Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had…
Posts Written ByThreatRavens
Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services
Does the world need another acronym? Probably not. But it seems like one is born every day in the cybersecurity market. As a tradeoff for the brain power to recall…
How much does access to corporate infrastructure cost?
What cybercriminals charge for the data of large companies on the dark web – a review of underground forum offers by category.
Finding a cybersecurity job: How to narrow career options | Cyber Work Podcast
Diana Kelley returns to the show to discuss how to figure out what types of problems you want to solve in cybersecurity. If you know what those are, you can…
Cybersecurity employee development: At work or at home? | Cyber Work Podcast
Diana Kelley discusses ways to integrate constant learning into the employee’s workweek. Don’t make employees do double duty by studying for certifications at night — have that happen during work…
How to Become World Class at Cyber Hygiene
In a recent podcast from England Rugby Union coach Eddie Jones, he made reference to the adage about trying to be “world-class at things that require zero effort.” Relating…
How to Make Business Practices That Support Cybersecurity Response
Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more…
What automated security scanning misses (hint: A lot!) | Infosec Edge Webcast
Many organizations think they’re doing software security testing correctly, but they’re not. In fact, they often miss a fundamental step and jump straight to vulnerability scanning. Scanning is useful, but…
White box vs. black box security testing: Are you choosing the wrong one? | Infosec Edge Webcast
Black box security testing aims to limit the information given to penetration testers in order to simulate a real-world attack environment. That’s usually a mistake, explains Ted Harrington, Infosec Skills…
One Size Does Not Fit All Organizations
Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a…