Mar 2, 2015
Scanning a network, devices or applications for security
vulnerabilities may not tell the whole story or even tell
the true story. IP addresses and host names are a moving target,
constantly changing. This leads to frustration and potentially
remediation of the wrong assets while broken assets may remain
unevaluated and vulnerable. And the problem is worse as
organizations use cloud environments.
In this sponsored podcast, Security Current's Vic Wheatman speaks with security expert Tom Desot, CIO of Digital Defense Inc., who talks about the problem and offers ways to mitigate.