Quote:
Originally Posted by GaryZ
We try to follow security best practices by keeping software and device settings up to date and specifying whether or not applications can initiate specific types of connections, but I would like to be more proactive.
I saw a blog from eEye regarding a free mobility scanning module (blog.eeye.com/general/sneak-peek-free-mobility-scanning-from-eeye) and wanted to know what other people are doing for vulnerability management?
|
Are you a representative of eEye or connected with them?