3:00 min read
When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is often lacking, though, is the clear direction as to what “improving security” actually entails”. Following a well-known framework, the CIS Controls, provides this guidance. More from their blog…. https://www.forescout.com/company/blog/ot-network-security-starts-knowing/