1. Social media, the gateway for malware

    Easy to access, widely used, and outside of enterprise control, social media sites are gold mines for malicious actors. People share a lot of seemingly innocuous information, which is exactly the kind of data that hackers love to collect and use in phishing or spear phishing campaigns. A recent NopSec 2016 State of Vulnerability Risk Management Report found that organizations use inadequate risk evaluation scoring systems. The report claimed that social media -- which often isn't included in any risk evaluation system -- is now a top platform for cybersecurity.

    Read Full Article

    1. We need to be doing a business impact assessment to understand the threat environment and how that is changing. Then we can understand the risk associated with that and the risk appetite related to a particular vulnerability.
  2. Authors