Cyber Ops Unmasked

Cybersecurity Weekly - Season 1, Episode 27


Listen Later

In this episode, Fred and Rob discuss how you can secure network devices. This is the fourth Foundational CIS Control and is used to secure the configuration for network devices such as Firewalls, Routers, and Switches. Secure configuration for network devices is most impactful when a company has taken action against the first ten CIS Controls (following the CIS Top 20 Cybersecurity Controls).

...more
View all episodesView all episodes
Download on the App Store

Cyber Ops UnmaskedBy Keith Hales, CEO - InfoSystems, Chattanooga, TN