Тёмный

Vulnerability Management Lifecycle | Remediating Threats | Patch Management 

Cyber Gray Matter
Подписаться 4,9 тыс.
Просмотров 2,1 тыс.
50% 1

Опубликовано:

 

6 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 6   
@alphajalloh2646
@alphajalloh2646 Год назад
Good information.. However, the music is too loud.
@cybergraymatter
@cybergraymatter Год назад
My apologies! I have tried to fix the more recent videos. My most recent ones have been better and the last one has no music.
@shozafwali5672
@shozafwali5672 Год назад
How to identify false positive?
@cybergraymatter
@cybergraymatter Год назад
After you've identified the specific vulnerability, you can look for the criteria that makes the asset vulnerable. Some vulenabiltiies have to be on certain versions or have a specific registry value. This is the proof that it exists. You can also test them through pen testing, as well, but it's not completely necessary unless you must provide a proof of concept.
@shozafwali5672
@shozafwali5672 Год назад
@@cybergraymatter For OT devices?
@cybergraymatter
@cybergraymatter Год назад
@@shozafwali5672 I haven't worked with OT, but I know there are a lot of issues with vulnerabilities. Since OT may run 24/7, I would hope there would be redundancy, and one could plan a time to test them. I hope this answers your question.
Далее
How to Audit a Firewall | GRC | Cybersecurity
10:22
Просмотров 2,9 тыс.
OG Buda - Сабака (A.D.H.D)
02:19
Просмотров 77 тыс.
Why Cybersecurity Training is a SCAM
10:37
Просмотров 149 тыс.