by Perry Lynch | Nov 8, 2019 | Blog, CIS Critical Security Controls
3:35 min read | Flaws in software can leave your information systems vulnerable to attacks. Information about bugs in popular commercial and open-source software is available to everyone. Attackers exploit them once they’re known, so keeping up with patch...
by Perry Lynch | Apr 11, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Defending network boundaries is an increasingly complicated and difficult task. Cloud services, remote access, and mobile devices can make it difficult to identify the exact boundaries of a network. CIS Control #12, which deals with the defense of...
by Perry Lynch | Mar 13, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Firewalls, routers, and switches play a critical role in network security. How well they succeed depends on the level of attention administrators pay to their configuration. CIS Control #11 addresses the need to configure network devices carefully and...