Understanding CIS Control 5

 

This week, we’re focusing on Critical Control 5: Controlled Use of Administrative Privileges. More specifically:

This entry was posted in CIS Controls on October 31, 2016 by Kimberly K

Understanding CIS Control 4

 

To celebrate National Cyber Security Awareness Month, CIS is kicking off each week in October with a deep dive into one of the top 5 CIS Controls.

Understanding CIS Control 4

This week, we’re focusing on Critical Control 4: Continuous Vulnerability Assessment and Remediation. More specifically:

Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.” 

This entry was posted in CIS Controls on October 24, 2016 by Kimberly K

Understanding CIS Control 3

 

Understanding CIS Control 3

This week, we’re focusing on Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. More specifically: 

This entry was posted in CIS Controls on October 17, 2016 by Kimberly K

Understanding CIS Control 2

To celebrate National Cyber Security Awareness Month, CIS is kicking off week two with a deep dive into CIS Control 2.

This entry was posted in CIS Controls on October 10, 2016 by Kimberly K

Understanding CIS Control 1

 

To celebrate National Cyber Security Awareness Month, CIS will kick-off each week in October with a deep dive into one of the top 5 CIS Controls.

This entry was posted in CIS Controls on October 03, 2016 by Kimberly K

Get to Know the CIS Critical Security Controls

The CIS Critical Security Controls have come a long way since 2008. Check out this infographic below to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.

This entry was posted in Critical Security Controls, CIS Controls, CIS Critical Security Controls on August 15, 2016 by Kimberly K