Apr 25, 2019
This is a special episode of Defense in Depth being shared on this feed. Find the full post with links and images on the CISO Series site here (https://cisoseries.com/defense-in-depth-vulnerability-management/)
So many breaches happen through ports of known vulnerabilities. What is the organizational vulnerability in...
Apr 17, 2019
If you can't see all the show notes (with images and links) head here: https://cisoseries.com/defense-in-depth-privileged-access-management-pam/
Where does privileged access management (PAM) fit in the order of operations?
Apr 10, 2019
Full post for this episode (https://cisoseries.com/defense-in-depth-machine-learning-failures/)
Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation?
Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me,
Apr 4, 2019
The full post (if you're not seeing links and images) can be found here (https://cisoseries.com/defense-in-depth-software-fixing-hardware-problems/)
As we have seen with the Boeing 737 MAX crashes, when software tries to fix hardware flaws, it can turn deadly. What are the security implications?
Thanks to this week’s...