by Peter Dietrich | Jan 9, 2020 | Case Study
Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...