article thumbnail

BSides Sofia 2023 – Cristian Cornea – Bypassing AntiVirus Using badUSB

Security Boulevard

Permalink The post BSides Sofia 2023 – Cristian Cornea – Bypassing AntiVirus Using badUSB appeared first on Security Boulevard. Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel.

article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds. Tim drives the creation, architecture, strategy, and external visibility for products and solutions. Tim has held many roles in the cybersecurity space, including Fellow, Chief Architect, Distinguished Engineer and Board Advisor.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Combatting ransomware: a holistic approach

IT Security Guru

Even when an organisation is choosing the built-in MS defender included with Windows 10 to ensure endpoint protection, different strategies should still be evaluated, such as scanning and update scheduling, and how to monitor the AntiVirus status. Contributed by Nicolas Casimir, CISO, Zscaler EMEA.

article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

Pity the poor CISO at any enterprise you care to name. As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. CISOs need only to follow the principles honed over the past 200 years by the property and casualty insurance industry.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. While these solutions (such as [Microsoft365]) offer a level of protection and capabilities (antivirus, anti-spam, archiving, etc.),

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

It also feeds into the larger argument for adopting a zero-trust architecture , a methodology that essentially assumes that no user or devices trying to connect to the network can be trusted until they’re authenticated and verified. There also is the zero-trust architecture, according to the ThreatLabz report.

IoT 143
article thumbnail

Using Proactive Intelligence Against Adversary Infrastructure

Security Boulevard

But in the wake of the attack, manychief information security officers (CISOs) realized that PDNS was the answer to early detection and resiliency against similar attacks simply because log4j was surprisingly easy to detect at a DNS level. Consider: The log4j attack was difficult to detect and stop based on traditional log-file analysis.

DNS 69