To protect your network, you must first know your network

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least cited control, with only 16% of CISOs leveraging it. Some may consider inventory an IT responsibility, not a security responsibility, but this is a serious oversight according to Ray Pompon, Principal Threat Researcher Evangelist with F5 Labs.

Read why Ray Pompon thinks that building and maintaining an accurate asset inventory is the foundation for the security team’s work on Help Net Security.

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here