28 min listen
A View into CTEM Exposure Management: Reducing your Attack Surface 3x
FromISACA Podcast
ratings:
Length:
43 minutes
Released:
Feb 7, 2024
Format:
Podcast episode
Description
Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included.
In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.
For more ISACA Podcasts, visit www.isaca.org/podcasts
To learn more about Nanitor, please visit https://nanitor.com/
To view the Nanitor article, please click https://nanitor.com/resources/blog/cybersecurity/exploring-continuous-threat-exposure-management-ctem/
In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.
For more ISACA Podcasts, visit www.isaca.org/podcasts
To learn more about Nanitor, please visit https://nanitor.com/
To view the Nanitor article, please click https://nanitor.com/resources/blog/cybersecurity/exploring-continuous-threat-exposure-management-ctem/
Released:
Feb 7, 2024
Format:
Podcast episode
Titles in the series (99)
Breaking Down the ESET T1 2022 Threat Report: ESET, a global leader in cybersecurity, has released its T1 2022 Threat Report, which summarizes the most notable trends that shaped the threat landscape from January to April 2022. Join ISACA’s Research Advisor, Brian Fletcher, as he breaks down the... by ISACA Podcast