - Security Weekly

In the world of cybersecurity, we talk about a lot of capabilities and tools.  But if we think about what the hackers want, it’s our data.  Why do we focus so much time and effort on the network and endpoint, but not the data? I get it, data security is hard (or at least it […]

Securing, Monitoring, and Remediating Immutable Infrastructure - Security Weekly

We’ve all heard the term Immutable Infrastructure, especially with cloud deployments, but what does it really mean?  What are the security and compliance impacts of Immutable Infrastructure? Let’s start with a quick overview of Immutable Infrastructure.  Simply defined, Immutable Infrastructure means that the state of networks, servers, applications, etc. are not subjected to change in […]

How Penetration Testing Tools Validate Vulnerability Scanner Results - The post How Penetration Testing Tools Validate Vulnerability Scanner Results appeared first on Secu... more: http://feedproxy.google.com/~r/securityweekly/XBIC/~3/ORSGELV37JI/ #vulnerabilitymanagement #penetrationtesting #exploitprevention #patchmanagement #emailsecurity #articles
How Penetration Testing Tools Validate Vulnerability Scanner Results - Security Weekly

(This post provides an overview of vulnerability assessment and penetration testing activities. For a deeper dive into advanced penetration testing techniques and the latest security research tune-in to Paul’s Security Weekly.) Over the decades, many have inaccurately described vulnerability assessments as penetration tests.  What is the difference between a vulnerability assessment and a penetration test?  …

Audio Security - PSW #620 - Security Weekly

Audio Security

Security Weekly
Bugs, Breaches, & More – ASW #75 - Bugs, Breaches, & More
The post Bugs, Breaches, & More – ASW #75 appeared first on Security ... more: http://feedproxy.google.com/~r/securityweekly/XBIC/~3/CKue2jU8t84/ #applicationsecurityweekly #endpointprevention #exploitprevention #vulnerabilities #johnkinsella #mattalderman #protection #mikeshema #exploits #threats #news #epp
Bugs, Breaches, & More - ASW #75 - Security Weekly

Bugs, Breaches, & More

Security Weekly