Decrypting IT

Navigating Breaches: Strategies for Response


Listen Later

In this episode of Decrypting IT, host Ashley Wallace and guest Steven McNutt discuss the critical importance of perimeter security in today’s cybersecurity landscape. They explore the evolution of firewalls, the necessity of multi-factor authentication (MFA), and the significance of proper configuration and segmentation. The conversation also delves into breach response strategies, the role of sandboxing in threat detection, and the importance of geo-blocking. The episode concludes with actionable takeaways for organizations to enhance their firewall deployment and security posture.



...more
View all episodesView all episodes
Download on the App Store

Decrypting ITBy Ashley Wallace