Protecting the Outer Walls of your Castle with Vulnerability Scans #92 | Intel Business

66 Views
Published
On this episode, Darren talks to Matt Lembright, Director of Federal Applications, Censys, about how Censys assesses the attack surface for internet-connected devices, allowing organizations to eliminate vulnerabilities.

Blog: https://www.intel.com/content/www/us/en/government/podcasts/embracing-digital-transformation-episode92.html

Podcast: https://soundcloud.com/embracingdigital/edt92

#EDT92 #EmbracingDigital #CyberSecurity #VunerabilityScans #Censys #EndpointSecurity

Subscribe now to Intel Business on YouTube: https://intel.ly/43XZh6J

About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the IntelĀ® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.

Connect with Intel Business:
Visit Intel Business's WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://linkedin.com/showcase/intel-business
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness

Protecting the Outer Walls of your Castle with Vulnerability Scans #92 | Intel Business
https://www.youtube.com/intelbusiness
Category
Intel
Tags
protecting the outer walls of your castle with vulnerability scans 92, outer walls, vulnerability
Be the first to comment