Stop reporting on vulnerabilities and start talking about business risk. In this episode, Phil Moroni from Phoenix Security and I tackle a critical challenge: how to find and articulate security weaknesses in a way that truly matters to the business. We discuss why focusing on the complete exploitation vector, from software flaws to system misconfigurations, is essential for a realistic security posture. If you’re looking for a better way to frame security conversations and demonstrate the tangible impact of your work, this episode is for you.
References:
- BSides Edmonton Keynote: Finding Harmony: Translating tech into exec speak by Tim McCreight
- Phoenix Security Platform Overview
- Kubernetes: Considerations for large clusters
- Phoenix Security: Threat Centric Approach on Vulnerability
- Statista: Annual number of data compromises and individuals impacted in the United States from 2005 to 2024