teissPodcast - Cracking Cyber Security

Digital forensics and incident response in the cloud


Listen Later

  • Preparation - choosing which events and resources should be logged in your cloud environment
  • Applying a Zero Trust model when configuring your network - managing devices, permissions and applications
  • Misconfigurations, vulnerabilities and patch management - best practice in reducing the opportunities for error


...more
View all episodesView all episodes
Download on the App Store

teissPodcast - Cracking Cyber SecurityBy TEISS

  • 5
  • 5
  • 5
  • 5
  • 5

5

3 ratings