article thumbnail

NetSPI Lands $410 Million in Funding – And Other Notable Cybersecurity Deals

eSecurity Planet

NetSPI, a top penetration testing and vulnerability management company, recently announced a $410 million funding round, a huge amount in a year in which $100+ million rounds have become a rarity. Before co-founding Cyolo, Almog Apirion was a CISO for 15 years. “I As for NetSPI, it fits into this sweet spot. Arctic Wolf.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue team members might be led by a chief information security officer (CISO) or director of security operations, making this team the largest among the three. Blue teams consist of security analysts, network engineers and system administrators.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Common IT Security Roles and Responsibilities Explained

Spinone

Some of the typical responsibilities and tasks include: Configuring technical security controls Conducting an app risk assessment Whitelisting/blacklisting apps Performing penetration testing For app security engineers, it’s vital to control SaaS apps and the risks related to them.

article thumbnail

A roadmap for developing a secure enterprise cloud operating model

SC Magazine

Embrace cloud-native security tools and services, and the security needs for the new code and application build/delivery model. Enable the capability to perform static and dynamic code scanning and penetration testing using a self-service approach, especially focusing on the vulnerabilities that can really be exploited at runtime.

article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

The use of “IT Department” elsewhere in this policy refers to the Vulnerability Management Authority, the [IT Security Department], and delegated representatives. Testing must be performed to verify that resources have been installed, configured, integrated, and secured without error or gap in security.

article thumbnail

Businesses Secretly Pentest Partners as Supply Chain Fears Grow

eSecurity Planet

Howard Taylor, CISO of Radware, goes so far as to call it the “death of trust.” People were shocked to discover that a long-trusted product had been compromised, creating vulnerabilities that bypassed thousands of its customers’ carefully built security.”. And they may not even be aware that they have them.

Insurance 116
article thumbnail

SANS Critical Controls 17, 18 and 19: Data Loss Prevention, Incident Response and Management, Secure Network Engineering

NopSec

In this installment of our SANS 20 Critical Security Controls, I bundled three controls together simply because they are very much procedural in nature. Data Loss Prevention control has recently jumped on most organizations CISOs’ radarscreens because of the whistle-blowing revelations on NSA by Mr. Snowden.