Preview Mode Links will not work in preview mode

The Security Current Podcast features CISO-led interviews with industry thought leaders about key challenges, best practices and innovative approaches to information security, risk and privacy.

Mar 2, 2015

Scanning a network, devices or applications for security vulnerabilities may not tell the whole story or even tell the true story. IP addresses and host names are a moving target, constantly changing. This leads to frustration and potentially remediation of the wrong assets while broken assets may remain unevaluated and vulnerable. And the problem is worse as organizations use cloud environments. 

In this sponsored podcast, Security Current's Vic Wheatman speaks with security expert Tom Desot, CIO of Digital Defense Inc., who talks about the problem and offers ways to mitigate.