Can You Have a Secure Software Environment Without Traditional Vulnerability Management? cover art

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Listen for free

View show details

About this listen

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Howard Holton, COO, Gigaom. Joining us is our sponsored guest, Rob Allen, chief product officer at ThreatLocker.

In this episode:

  • Reinforcing zero trust
  • Focus on effectiveness
  • Understanding zero trust limitations
  • What's next

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

activate_mytile_page_redirect_t1

What listeners say about Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.