Part 2: The Intersection of Risk Management and Vulnerability Management
Paulo Shakarian on Nov 16, 2020 7:25:33 PM
Today we continue our discussion on the intersection of risk assessment and vulnerability management.
The Intersection of Risk Management and Vulnerability Management
Paulo Shakarian on Nov 4, 2020 7:46:32 PM
Today’s video concerns the intersection of risk management and vulnerability management. We start by taking a look at NIST 800-30’s guidelines on risk assessment – and its four major components:
Threat-Countering: Refining Risk-Based Cybersecurity
Geoff Stoker on Apr 9, 2019 5:38:00 AM
Artificial Intelligence Gives Clues About Cyberattack Targets
Rebecca Skubish on Nov 9, 2018 11:24:37 AM
Why the new Apache Struts Vulnerability will be Targeted
Paulo Shakarian on Aug 27, 2018 4:04:39 PM
Last week, a new Apache Struts vulnerability was announced (CVE-2018–11776). So the big question becomes when an exploit will become more fully weaponized. The other day, a proof-of-concept exploit
Third Party Risk and Cybersecurity Part III: Threat Intelligence and Third Party Risk
Paulo Shakarian on Aug 27, 2018 3:54:08 PM
This is the third in a three-part series on third party risk management.