The next Critical Security Control is number 2, Inventory of Software. What is it? How would you go about implementing this and what are they ways it could be exploited?
Be aware, be safe.
------------------------------------ Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss YouTube - https://www.youtube.com/binaryblogger Email - contactme@binaryblogger.com Music in this episode: Opal by Mystery Mammal is licensed under a Attribution-ShareAlike License