Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Trust No One, Especially Not Us... Because We Know That Nothing Is Truly Securehttps://t.me/+FLTX46eKB2I3ZWZihttps://boosty.to/snarky_security... more
FAQs about Snarky Security:How many episodes does Snarky Security have?The podcast currently has 59 episodes available.
August 18, 2024Big Fish, Bigger Targets: Cyber Defense for the OverachieversFor organizations so important, even their coffee machines need firewalls....more1minPlay
August 18, 2024CFR's Call to Action Assessing Astra Linux Security and Russia's Digital SovereigntyThe Council on Foreign Relations urges a thorough evaluation of Astra Linux's security as part of a broader study on Russia's push for digital sovereignty. This involves understanding potential vulnerabilities and the geopolitical impact of Russia's technological independence....more5minPlay
August 17, 2024[Trailer] Operation Stargazer. CFR's Astra Linux Vulnerability & Flaws DaydreamsA concise summary of the overarching themes and findings related to Russia's digital sovereignty, the development of Astra Linux, and the implications for global cybersecurity dynamics....more1minPlay
August 17, 2024From Theory to Practice: Turning Paranoia into PolicyBecause nothing says 'we're secure' like a 500-page document no one will read....more2minPlay
August 16, 2024How to Pretend You're in Control: A GuideMastering the art of looking like you know what you're doing when cyber chaos reigns supreme...more4minPlay
August 15, 2024The Ten Commandments of Not Getting PwnedHoly scriptures for the digitally righteous, because 'thou shalt not click on suspicious links' is the new golden rule....more5minPlay
August 14, 2024Whack-a-Mole: The Never-Ending Game of Cyber DefenseStrap in for a wild ride through the digital badlands, where every click could be your last....more2minPlay
August 13, 2024The TL;DR of Digital ParanoiaA bite-sized serving of cyber anxiety, perfect for executives who can't be bothered to read the whole thing....more2minPlay
August 12, 2024The Grand CTEMLet's dive into the thrilling world of Continuous Threat Exposure Management (CTEM), shall we? CTEM, in its infinite wisdom, is not just a fancy tool or a magical technology wand you can wave to make all the bad cyber gremlins go away. No, it's a convoluted five-step program that includes scoping, discovery, prioritization, validation, and mobilization. Because why make things simple when you can turn them into a bureaucratic nightmare?Now, let's talk about the tools and technologies that make CTEM tick. We've got CAASM (Cyber Asset Attack Surface Management), EASM (External Attack Surface Management), EM (Exposure Management), and RSAS (Red Team Automation Systems). These acronyms sound like something out of a dystopian sci-fi novel, don't they? They're crucial for peeking into every nook and cranny of your organization's digital environment, including that forgotten server from 2003 that everyone's too scared to touch.Moving on to the methodology, which is as straightforward as assembling IKEA furniture without the manual. First, we have scoping, where you pretend to know what you're doing by defining the initial exposure scope. Then there's discovery, where you play digital detective and hunt for vulnerabilities. Prioritization is next, where you decide which digital fires to put out first. Validation is like checking your work to make sure you didn't just make everything worse. And finally, mobilization, where you rally the troops and hope for the best.As for best practices, let's start with stakeholder engagement. Because nothing gets the blood pumping like a good old meeting with legal, compliance, and IT to discuss cybersecurity. Don't forget to regularly update your systems, because hackers totally adhere to a schedule and will wait patiently for you to patch things up. An incident response plan is also key, because when things inevitably go south, you'll need a plan to pretend like you had everything under control all along. Lastly, continuous improvement is crucial. After all, the only constant in cybersecurity is that you're always one step behind the latest threat.So there you have it, folks. CTEM in all its glory. A strategy so complex, it makes rocket science look like child's play. But hey, at least we're all having fun, right? Right?Full content (all-in-one episodes)...more30minPlay
August 11, 2024CTEM Alternatives: Because There's Always a Plan BExplore the alternatives to CTEM, because sometimes the best solution is to avoid the madness altogether...more3minPlay
FAQs about Snarky Security:How many episodes does Snarky Security have?The podcast currently has 59 episodes available.