Tag: Risk Management

Intro to Vulnerability

When you are charged with hardening a target while working in cybersecurity, you can’t just start the process by blindly throwing some money at some costly equipment hoping for results. Instead, an in-depth security assessment needs to be completed, meticulously inspecting every layer of protection the target has, […]