Don’t panic over CISA’s KEV list, use it smarter In this Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV)...
#Don't #miss #Hot #stuff #News #Video #CISO #cybersecurity […]
[Original post on helpnetsecurity.com]
Read the full interview:
www.technadu.com/when-securit...
How should organizations rethink trust in security appliances after this incident? Share your perspective.
#Cisco #EmailSecurity #IoC #CyberDefense #runZero #SOC #EdgeSecurity #APT
“A successful compromise of a Secure Email Gateway would allow an attacker to take complete control of the vulnerable system.” - Rob King, Director of Applied Research at runZero
Why security appliances are now high-value targets...
#CyberSecurity #Cisco #EmailSecurity #IoC #runZero
Hey, the runZero docs say:
> You do not need to use an interface connected to a SPAN or TAP port; a regular network interface will work.
But does this mean that there's no _value_ in setting up a span, if you can?
#runZero