Defense in Depth cover image

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Defense in Depth

00:00

Vulnerability Management, Assume-Breach, and Controls

Howard and Rob discuss VM as one layer, ‘assume breach’ zero trust controls, prioritizing the top vulnerabilities and configuration, plus the PrintNightmare case where default-deny blocked exploitation.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app