August 7, 2017 | Podcasts | Vulnerability Assessment and Management | By Chris Gonsalves, IANS Director of Technology Research
This week I'm joined by Rapid 7 founder and new IANS Faculty Chad Loder to discuss the changing vulnerability scanning and management landscape and the need for more holistic, better integrated security awareness programs. Chad and I also touch on the goings-on at last week's Black Hat and DEF CON events and talk about ways CISOs can improve their stature -- and value prop -- within their organizations.
Seven out of 10 brand impersonations targeting high-profile executives involve spoofing a Microsoft address. File-sharing service Dropbox is a distant second, followed by United Parcel Service (UPS).
This template documents a charter and bylaws for a customer-infosec advisory council designed to facilitate the sharing of company infosec capabilities and roadmaps with customers, and customer experiences and concerns with the company.
Efficiency is key when responding to a suspicious email incident. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver provides a step-by-step process for the network operations center and helpdesk to follow to ensure a quick, comprehensive response.
Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.
By continuing to use our website, you consent to our
cookie usage and revised Privacy Statement.