Podcast
Questions and Answers
What is the first step to stopping a threat?
What is the first step to stopping a threat?
Why do you need to collect research information from many different resources?
Why do you need to collect research information from many different resources?
Where should you start when researching threats associated with an operating system or application?
Where should you start when researching threats associated with an operating system or application?
What is the National Vulnerability Database?
What is the National Vulnerability Database?
Signup and view all the answers
What is the purpose of a vendor's notification process?
What is the purpose of a vendor's notification process?
Signup and view all the answers
What does CVE stand for?
What does CVE stand for?
Signup and view all the answers
What can be a valuable tool for gathering information on Twitter?
What can be a valuable tool for gathering information on Twitter?
Signup and view all the answers
Why is it important to have an automated threat feed?
Why is it important to have an automated threat feed?
Signup and view all the answers
What is a TTP in the context of security threats?
What is a TTP in the context of security threats?
Signup and view all the answers
Why is it important to know where an attacker likes to focus their efforts?
Why is it important to know where an attacker likes to focus their efforts?
Signup and view all the answers
What can be used to monitor how malware is operating on a network?
What can be used to monitor how malware is operating on a network?
Signup and view all the answers
What is the benefit of understanding an attacker's TTP?
What is the benefit of understanding an attacker's TTP?
Signup and view all the answers
What is a common practice to supplement a vulnerability database?
What is a common practice to supplement a vulnerability database?
Signup and view all the answers
What can be learned from conferences?
What can be learned from conferences?
Signup and view all the answers
What type of information can be found in academic journals?
What type of information can be found in academic journals?
Signup and view all the answers
What are RFCs used for?
What are RFCs used for?
Signup and view all the answers
What can be learned from reading RFCs?
What can be learned from reading RFCs?
Signup and view all the answers
What is the purpose of a user group meeting?
What is the purpose of a user group meeting?
Signup and view all the answers
What type of information can be found on social media?
What type of information can be found on social media?
Signup and view all the answers
What is the benefit of attending conferences?
What is the benefit of attending conferences?
Signup and view all the answers
What is the purpose of a central vulnerability management system?
What is the purpose of a central vulnerability management system?
Signup and view all the answers
Why are academic journals useful?
Why are academic journals useful?
Signup and view all the answers
What is the primary reason why an IT professional needs to continuously research threats?
What is the primary reason why an IT professional needs to continuously research threats?
Signup and view all the answers
Where can you find comprehensive information about vulnerabilities in an operating system or application?
Where can you find comprehensive information about vulnerabilities in an operating system or application?
Signup and view all the answers
What is the primary purpose of a vendor's notification process?
What is the primary purpose of a vendor's notification process?
Signup and view all the answers
Why is it important to collect research information from multiple sources?
Why is it important to collect research information from multiple sources?
Signup and view all the answers
What is the National Vulnerability Database used for?
What is the National Vulnerability Database used for?
Signup and view all the answers
What is the benefit of understanding how an attacker gets into one network?
What is the benefit of understanding how an attacker gets into one network?
Signup and view all the answers
What is the primary benefit of using Twitter for threat intelligence?
What is the primary benefit of using Twitter for threat intelligence?
Signup and view all the answers
What type of information is often provided by automated threat feeds?
What type of information is often provided by automated threat feeds?
Signup and view all the answers
Why is it important to understand an attacker's TTP?
Why is it important to understand an attacker's TTP?
Signup and view all the answers
What is a common challenge with understanding attacker TTPs?
What is a common challenge with understanding attacker TTPs?
Signup and view all the answers
Why is it useful to know where an attacker likes to focus their efforts?
Why is it useful to know where an attacker likes to focus their efforts?
Signup and view all the answers
What type of resources can provide automated threat feeds?
What type of resources can provide automated threat feeds?
Signup and view all the answers
What is the primary purpose of a central vulnerability management system?
What is the primary purpose of a central vulnerability management system?
Signup and view all the answers
What can be learned from researchers presenting at conferences?
What can be learned from researchers presenting at conferences?
Signup and view all the answers
Why are academic journals useful for security professionals?
Why are academic journals useful for security professionals?
Signup and view all the answers
What is a common source of information for security professionals?
What is a common source of information for security professionals?
Signup and view all the answers
What can be found in RFCs?
What can be found in RFCs?
Signup and view all the answers
What is the benefit of attending user group meetings?
What is the benefit of attending user group meetings?
Signup and view all the answers
What type of information can be found in user groups that are not specific to IT security?
What type of information can be found in user groups that are not specific to IT security?
Signup and view all the answers
What can be learned from reading about a deep dive into a type of malware?
What can be learned from reading about a deep dive into a type of malware?
Signup and view all the answers
Why is it important to supplement a vulnerability database?
Why is it important to supplement a vulnerability database?
Signup and view all the answers
What is the purpose of conferences for security professionals?
What is the purpose of conferences for security professionals?
Signup and view all the answers