Security In Five

Episode 29 - CIS 3 Secure Configurations


Listen Later

Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down.

Be aware, be safe.

------------------------------------ Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss YouTube - https://www.youtube.com/binaryblogger Email - [email protected] Music in this episode: Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.
...more
View all episodesView all episodes
Download on the App Store

Security In FiveBy Drew Koenig