Cybersecurity Weekly - Season 1, Episode 15

Share:

Listens: 0

Business and Technology in Tennessee with Josh Davis

Business


In this episode, Fred and Chad discuss continuous vulnerability management, the practice of regularly scanning and cleaning devices and the applications being used on those devices. Vulnerability Management is most impactful when a company first has an inventory of Hardware Assets and Software Assets (following the CIS Top 20 Cybersecurity Controls).