1. EachPod

February 2, 2022

Author
CISO Series
Published
Wed 02 Feb 2022
Episode Link
https://sites.libsyn.com/289580/february-2-2022

Cyber attack disrupts German oil firm operations

Tesla recalls Full Self Driving feature that lets cars roll through stop signs

FBI recommends using burner phones at the Olympics

Thanks to our episode sponsor, Pentera

To understand the exploitable attack surface, security teams need to cover the full scope of potential attacks. Adversaries take the path of least resistance to the critical assets. This means using a variety of techniques to progress an attack, leveraging any vulnerability and its relevant correlations along the way. For this reason, the validation methods used must match - they need to go beyond the static vulnerability scan or control attack simulation to include a full penetration test scope. Find out more at pentera.io

For the stories behind the headlines, head to CISOseries.com

Share to: