08.29.2022 - By SECTION 9
We’re scanning our network with runZero to get an inventory of devices. What did it find? What can we learn from this inventory? How well does it work? fix? Do we have any security controls in place? Can we wait to implement the CIS controls?