Episode 29 – CIS 3 Secure Configurations
Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down.
Be aware, be safe.
————————————
Website – https://binaryblogger.com
Twitter – https://www.twitter.com/binaryblogger
Podcast RSS – http://securityinfive.libsyn.com/rss
YouTube – https://www.youtube.com/binaryblogger
Email – contactme@binaryblogger.com
Music in this episode:
Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.