Security Configuration Management: Getting Back to IT Security Basics

In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they are an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Provided by: Tripwire Topic: Security Date Added: Oct 2012 Format: PDF

Find By Topic