
Effective Operational Outcomes - Ken Dunham - PSW #847
Paul's Security Weekly (Audio)
00:00
Navigating Cybersecurity Challenges
This chapter explores the tactics employed by threat actors, focusing on weak credentials and misconfigurations rather than just known vulnerabilities. It highlights the struggles organizations face with implementing zero trust models and the complications arising from outdated systems and a culture prioritizing cost-saving over security. The discussion also touches on cultural differences in problem-solving and the critical need for effective patch management amid rapid digital transformation.
Transcript
Play full episode