article thumbnail

Operationalizing a “think like the enemy” strategy

CSO Magazine

CISOs, recognizing the value of thinking like the enemy, have overcome this deficit by conducting penetration testing or red teaming exercises, attacking themselves to test their defenses. To read this article in full, please click here

article thumbnail

NetSPI [Un]Wrapped: Our Top Hits from 2023 

NetSpi Executives

How to Use Attack Surface Management for Continuous Pentesting Point in time testing is so 2023. In this article, we explain how the shift to proactive security is rooted in always-on monitoring of known and unknown internet-facing assets. Technical Articles the Industry Loved Technical articles reign supreme.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

Despite their differences, both vulnerability scans and penetration tests are part of the wider vulnerability management framework or process. They are two different tools, each essential in their own way and critical for chief information security officers (CISOs) to keep their infrastructure safe.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

In this article we will learn how to address and effectively respond to major enterprise cybersecurity threats and provide tips to mitigate IT security risk. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.

article thumbnail

How the Great Supply Chain Disruption Affects IT Security

Duo's Security Blog

As one CISO said to me, “With immediate suppliers you can learn how to trust; beyond them you need to learn how to pray.” These CISO-to-CISO conversations may feel awkward, but they are necessary, the authors of a recent McKinsey.com article stressed. Already CISOs often chat offline.

CISO 76
article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

This article details two major findings from the report: five major cybersecurity threats and prioritization problems. It’s always tempting to blame budgets, but most CISOs feel confident about their budgets and have already deployed significant resources.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

This article looks at the top VCs in cybersecurity, a selection of investments, and considerations for entrepreneurs trying to develop an idea or scale a business. YL offers hands-on support for startup leaders in addition to an extensive network of cybersecurity industry leaders and CISOs. Table of Contents. NightDragon.