Remove vulnerability-disclosure
article thumbnail

How to build deeper, more robust relationships | Carole Robin (Stanford GSB professor, “Touchy Feely”)

Lenny Rachitsky

In our conversation, we discuss: The benefits of building robust relationships, in life and work The 15% rule, and how it will help you build better relationships The power of vulnerability Examples of how to practice vulnerability Why mental models you build early in life hold you back later The “three realities” and “the net” (..)

article thumbnail

Why your privacy ecosystem is crucial in the age of GDPR

Intercom, Inc.

The increased interdependency between your product, your integrations, your vendors and everyone your company shares sensitive data with makes your whole ecosystem more vulnerable to attack. Your security program is the way you protect you and your customers from external attacks and data breaches. Know your own systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Ethical Hacking and its relevance to cyber security?

Antwak Blog

When the hacker collects sufficient data, they use it to search for vulnerabilities against the asset. Even complicated systems may have technologies that can be vulnerable. They don’t stop at uncovering vulnerabilities. Few major vulnerabilities detected by Ethical hackers are : . Sensitive data disclosure.

article thumbnail

Modus Security: What’s Your Threat Surface?

Modus Create

Everyone knows information security is important: from tuning web application firewalls, to ensuring we have a disaster recovery plan, to deploying vulnerability scanning. STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of privilege). VAST (Visual, Agile, and Simple Threat modeling).

article thumbnail

Security Assessment: Introduction, Process, and More

Modus Create

A security assessment reveals an organization’s existing IT vulnerabilities and suggests recommendations to improve its overall security posture. Threat modeling is the process of understanding your cybersecurity vulnerabilities by identifying system entry points and reducing the likelihood of breaches. What is a Security Assessment?

article thumbnail

Stuck in the Middle With Product Managers

Mind the Product

It’s at this point that you become vulnerable to a complete meltdown. The job did not come with a health warning (full disclosure, I moved from running my own business to being a head of product, making this journey even more jarring). Total Meltdown. No one told you it would be so tough.

article thumbnail

How to Prepare for a Security Engineer Interview

PMLesson's Ace the PM Interview

How would you approach reducing security vulnerability resolution times across software products? Server Hardening: a process to secure components and functions of a server in service of reducing the vulnerability of the server from attacks. Here's a list of questions we've seen most frequently asked at tech companies.