Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Mar 2, 2015

Scanning a network, devices or applications for security vulnerabilities may not tell the whole story or even tell the true story. IP addresses and host names are a moving target, constantly changing. This leads to frustration and potentially remediation of the wrong assets while broken assets may remain unevaluated and vulnerable. And the problem is worse as organizations use cloud environments. 

In this sponsored podcast, Security Current's Vic Wheatman speaks with security expert Tom Desot, CIO of Digital Defense Inc., who talks about the problem and offers ways to mitigate.