Preview Mode Links will not work in preview mode

Security In Five Podcast


Jul 27, 2017

Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks about why it's so high on the list. 

Be aware, be safe.

 

Reference article - https://binaryblogger.com/2016/11/09/breaking-critical-security-controls-csc-4-continuous-vulnerability-assessments/
 
------------------------------------
Website - https://www.binaryblogger.com
Twitter - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
Podcast RSS - http://securityinfive.libsyn.com/rss
YouTube - https://www.youtube.com/binaryblogger
Email - contactme@binaryblogger.com
Music in this episode:
Greenhorn by Mystery Mammal is licensed under a Attribution-ShareAlike License.