Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.
This segment is sponsored by Vicarius.
Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes!
Prioritizing Vulnerabilities: A Holistic Approach: https://www.vicarius.io/blog/prioritizing-vulnerabilities
Doug White – Professor |
Jeff Man – Sr. InfoSec Consultant |
Lee Neely – Senior Cyber Analyst |
Paul Asadoorian – Founder & CTO |
Tyler Robinson – Managing Director of Network Operations |
Roi Cohen – Co-Founder & VP Sales |
Shani Dodge – C++ Developer |
Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!
Polarity uses computer vision that works like augmented reality for your data. It’s not a new dashboard to search or a new portal to manage. Polarity augments your existing workflows, enriching your view as you do your work so you can see the story in your data without sacrificing thoroughness or speed. We’ll be talking about how analysts are using Polarity to balance thoroughness and speed.
This segment is sponsored by Polarity.
Visit https://securityweekly.com/polarity to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes!
Try the Free Community Edition of Polarity at https://polarity.io/sw
Doug White – Professor |
Jeff Man – Sr. InfoSec Consultant |
Joff Thyer – Security Analyst |
Lee Neely – Senior Cyber Analyst |
Paul Asadoorian – Founder & CTO |
Tyler Robinson – Managing Director of Network Operations |
Paul Battista – CEO & Founder |
Join Amit Bareket, Co-founder & CEO of Perimeter 81 & Paul Asadoorian for a technical deep-dive into the problems inherent in legacy VPN technology. Together they will explore solutions for the modern workforce & how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity. Register Now by visiting https://securityweekly.com/perimeter81
In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your Coffee, irriation systems and door openers are vulnerable to attacks, if you have Oracle WebLogic exposed to the Internet you are likely already pwned, who needs Internet Explorer any longer? and why isn’t MFA more popular?! Visit https://www.securityweekly.com/psw for all the latest episodes!
Doug White – Professor |
Jeff Man – Sr. InfoSec Consultant |
Joff Thyer – Security Analyst |
Lee Neely – Senior Cyber Analyst |
Paul Asadoorian – Founder & CTO |
Tyler Robinson – Managing Director of Network Operations |
Paul Battista – CEO & Founder |
Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe
In our webcast on November 5th, we’ll show you how to build proper metrics and KPIs! Learn why you should stop trying to discover and classify data in our webcast on November 12th! Learn how to thwart attackers using deception in our November 19th technical training! Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!