risk scoring

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again
Richi Jennings | | Belgium, BICS, Data Privacy, EEA, eu, EU GDPR, EU Privacy Shield, EU-US Privacy Shield, Europe, Europe Regulation, European Compliance, European Court of Human Rights, European Digital Rights, European Union, European Union (EU), GDPR, GDPR compliance, gdpr eu, GDPR fine, GDPR violations, Privacy, Privacy Shield, Proximus, risk scoring, safe harbor, SB Blogwatch, Schrems, Schrems II, Scoring, social credit scores, TeleSign, Trans-Atlantic Data Privacy Framework
NYOB accuses TeleSign, Proximus and BICS of misusing phone users’ private data. Reputation scoring = privacy violation? ...
Security Boulevard

How To Effectively Use Risk Scoring
Arkose Labs is proud to introduce an enhanced version of its risk score algorithm taking into account newly added detection methods, simplifying the maintenance of the product, and opening up a path ...

Managed Vulnerability Management? Yes, You Read That Right
Onyeka Jones | | asset management, asset scanning, MSSP, risk prioritization, risk scoring, threat detection, Vulnerability Management, vulnerability management process, vulnerability management program, vulnerability management tools, vulnerability scanning
The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can ...
Look At Risk as More of a Compass Than a Watch
We had a great week at RSAC 2019, and a highlight of the week was a well-attended CISO roundtable moderated by the original CISO, Steve Katz. We can’t divulge what was discussed, ...
Dynamic Provisioning: “Workflow Classification Regression Tree”
Gurucul Machine Learning Model: Workflow with Classification Regression Tree How does the Workflow with Classification Regression Tree machine learning model work, what does it do? This powerful model calculates a real-time risk ...