Paulo Shakarian
Recent Posts
Digital Transformation for Vulnerability Management
In today’s video we discuss digital transformation for vulnerability management. We've summarized these concepts in an ebook for download as well as the video below.
In our business, we work with..
The Home Router as Part of the Attack Surface
As a company’s number of remote employees grows, so does its attack surface. Researchers working for CYR3CON recently evaluated vulnerabilities associated with 343 common home routers spanning 24..
Systemic Threats in Cybersecurity
For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..
Part 2: The Intersection of Risk Management and Vulnerability Management
Today we continue our discussion on the intersection of risk assessment and vulnerability management.
The Intersection of Risk Management and Vulnerability Management
Today’s video concerns the intersection of risk management and vulnerability management. We start by taking a look at NIST 800-30’s guidelines on risk assessment – and its four major components:
Determining Scanning Frequency
In this video blog, we give an overview of various strategies enterprises take with regard to the frequency of their vulnerability scans, and some of the considerations taken into account.
{%..Predicting Vulnerabilities Used by State-Sponsored Hackers
3 Takeaways from the FS-ISAC Fall Virtual Summit
5 Questions to ask about Vulnerability Prioritization Solutions
Chaining with Zerologon and the Threat to Election Security