Adrian is an outspoken researcher that doesn’t shy away from uncomfortable truths. He loves to write about the security industry, tell stories, and still sees the glass as half full.
Equifax’s breach was the perfect opportunity to prepare for future vulnerabilities like Log4Shell. Not enough organizations seized the opportunity to learn from it.
Vulnerability scanners aren't quite as essential and central as they once were, but they're still necessary. This round of reviews will focus entirely on commercial and open-source network vulnerability scanners.
This review group will cover commercial and open-source network vulnerability scanners. In a few months, we’ll revisit vulnerability management to cover products that focus on analysis and remediation of vulnerability scanning results .
The ability to create remediation plans, goals, and SLAs is a welcome function to help keep teams focused on the most critical tasks. Ultimately, InsightVM is a product that benefits greatly from integration with the rest of the Rapid7 portfolio.
Free and open-source software (FOSS) may have a place in your security program, depending on your requirements, environment and the skill that exists in your team.
Though the term Attack Surface Monitoring (ASM) doesn’t specifically refer to external threats, that’s what this market currently focuses on. In short, products in this category aim to catalogue and help manage an organization’s exposed assets.
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk and vendor due diligence! This webcast with Bill Brenner and Enterprise Security Weekly host Adrian Sanabria will walk through:
Improving the vendor...
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their organization’s defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will de...
In this webcast, we unravel the insights and implications behind the latest global AI security guidelines, distilling complex recommendations into four key takeaways that every cybersecurity professional should know. As nations grapple with the rapid adoption of artificial intelligence, regulatory bodies worldwide have collaboratively devised comp...
Most conversations around Identity Resilience focus on the prevention of attacks. But as statistics increasingly show that a major breach is a matter of “when”, not “if”, CISOs are realizing that their Identity Resilience strategy is missing a critical piece: response. In this conversation, we’ll explore Identity Resilience from the lens of B...
As organizations navigate the dynamic landscape of governance, risk, and compliance (GRC), join our webcast to explore the critical priorities that will shape the second half of 2024. In an environment marked by evolving regulations, heightened cyber threats, and a rapidly changing business landscape, staying ahead of GRC challenges is paramount. ...
Siloed identity tools and legacy complexity are the enemies of a modern identity program. There is a growing interest in tool convergence – specifically IGA and PAM convergence. The promise of simplicity, efficiency, improved security, and enhanced governance is appealing and can help protect identities from deepfakes and other AI-based threats. B...
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer and Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will delve into the pivotal ro...
After eight years of submission review, testing, and evaluation, NIST has formally announced the PQC standard specifications, setting in motion the largest cryptographic transition in the history of computing – replacing legacy encryption with PQCs. The multiyear crypto migration is certain to usher in new challenges, uncertainties, and risks. Thi...
Is Your Browser the Weakest Link in Your Security Chain? Zero Trust has been the gold standard in cybersecurity for over a decade, but most organizations are still struggling to implement it where it matters most: the browser. As more applications move to the web, hackers are exploiting this gap with increasingly sophisticated tactics, leaving tra...
Like many large organizations, IBM found itself trying to manage a fragmented and inefficient Identity and Access Management (IAM) landscape, riddled with legacy systems that hindered scalability, compliance, and operational efficiency. The company managed to turn things around with help from Saviynt.This webcast will explore how IBM successfully ...
As cyber threats continue to evolve, maintaining robust network security is paramount for protecting organizational assets and data. Join us for an insightful hot topics webcast where industry experts will present a comprehensive forecast of network security trends and offer strategic guidance for late 2024 and early 2025. This session will delve ...
As today’s threats and how we work continue to rapidly evolve, traditional security tools like Multi-Factor Authentication (MFA) and Single Sign-On (SSO) are no longer enough for you to provide truly secure workforce access to applications and information. While foundational, we’ve seen these controls easily bypassed through methods li...