Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all.
Before you chew through Compliance, consider trying the CIS Controls
When Old News is More Dangerous than Fake News: Vulnerability Scan Blind Spots
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse.
Accomplish More with Less with the Basic CIS Controls
Data breaches are a common occurrence in the world we live in today. Whether its personal data that relates to an organizations’ customers or data referencing the inner workings of an organization’s infrastructure, when it falls into the wrong hands, the consequences are disastrous.
How to Establish a Secure Baseline
Hardening operating systems and keeping an audit trail of activity using a change detection and SIEM solution are must haves in order to ensure that your environment is safe from cyber attacks or unwanted intrusions.