Artwork
iconShare
 
Manage episode 521559228 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Welcome to our exploration of why you cannot secure what you cannot see in cybersecurity. This episode focuses on asset inventory, the simple idea of knowing exactly what technology you depend on every day. Before anything else, you need to understand what security professionals mean when they say the word assets. In security, assets are anything valuable that supports how a business works, including laptops, servers, cloud accounts, and important data. When those assets are visible and counted, it becomes much easier to protect them in a deliberate way. When they are invisible or forgotten, they turn into quiet openings that attackers can discover before defenders even know something exists. Beginners often jump straight into tools, alerts, or headlines without first building this basic map of their environment. Without that map, every later security effort rests on a shaky foundation that can surprise people. In this episode, you will learn how different kinds of assets fit together as one picture. You will also see why even small gaps in that picture can make logging, patching, and incident response much less effective.

  continue reading

74 episodes