In this episode we discuss everyone's most favorite of topics, Vulnerability Management!
Supporting Links:
What is Vulnerability Management and Scanning?
Why there are at least 6,000 vulnerabilities without CVE-IDs
If you found this interesting or useful, please like and subscribe, and follow us @serengetisec for more! Without that social validation, we just sulk around the house all day.
This week we discuss two articles - One about how the Technology Adoption Cycle applies to companies and how they acquire a new security...
In this episode, we discuss a recent FBI report on cybercrime, and then we talk about the recent Ronin Bridge hack on Axie Infinity,...
In this episode, we discuss Ransomware affecting ships and 3rd party service organizations, new cyberinsurance requirements around MFA and service account, supply chain woes,...