Effectiveness of cybersecurity penetration testing depends on what you penetrate

Published: Oct. 21, 2024, 2:55 p.m.

A big part of cybersecurity planning involves penetration testing. That in turn requires management of the thousands, sometimes hundreds of thousands, of end-point devices on your network. Each one can be a source of unwanted network penetration. I discussed this in detail with the lead penetration tester for the department of computing security at the Rochester Institute of Technology, Rob Olson.\nLearn more about your ad choices. Visit podcastchoices.com/adchoices