20 CIS Controls – Control 2: Inventory and Control of Software Assets

Today, I will be going over Control 2 from version 7 of the top 20 CIS Controls – Inventory and Control of Software Assets. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 2 Let Cont… Continue reading 20 CIS Controls – Control 2: Inventory and Control of Software Assets

20 Critical Security Controls: Control 4 – Controlled Use of Administrative Privileges

Today, I will be going over Control 4 from version 7 of the CIS top 20 Critical Security Controls – Controlled Use of Administrative Privileges. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways… Continue reading 20 Critical Security Controls: Control 4 – Controlled Use of Administrative Privileges

A Look Inside the April Update to the MITRE ATT&CK Framework

The MITRE ATT&CK Framework is an excellent resource when it comes to defining threat intelligence. The hundreds of techniques mapped across various tactics help define an adversary’s behaviors in enterprise networks. What’s better is th… Continue reading A Look Inside the April Update to the MITRE ATT&CK Framework

20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. I will go through the five requirements and… Continue reading 20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the eight requirements and offer my thoughts on what I’ve found. Key … Continue reading 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

20 Critical Security Controls: Control 7 – Email and Web Browser Protections

Today, I will be going over Control 7 from version 7 of the CIS top 20 Critical Security Controls – Email and Web Browser Protections. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control… Continue reading 20 Critical Security Controls: Control 7 – Email and Web Browser Protections

20 Critical Security Controls: Control 8 – Malware Defenses

Today, I will be going over Control 8 from version 7 of the CIS top 20 Critical Security Controls – Malware Defenses. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 8 Back to the… Continue reading 20 Critical Security Controls: Control 8 – Malware Defenses

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

Today, I will be going over Control 9 from version 7 of the CIS top 20 Critical Security Controls – Limitation and Control of Network Ports, Protocols, and Services. I will go through the five requirements and offer my thoughts on what I’ve… Continue reading 20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Controls: Control 10 – Data Recovery Capabilities

Today, I will be going over Control 10 from version 7 of the CIS top 20 Critical Security Controls – Data Recovery Capabilities. I will go through the five requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 10 … Continue reading 20 Critical Security Controls: Control 10 – Data Recovery Capabilities

20 Critical Security Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches

Today, I will be going over Control 11 from version 7 of the CIS top 20 Critical Security Controls – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches. I will go through the seven requirements and offer my thought… Continue reading 20 Critical Security Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches