Episode 29 - CIS 3 Secure Configurations

Published: July 20, 2017, 1 p.m.

Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down.

Be aware, be safe.

------------------------------------ Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 Podcast RSS - http://securityinfive.libsyn.com/rss YouTube - https://www.youtube.com/binaryblogger Email - contactme@binaryblogger.com Music in this episode: Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.