This past week Matthew Pascucci, Cybersecurity Practice Manager at CCSI participated in a Cyber Roundtable. Check out this article about the roundtable discussion by Teresa Varela-Lauper.
Dr. James Stanger is CompTIA’s Chief Technology Evangelist. He’s a CompTIA super hero in my book….traveling all over the world, speaking at events, impacting and representing the IT industry and CompTIA near and far.
I’m thankful to work with James on a series of roundtables we recently hosted in the New York area. He’s engaging with or without his beloved Diet Coke and facilitated great conversation among our cyber professionals. Here are his top take-aways from the discussion.
1. File-less security threats. Who needs traditional malware when you can wrap Python code around an image that does the same thing? After all, today’s computing devices – from PCs to IoT devices – have a full stack of tools, libraries, and interpreters that any good hacker can use to spin up any number of unexpected attacks. The implication is this: Yes, we need to educate our end users. But we also need to limit the number of tools we keep lying around, waiting for hackers to turn into improvised hacking devices.
Read the full article and take-aways here: https://www.linkedin.com/pulse/comptia-cyber-roundtable-nyc-teresa-varela-lauper/
The post CompTIA Cyber Roundtable, NYC appeared first on CCSI.
*** This is a Security Bloggers Network syndicated blog from CCSI authored by Guest Author. Read the original post at: https://www.ccsinet.com/blog/comptia-cyber-roundtable/
Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…
Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…
For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…
It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…
1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…
This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…