Cyber attack disrupts German oil firm operations
Tesla recalls Full Self Driving feature that lets cars roll through stop signs
FBI recommends using burner phones at the Olympics
Thanks to our episode sponsor, Pentera
To understand the exploitable attack surface, security teams need to cover the full scope of potential attacks. Adversaries take the path of least resistance to the critical assets. This means using a variety of techniques to progress an attack, leveraging any vulnerability and its relevant correlations along the way. For this reason, the validation methods used must match - they need to go beyond the static vulnerability scan or control attack simulation to include a full penetration test scope. Find out more at pentera.io
For the stories behind the headlines, head to CISOseries.com