Vulnerability assessment alone is not enough to protect systems from compromise as misconfigurations are a major source of breaches. Weak or improper continuous security configuration assessment (SCA) settings are often exploited by hackers and have played a significant role in high-profile cyberattacks like Petya.
Join this Technical Series webinar and learn from a Qualys Technical Account Manager why Security Configuration Assessment should not be ignored.
This session covers:
- Introduction to SCA
- A brief enumeration of the differences with the Policy Compliance apps
- A digress about the Center for Internet Security (CIS)
- Quick start guide