by Michele Dietrich | Feb 15, 2018 | Blog
Wondering how to go about implementing or integrating Control #2 with your current system set up? We’re partners with Tenable and Ted Gary’s blog post about this specific CIS is especially apt. “Knowing and controlling your software is...
by Michele Dietrich | Feb 9, 2018 | Blog
3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...
by Michele Dietrich | Jan 9, 2018 | Blog
1:00 min read All the cyber sphere is abuzz over the latest in world ending vulnerabilities Meltdown and Spectre. Truly the hype is impressive these past few weeks. But all kidding aside, this one is pretty serious or at least it may be...