Posts tagged CIS Controls

Security Operations
CIS Critical Control 11: Secure Configurations for Network Devices

Exposure Management
The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Exposure Management
8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Exposure Management
The CIS Critical Security Controls Explained - Control 2: Inventory and Control of Software Assets

Exposure Management
The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Exposure Management
Use DHCP Discovery to Implement Critical Security Control 1

Exposure Management
Rapid7 On Top in SANS Top 20 Critical Security Controls

Security Operations
Critical Control 16: Account Monitoring and Control

Exposure Management