
Sign up to save your podcasts
Or


Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks about why it's so high on the list.
Be aware, be safe.
Reference article - https://binaryblogger.com/2016/11/09/breaking-critical-security-controls-csc-4-continuous-vulnerability-assessments/ ------------------------------------ Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss YouTube - https://www.youtube.com/binaryblogger Email - [email protected] Music in this episode: Greenhorn by Mystery Mammal is licensed under a Attribution-ShareAlike License.
By Drew KoenigMoving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks about why it's so high on the list.
Be aware, be safe.
Reference article - https://binaryblogger.com/2016/11/09/breaking-critical-security-controls-csc-4-continuous-vulnerability-assessments/ ------------------------------------ Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss YouTube - https://www.youtube.com/binaryblogger Email - [email protected] Music in this episode: Greenhorn by Mystery Mammal is licensed under a Attribution-ShareAlike License.