Episodes

  • A Brief History of Cryptography
    Sep 11 2023

    90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.

    Show More Show Less
    11 mins
  • Why the US Government Failed Their Cybersecurity Audit and What to Do About It
    Sep 4 2023

    From NASA to the State Department, federal agencies are relying on outdated systems, ignoring mandatory security patches and failing to protect classified data.  

    CISA has finally released its highly anticipated Cross-Sector Cybersecurity Performance Goals in collaboration with DHS, NIST and numerous industry leaders.

    Show More Show Less
    11 mins
  • Five Things to Look for When Choosing an MSSP
    Aug 28 2023

    According to recent reports, Managed Security Service expenditures are set to double to nearly $50 billion in 2023.
             
    As the tech industry continues to mature and cybersecurity skills shortages climb to record highs, many firms are turning to Managed Security Service Providers (or MSSPs) to help shore up internal security gaps. But this is only half the story; the truth is that there are a number of advantages that MSSPs provide over traditional in-house IT departments.

    Also, with the cost of cybercrime set to top $5 trillion over the next five years, an incredible number of cybersecurity firms have been founded in the last few years. So, how do you sift through these countless listings and pick out the perfect fit? Here are Silent Breach's top tips on how to filter out the static and discover the real talent.

    Show More Show Less
    9 mins
  • Transition to DevSecOps and Harden Your Web App Security in Five Steps
    Aug 21 2023

    A) What is DevSecOps and how can you benefit from it?

    B) Top 5 tips from pentesters on how to harden your Web App security

    Show More Show Less
    11 mins
  • An Introduction to Next-Gen Penetration Testing
    Aug 14 2023

    The penetration test, or as it is fondly nicknamed, the pentest, has been a security staple for decades. But is it time for an upgrade?
          
    As security breaches and budgets continue to bloom, many firms are looking for ways to boost their security preparedness by taking advantage of the latest innovations in AI, DevOps, and security analytics. In this episode, we'll discuss five of the latest updates to the classic penetration test, helping you decide which, if any, are a good fit for your business.

    Show More Show Less
    7 mins
  • 9 Steps to Reducing Your Attack Surface
    Aug 7 2023

    Adoption of technologies such as Internet of Things devices (IoT), cloud applications, complex digital supply chains, open-source code, and more have resulted in the expansion of organization's attack surfaces and exposure to breaches.

    Now more than ever, organizations require increased visibility into how their digital environment looks from an external perspective. Viewing your attack surface the same way as a hacker is the best way to spot and remediate attack vectors and security vulnerabilities before they can be exploited.

    Generally, the larger the surface, the more entry points there are for hackers to gain unauthorized access to your organization. For that reason, it's critical to institute tools and practices to reduce your exposure as much as possible and ensure proper management and continuous monitoring.

    Show More Show Less
    9 mins
  • Summary of US Data Privacy Laws
    Jul 31 2023

    With the rapid evolution of the digital world, data privacy protection has become a global trend for organizations, individuals and governments.

    These entities are now increasingly reconsidering the process of collecting, storing and processing personal information which not only includes names or phone numbers, but also individual healthcare information and financial data.

    Show More Show Less
    7 mins
  • What Is Attack Surface Management?
    Jul 24 2023

    Unfortunately, organizations across nearly every sector are still struggling to secure their public-facing applications.

    In 2022, for example, Silent Breach security consultants found that 92% of web applications tested contained serious or critical security flaws. In particular, we recently reported that 97 of the 100 largest airports are similarly compromised.

    A major contributor to this trend lies in the fact that, for most organizations, the attack surface is only growing. CISOs are finding that they must defend against cyberattacks on multiple fronts: web, mobile, social, physical, wireless, cloud, and insider threats, to name just the most obvious.

    Show More Show Less
    8 mins