DiscoverThe CyberCall PodcastControl 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker
Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

Update: 2021-08-26
Share

Description

Abstract:  Learn why the number one thing organizations can do to defend their networks against top attacks, is to implement secure configurations!

Azure Breach (8/26/2021): According To Wiz who found the CosmosDB Vulnerability, they quote: "Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment."   https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databases

Sponsor: ThreatLocker interview with CEO, Danny Jenkins at minute 31:58 .  Learn more here: https://www.threatlocker.com/
Sponsor: CIS CIS-CAT (https://learn.cisecurity.org/cis-cat-lite)

Co-hosts:
Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
Wes Spencer: https://www.linkedin.com/in/wesspencer/

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

Andrew Morgan