article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. Kapczynski Erin: Could you share your thoughts on the role of artificial intelligence, machine learning and the growth of IoT devices in both cyber defense and cyberattacks?

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. Penetration Testing. Here are 11 of the top movers in the BAS market. Red Teaming.

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

And we wound our way to “Year 2000” ( Y2K ), which now seems sort of silly, but in retrospect, at the time it was a big deal. Yet, although I didn't need another one, I looked at it just as we were getting ready to do a big penetration test of the US House of Representatives’ network. That was a great experience.