CIS
What is Multi-Factor Authentication?
Most organizations require their employees to use multi-factor authentication (MFA) solutions these days. This is because your traditional passwords are not secure anymore. Think of this, between your sensitive data and a ...
A Complete List of AWS S3 Misconfigurations
Amazon S3 or Amazon Simple Storage Service is an AWS service where data and objects are stored. It is the most popular public cloud service that offers data availability, security, and performance ...
A Complete List of AWS S3 Misconfigurations
Amazon S3 or Amazon Simple Storage Service is an AWS service where data and objects are stored. It is the most popular public cloud service that offers data availability, security, and performance ...
Top 6 Azure Virtual Machine (VM) Misconfigurations To Avoid in 2021
This article will explore the top 6 most common Azure Virtual Machine (VM) misconfigurations you need to avoid in 2021. What are Azure Virtual Machines? Azure offers many on-demand, scalable computing resources ...
How the CIS Foundations Benchmarks Are Key to Your Cloud Security
Many organizations are migrating their workloads to the cloud. But there are challenges along the way. Specifically, security leaders are concerned about their ability to protect their cloud-based data using secure configurations ...
Breaking Down CIS Foundational Controls
Effective cybersecurity programs many times utilize a layered approach. Spending a vast sum on advanced protection systems can be pointless if the time is not taken to secure against basic threats ...
Critical Chrome Cyber Bugs: Update NOW
Google Chrome has a bunch of bugs, some of which might pwn your PC or Mac. Go get the update ...
Cyber Hygiene: Boosting Your Security Posture
It has been two years since Equifax announced a data breach that exposed the financial records of more than 147 million people, and the news continues to dominate the headlines. After two ...
Cloud Security a Shared Responsibility – Shared Security Model
The post Cloud Security a Shared Responsibility – Shared Security Model appeared first on CCSI ...