A business recently acquired a software company. The software company's security posture is unknown. However, based on an initial assessment, there are limited security controls. No significant security monitoring exists. Which of the following is the NEXT step that should be completed to obtain information about the software company's security posture?
catastrophie
Highly Voted 2 years, 4 months agoJoshey
2 years, 2 months agoAC6280
2 years, 3 months agoTheSkyMan
Highly Voted 2 years, 8 months agouday1985
1 year, 9 months agoPTcruiser
2 years, 8 months agoMr_BuCk3th34D
2 years, 5 months agoAaronS1990
2 years, 3 months agoskibby16
Most Recent 1 year, 6 months agoGwatto
1 year, 7 months agoAliyan
1 year, 9 months agonaleenh
1 year, 10 months agojosephconer1
2 years, 2 months agotatianna
2 years, 2 months ago2Fish
2 years, 2 months agoencxorblood
2 years, 3 months agoabsabs
2 years, 3 months agoAaronS1990
2 years, 3 months agoCatoFong
2 years, 3 months agomoonash
2 years, 4 months agotrainingsmits
2 years, 4 months agof3lix
2 years, 5 months agof3lix
2 years, 5 months agoroman1000
2 years, 5 months ago