20 Critical Security Controls – Control 1: Inventory and Control of Hardware Assets

Today, I will be going over Control 1 from version 7 of the top 20 CIS Controls – Inventory and Control of Hardware Assets. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 1 Start… Continue reading 20 Critical Security Controls – Control 1: Inventory and Control of Hardware Assets

The Time for IT Asset Management Is Now

Due to the rapidly shifting technology landscape, a robust, dynamic and well-funded IT asset management program is a prerequisite to success in business.

The post The Time for IT Asset Management Is Now appeared first on Security Intelligence.

Continue reading The Time for IT Asset Management Is Now

Why Do Incidents Become Breaches?

Organizations can prevent damaging data breaches by identifying assets, monitoring those assets and implementing a tested incident response plan.

The post Why Do Incidents Become Breaches? appeared first on Security Intelligence.

Continue reading Why Do Incidents Become Breaches?