top of page

Stanislaw Banaszak
28 gru 20222 minut(y) czytania
Purple integration with CyberArk PAM
Orchestra’s Purple integration with CyberArk Privileged Access Manager, simplifies and secures credential management. IT and security...
30 wyświetleń
0 komentarzy


Stanislaw Banaszak
21 gru 20223 minut(y) czytania
The Digital Cyber Twin – The Difference Maker in Knowing Your Cyber Exposure
One of the fundamental challenges facing any organization is how to gain a solid handle on its cyber exposures. Cyber exposure refers...
6 wyświetleń
0 komentarzy


Stanislaw Banaszak
1 lis 20222 minut(y) czytania
Recently Uncovered Linux Security Issues Create Another Wi-Fi Attack Vector
Linux has had long standing issues with memory leaks. These exposures often give attackers the means to crash devices, create denial of...
7 wyświetleń
0 komentarzy


Stanislaw Banaszak
29 sie 20225 minut(y) czytania
So what Exactly is Machine Reasoning, and How do you Teach an AI Model to Behave like an Attacker?
If you create a semantic graph for cyber threats, it will be able to discover which attack vectors your organization is exposed to. So...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
10 maj 20222 minut(y) czytania
Do You have an Evil Twin?
Top Five Wireless and IoT Threats Unlike wired networks, wireless networks can be accessed by anyone. Even restricted wireless...
3 wyświetlenia
2 komentarze


Stanislaw Banaszak
26 kwi 20224 minut(y) czytania
Threat Susceptibility: Achieving Cyber Resiliency Goals
Cyber resiliency goals (i.e., anticipate, withstand, recover, and adapt) support the linkage between the risk management decisions at the...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
18 kwi 20224 minut(y) czytania
Threat Susceptibility: From Risk Management To Active Defense
In our previous blog post in this series, Threat Susceptibility: Countermeasures and Risk Remediation Options, we continued our MITRE...
2 wyświetlenia
0 komentarzy


Stanislaw Banaszak
10 kwi 20224 minut(y) czytania
Threat Susceptibility: Countermeasures and Risk Remediation Options
In the blog post, ‘The Art of Attack vs The Science of Resilience’ Omri wrote “Cyber risk analysis and management is completely dependent...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
4 kwi 20223 minut(y) czytania
Threat Susceptibility Assessments: Challenges & Opportunities
What are some of the challenges in assessing cyber threat susceptibility? Penetration Testing is probably the most well-known and most...
0 wyświetleń
0 komentarzy


Stanislaw Banaszak
28 mar 20223 minut(y) czytania
Assessing Risk using Threat Susceptibility
What are the targets of cyber threats? In the NIST cybersecurity framework core function of ‘Identify,’ organizations are tasked to do...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
21 mar 20222 minut(y) czytania
The Art of Attack vs. the Science of Resilience
From personal experience I can definitively say that there is no such thing as 100% cyber security. As we can see from the ever growing...
1 wyświetlenie
0 komentarzy

Stanislaw Banaszak
22 gru 20212 minut(y) czytania
Urgent Update: CVE-2021-44228 Log4j Vulnerability
Summary On December 9, 2021 a serious vulnerability in the Java-based logging package Log4j was disclosed. This is a remote code...
2 wyświetlenia
0 komentarzy


Stanislaw Banaszak
14 gru 20211 minut(y) czytania
Israeli cybersecurity co Orchestra acquires Netformx
The acquisition will expand Orchestra’s information security platform and enable it to discover network vulnerabilities while increasing...
3 wyświetlenia
0 komentarzy


Stanislaw Banaszak
12 gru 20213 minut(y) czytania
Governance and Policy in Practice
Part 4. Rethinking cybersecurity from the viewpoint of risk There are two principles to planning good governance: you automate away toil...
2 wyświetlenia
0 komentarzy


Stanislaw Banaszak
12 gru 20213 minut(y) czytania
Policy Bow Ties and Risk Based Policy
Part 3. Rethinking cybersecurity from the viewpoint of risk Policy is the centrepiece of both cybersecurity and risk management. Having a...
0 wyświetleń
0 komentarzy


Stanislaw Banaszak
12 gru 20213 minut(y) czytania
Digital Risk Management By Promise
Part 2. Rethinking cybersecurity from the viewpoint of risk The ability to estimate risk presumes a certain level of insight into...
0 wyświetleń
0 komentarzy


Stanislaw Banaszak
12 gru 20214 minut(y) czytania
Risk Paralysis and Cyber-insecurity
Part 1. Rethinking cybersecurity from the viewpoint of risk Did we get cybersecurity wrong? Thirty years after the infamous Internet Worm...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
30 sie 20212 minut(y) czytania
Airspace Vulnerabilities in Healthcare
Wireless adoption is quickly emerging in every industry vertical that is using digitalization to simplify operations. The issue is that...
1 wyświetlenie
0 komentarzy


Stanislaw Banaszak
29 sie 20215 minut(y) czytania
Why Should You Care about Cyber Threat and Risk Assessment?
Cyber risks are evolving fast and organizations need to deal with them in more efficient ways. This requires an all-inclusive and agile...
0 wyświetleń
0 komentarzy


Stanislaw Banaszak
7 cze 20211 minut(y) czytania
Risk Based Vulnerability Management
Cyber defense is moving to a risk management and operations paradigm (see previous posts on effective cyber risk management and policy...
1 wyświetlenie
0 komentarzy
bottom of page