• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
the it pro podcast: surveying today's threat landscape

The IT Pro Podcast: Surveying today’s threat landscape

You are here: Home / General Cyber Security News / The IT Pro Podcast: Surveying today’s threat landscape
December 16, 2022

In a sector of modifying priorities, cyber security stays at the best of the listing in any boardroom. With the menace landscape presenting worries previous and new, and the expanding risk of entities this sort of as condition-sponsored hacking, it is vital that companies carefully craft their cyber security technique to maintain ahead of the subsequent significant attack.

The speed that threats evolve now calls for authentic-time action from providers, who ought to sustain oversight of their attack area and retain as lots of property as possible in opposition to vulnerabilities this kind of as Log4Shell.

This 7 days, we spoke to Bernard Montel, technological director EMEA at exposure administration organization Tenable, to focus on how companies can deal with their threat area spot, and the largest dangers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Highlights

“You will be amazed that a calendar year just after, we have accomplished a review at Tenable, a ton of firms are even now vulnerable to Log4Shell. It’s not that they have been lazy. We have observed at the time a single component, which is extremely significant is identified as reinfection, they’ve set the vulnerabilities partly or wholly, but they put in new software program, and new technology, and now quickly, these new systems regretably, had been making use of a incredibly previous library of of Log4j.”

“I mean, this is the only way they have to power organisations to boost the stage of security. If you go back again, for instance, to GDPR which came out from the EU. I indicate, by implementing GDPR in all places, mechanically the degree of security has increased. That doesn’t suggest that we have lowered the range of attacks, the amount of attacks as well has enhanced, but if we all with each other consider to add the stage or the larger level of security, then mechanically, you know, we are greater well prepared.”

“An organisation alone has more than 500,000 assets. How can you take care of that? So, I would not blame them to not deal with Log4Shell, that they failed to deal with it in January or February. You know, we knew when Log4Shell came out how deep it was embedded into some of the technologies.”

Browse the full transcript here

Footnotes

  • The new wave of cyber security threats going through critical national infrastructure (CNI)
  • Tenable Analysis Finds 72% of Corporations Remain Susceptible to “Nightmare” Log4j Vulnerability
  • Firms urged to continue being vigilant as Log4Shell issues persist 1 12 months on
  • Microsoft states “it’s just far too difficult” to successfully disrupt ransomware
  • ‘Systemic ID complications for 10 million Australians’ right after Optus breach, warns minister
  • Australia to boost utmost knowledge breach penalty to $50 million
  • MoD launches callout for tech to plug cyber security holes
  • What is an SOC audit?
  • What is GDPR? Every thing you need to know, from necessities to fines
  • Mastering endpoint security implementation
  • What is massive information analytics?
  • What great AI cyber security computer software looks like in 2022
  • How to use device finding out and AI in cyber security

Subscribe

  • Subscribe to The IT Pro Podcast on Apple Podcasts
  • Subscribe to The IT Pro Podcast on Google Podcasts
  • Subscribe to The IT Pro Podcast on Spotify
  • Subscribe to the IT Pro publication
  • Subscribe to IT Pro 20/20

Some pieces of this posting are sourced from:
www.itpro.co.uk

Previous Post: «trojanized windows 10 installer used in cyberattacks against ukrainian government Trojanized Windows 10 Installer Used in Cyberattacks Against Ukrainian Government Entities
Next Post: Podcast transcript: Surveying today’s threat landscape podcast transcript: surveying today's threat landscape»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
  • Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
  • [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
  • Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
  • CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
  • Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
  • State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
  • Artificial Intelligence – What’s all the fuss?
  • Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords
  • Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

Copyright © TheCyberSecurity.News, All Rights Reserved.