Cyber Ops Unmasked

Cybersecurity Weekly - Season 1, Episode 28


Listen Later

In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).

...more
View all episodesView all episodes
Download on the App Store

Cyber Ops UnmaskedBy Keith Hales, CEO - InfoSystems, Chattanooga, TN