CIS Critical Security Controls: The Essentials

CIS Critical Security Controls: The Essentials

CIS Critical Security Controls: The Essentials We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement...
How to Know and Control Your Software

How to Know and Control Your Software

Wondering how to go about implementing or integrating Control #2 with your current system set up? We’re partners with Tenable and Ted Gary’s blog post about this specific CIS is especially apt. “Knowing and controlling your software is...
On a Path to Protection? Discover Your Devices

On a Path to Protection? Discover Your Devices

3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...