article thumbnail

Defending Assets You Don’t Know About Against Cyberattacks

Threatpost

No security defense is perfect, and shadow IT means no company can inventory every single asset that it has. David “moose” Wolpoff, CTO at Randori, discusses strategies for core asset protection given this reality.

article thumbnail

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

Thales Cloud Protection & Licensing

Security professionals can help counter the threat of ATO fraud by instituting a strong password policy that requires all employees to create a strong, unique password for their accounts. Infosec personnel should also help employees store those passwords safely such as via the use of a password manager. Employ Device Encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Software Summit 2022

Security Boulevard

She is an award-winning innovator with decades of experience pursuing advanced security defenses and next generation security solutions She also tells venture capitalists where to invest billions, helps non-profits pro bono, and ran DevSecOps at Intuit. If you don’t know Shannon, well, you are alone. Shannon Lietz.

article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. A solid reputation and track record are also a necessity, and the vendors we’ve reviewed here are all capable of meeting these criteria.

Software 116
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. The DXC BAS offerings are a part of their Cyber Defense product line, which crafts tailored security solutions for the digital enterprise and prioritizes the evolving threat landscape. Picus Security. DXC Technology.

article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. The idea, as in any security defense is to sufficiently frustrate an attacker so he or she will go elsewhere. It’s either open or it is still locked. This is something concrete that you can literally hold in your hand.

Hacking 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. The idea, as in any security defense is to sufficiently frustrate an attacker so he or she will go elsewhere. It’s either open or it is still locked. This is something concrete that you can literally hold in your hand.

Hacking 52