The Latest Cyber Security News and Updates
Mar
30
CIS Control 13: Data Protection What is CIS Control 13? The CIS controls are a set of actions that protect your organization from the most pervasive cyber attacks. There are 20 total…
READ MORE
CIS Control 12: Boundary Defense What is CIS Control 12? CIS Control 12 focuses on detecting, preventing, and correcting the flow of information transferring across networks of different trust levels with a…
29
CIS Control 11: Secure Configuration for Network Devices such as Firewalls, Routers, and Switches What is CIS Control 11? CIS Control 11 focuses on establishing, implementing, and actively managing (track, report on,…
CIS Control 10: Data Recovery Capabilities What is CIS Control 10? The CIS controls are a set of actions that protect your organization from the most pervasive cyber attacks. There are 20…
CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services What is CIS Control 9? The CIS controls are a set of actions that protect your organization from the most…
2
CIS Control 8: Malware Defenses What is CIS Control 8? CIS Control 8 is one of the 20 critical CIS Controls. CIS controls are a set of actions that protect your organization…
CIS Control 7: Email and Web Browser Protections What is CIS Control 7? The CIS Controls are a set of actions that protect your organization from the most pervasive cyber attacks. There…
Feb
5
CIS Control 6: Maintenance, Monitoring, and Analysis of Audit Logs What is CIS Control 6? CIS Control 6 focuses on collecting, managing, and analyzing audit logs of events that could help your…
CIS Control 5: Secure Configuration for Hardware and Software on Devices What is CIS Control 5? The CIS controls are a set of actions that protect your organization from the most pervasive…
Jan
CIS Control 4: Controlled Use of Administrative Privileges What is CIS Control 4? The CIS controls are a set of actions that protect your organization from the most pervasive cyber attacks. There…