20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program

Today, I will be going over Control 17 from version 7 of the CIS top 20 Critical Security Controls – Implement a Security Awareness and Training Program. I will go through the nine requirements and offer my thoughts on what I’ve found. Key … Continue reading 20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program

20 Critical Security Controls: Control 18 – Application Software Security

Today, I will be going over Control 18 from version 7 of the CIS top 20 Critical Security Controls – Application Software Security. I will go through the eleven requirements and offer my thoughts on what I’ve found. Key Take Aways for Contr… Continue reading 20 Critical Security Controls: Control 18 – Application Software Security

20 Critical Security Controls: Control 19 – Incident Response and Management

Today, I will be going over Control 19 from version 7 of the CIS top 20 Critical Security Controls – Incident Response and Management. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways for Con… Continue reading 20 Critical Security Controls: Control 19 – Incident Response and Management

20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

Today, I will be going over Control 20 from version 7 of the CIS top 20 Critical Security Controls – Penetration Tests and Red Team Exercises. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways… Continue reading 20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

How Foundational Prevention Fills in the Gaps of Threat Detection

Digital threat detection isn’t as easy as it was more than a decade ago. The threat landscape no longer evolves slowly in pace with signature-based malware. It moves quickly and thereby complements the rate at which new software flaws are discove… Continue reading How Foundational Prevention Fills in the Gaps of Threat Detection

BlueHat IL 2018, John Lambert’s ‘The New Paradigm of Security Controls’

Permalink
The post BlueHat IL 2018, John Lambert’s ‘The New Paradigm of Security Controls’ appeared first on Security Boulevard.
Continue reading BlueHat IL 2018, John Lambert’s ‘The New Paradigm of Security Controls’

How to Deal with Ransomware in 2018: Mitigate the Damage and Don’t Pay the Ransom

The post How to Deal with Ransomware in 2018: Mitigate the Damage and Don’t Pay the Ransom appeared first on Delta Risk.
The post How to Deal with Ransomware in 2018: Mitigate the Damage and Don’t Pay the Ransom appeared first on Security Bouleva… Continue reading How to Deal with Ransomware in 2018: Mitigate the Damage and Don’t Pay the Ransom

Do Your On-Prem Controls Extend into the Cloud?

There’s a Russian proverb “overyai, no proveryai.” (Trust, but verify.) You trust your IT department to keep your systems up and running and configured in a secure manner.  But, do you verify those configurations? As we all … Continue reading Do Your On-Prem Controls Extend into the Cloud?