Security In Five

Episode 22 - CIS 1 Inventory Of Devices


Listen Later

We begin the CIS CSC Top 20 breakdown with control number one. Inventory of authorized and unauthorized devices. What does it mean? How do you approach it? How can hackers exploit this?

Be aware, be safe.

Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss Email - [email protected] Music in this episode: Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.  
...more
View all episodesView all episodes
Download on the App Store

Security In FiveBy Drew Koenig