Aggregator
克格勃传奇情报术,从“燕子”陷阱到木雕窃听的谍海绝技
CVE-2025-59466
CVE-2022-50463 | Linux Kernel up to 6.1.1 mpc52xx_lpbfifo_probe memory leak (WID-SEC-2025-2187)
CVE-2022-50462 | Linux Kernel up to 6.1.1 MIPS put_device memory leak (WID-SEC-2025-2187)
CVE-2022-50461 | Linux Kernel up to 6.0.15/6.1.1 net am65_cpsw_nuss_ndo_slave_open privilege escalation (WID-SEC-2025-2187)
CVE-2022-50464 | Linux Kernel up to 6.0.15/6.1.1 mt7915_pci_init_hif2 return value (Nessus ID 269621 / WID-SEC-2025-2187)
CVE-2022-50467 | Linux Kernel up to 5.19.16/6.0.2 lpfc_cmpl_ct_cmd_gft_id null pointer dereference (WID-SEC-2025-2187)
CVE-2022-50468 | Linux Kernel up to 5.10.162/5.15.85/6.0.15/6.1.1 cros_usbpd_notify_init return value (WID-SEC-2025-2187)
CVE-2022-50457 | Linux Kernel up to 6.0.15/6.1.1 del_mtd_device memory leak (WID-SEC-2025-2187)
CVE-2022-50458 | Linux Kernel up to 6.0.2 clk of_find_matching_node reference count (Nessus ID 269620 / WID-SEC-2025-2187)
CVE-2022-50459 | Linux Kernel up to 5.10.149/5.15.74/5.19.16/6.0.2 iscsi_tcp getpeername null pointer dereference (Nessus ID 276910 / WID-SEC-2025-2187)
CVE-2022-50460 | Linux Kernel up to 5.10.151/5.15.75/6.0.5 cifs_flock memory leak (WID-SEC-2025-2187)
CVE-2022-50465 | Linux Kernel up to 5.10.162/5.15.86/6.0.17/6.1.3 ext4 uninitialized pointer (Nessus ID 269613 / WID-SEC-2025-2187)
OpenAI says its new ChatGPT ads won't influence answers
9 Cybersecurity Questions that Define a CISO
The Cybersecurity Vault — episode 52, with guest Wil Klusovsky.
Wil discusses the essential questions that CEOs should be asking their CISOs. He explores the importance of effective communication between technical and business perspectives, the need for investment in cybersecurity with clear ROI, and the significance of understanding risks and setting priorities.
The conversation also delves into the importance of business resilience, managing third-party risks, and preparing for future threats in the ever-evolving cybersecurity landscape. The episode emphasizes the need for CISOs to articulate their strategies in business terms to align with corporate goals and secure necessary resources.
Subscribe for more episodes of Cybersecurity Vault!
Chapters:00:00 Introduction to Cybersecurity Questions
02:06 Importance of CEO-CISO Communication
05:03 Investment and ROI in Cybersecurity
08:17 Establishing Cybersecurity Priorities
11:12 Identifying the Biggest Risks
14:24 Understanding the Risk Register
15:41 Crafting a Compelling Risk Narrative
18:21 Blind Spots in Cybersecurity Awareness
21:27 Understanding Accepted vs. Unknown Risks
24:29 The Importance of Documentation in Risk Management
25:22 Business Resilience and Recovery Planning
27:52 Engaging Third-Party Vendors in Cybersecurity
31:09 Cybersecurity as a Business Advantage
34:44 Future Threats and Technological Advancements
38:42 Translating Cybersecurity into Business Language
40:51 The Impact of CISO Responses on Business Outcomes
Wil’s LinkedIn Profile: https://www.linkedin.com/in/wilklu/
9 CISO Questions LinkedIn Post: https://www.linkedin.com/feed/update/urn:li:activity:7394720767416107008
Keyboard Samurai Podcast: https://www.youtube.com/@KeybdSamurai
Website: https://www.wilklu.me/podcast
Follow Matthew on
· LinkedIn: https://www.linkedin.com/in/matthewrosenquist/
· SubStack: https://substack.com/@matthewrosenquist
Visit Cybersecurity Insights at https://www.cybersecurityinsights.us
Subscribe to the Cybersecurity Insights channel: https://www.youtube.com/CybersecurityInsights
The post 9 Cybersecurity Questions that Define a CISO appeared first on Security Boulevard.