Prevent Cyberattacks with RBVM | Security Series

Published: April 15, 2020, 6 a.m.

Is your company digging out old computers to make sure all remote workers have one? Those machines probably haven’t been updated in a long time, leaving vulnerabilities for attackers to take advantage of. 

How do you make sure your employees are operating in a secure environment? 

In this episode of B2B Tech Talk, Keri speaks with Ingram Micro Tech Consultant Jacob White about implementing risk-based vulnerability management (RBVM). 

The two discuss:  

  • How to prioritize the urgency of security threats 
  • The most common types of cybersecurity threats 
  • How Tenable helps organizations scan for vulnerabilities and address threats  

Find out more by visiting Tenable

Connect with Jacob via LinkedIn or email him at jacob.white@ingrammicro.com 

To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk 

Sponsored by Ingram Micro Security and Ingram Micro Financial Solutions. 

Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.