Cybersecurity Weekly - Season 1, Episode 28

Share:

Listens: 0

Business and Technology in Tennessee with Josh Davis

Business


In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the fifth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).