by Michele Dietrich | Mar 19, 2018 | Blog, CIS Critical Security Controls
1:35min read | We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement just the top 5 reduces known...
by Michele Dietrich | Feb 15, 2018 | Blog
Wondering how to go about implementing or integrating Control #2 with your current system set up? We’re partners with Tenable and Ted Gary’s blog post about this specific CIS is especially apt. “Knowing and controlling your software is...
by Michele Dietrich | Feb 9, 2018 | Blog
3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...
by Michele Dietrich | Feb 2, 2018 | Blog
3:35 min read When the training of employees becomes your next step in securing the organization against human risk, where do you begin? We’ve chosen to partner with Wombat because of a storied history of helping with just that. Take a look at a few of the...
by Michele Dietrich | Jan 25, 2018 | Blog
3:00 min read Insider threats are a hidden and yet obvious peril. They are human security risks to an organization’s cybersecurity from those who have authorized access to the company’s data and computer systems. They are the biggest cause of security breaches...