
(BNS) The Crowdstrike Thing (With Overmind.tech)
Tech Brew Ride Home
00:00
The Hidden Risks of Configuration Changes in Cybersecurity
This chapter explores the critical role of understanding configuration changes in cybersecurity, highlighting recent incidents where these changes led to significant outages. It underscores the often-overlooked dangers of configuration alterations compared to coding changes and discusses how proprietary software can complicate the perception of these risks.
Transcript
Play full episode