Preview Mode Links will not work in preview mode

Security In Five Podcast

Jul 31, 2017

Continuing the breakdown of the CIS Top 20 Critical Security Controls the next one on the list is number 5, Controlling Administrative Accounts. The admin accounts have all the access in your environment, if a hacker gets those keys they can go anywhere they wish. CIS 5 drives for controlling those keys in...


Jul 28, 2017

Risk Management has a purpose within a security program. One of those is not to be used as your excuse to not do something. Accepting risk because lack of funds or desire to move forward is unacceptable... and risky. 

Be aware, be safe.

------------------------------------
Website - https://www.binaryblogger.com
Twitter...


Jul 27, 2017

Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks about why it's so high on the list. 

Be aware, be safe.

 

Reference...


Jul 26, 2017

Internet of Things is a craze to get everything on the Internet. However the rush to build has left security practices behind. Time and time again it's shown that IoT poses a security risk for everyone. This episode talks about how a fish tank almost got a casino hacked.

Be aware, be...


Jul 25, 2017

Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode goes over some of those mistakes than can turn around and be bigger problems down the road. 

Be aware, be...