The Evolution Of Vulnerability Management – Enterprise Security Weekly #126
Where do we stand today in the following 3 areas when it comes to vulnerability management: 1. Applications - DevOps, containers and applications in general (desktop and SaaS) - What are the new challenges and how do we solve them? 2. Infrastructure - We still have infrastructure, operating systems, IoT, network infrastructure, etc...How do we best make this happen and make sense of the results? 3. Mobile - How do we cover iOS, Android, Chrome OS? Do we even care? Full Show Notes: https://wiki.securityweekly.com/ES_Episode126 Visit http://securityweekly.com/esw for all the latest episodes!
Prioritizing identity and getting the fundamentals right. We are managing more identities than ever – people-people, machine-to-machine, and people-machines. What actions should CISOs be ensuring are being done within the environment to prioritize identities? Join us as we discuss where Bezwit has focused to enhance the identity management process....
Theresa Lanowitz joins Business Security Weekly to review real edge computing use cases from the AT&T Cybersecurity Insights Report. Specifically, we'll cover the following industry sector reports, including:
Research for the AT&T Cybersecurity Insights Report was conducted during ...