
Sign up to save your podcasts
Or


Cyber attack disrupts German oil firm operations
Tesla recalls Full Self Driving feature that lets cars roll through stop signs
FBI recommends using burner phones at the Olympics
Thanks to our episode sponsor, Pentera
To understand the exploitable attack surface, security teams need to cover the full scope of potential attacks. Adversaries take the path of least resistance to the critical assets. This means using a variety of techniques to progress an attack, leveraging any vulnerability and its relevant correlations along the way. For this reason, the validation methods used must match - they need to go beyond the static vulnerability scan or control attack simulation to include a full penetration test scope. Find out more at pentera.io
For the stories behind the headlines, head to CISOseries.com
By CISO Series4.7
133133 ratings
Cyber attack disrupts German oil firm operations
Tesla recalls Full Self Driving feature that lets cars roll through stop signs
FBI recommends using burner phones at the Olympics
Thanks to our episode sponsor, Pentera
To understand the exploitable attack surface, security teams need to cover the full scope of potential attacks. Adversaries take the path of least resistance to the critical assets. This means using a variety of techniques to progress an attack, leveraging any vulnerability and its relevant correlations along the way. For this reason, the validation methods used must match - they need to go beyond the static vulnerability scan or control attack simulation to include a full penetration test scope. Find out more at pentera.io
For the stories behind the headlines, head to CISOseries.com

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

418 Listeners

8,077 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

9 Listeners