by Peter Dietrich | Jun 13, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Michele Dietrich | Feb 9, 2018 | Blog
3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...