enterprise - Tagged - Security Boulevard

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...

CIS Control 1: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement, leading up to what we are presented with today in CIS Controls version 8. CIS Controls reflect the ...
Nurturing a healthy digital transformation process

Nurturing a healthy digital transformation process

Digital Transformation is already a familiar term. In its essence, it deals with the integration of digital technology in all business areas to bring better value to customers. Over the last year, ...
cloud and container security

Simplicity is the Necessary Killer Security Feature

Pre-COVID-19, IT and security teams were being challenged by too many projects, a lack of resources and teams that lacked enough people. After a year like no other, there is much self-congratulation ...
Security Boulevard
Password Reuse Risk is Exacerbated by Dark Web Data

Password Reuse Risk is Exacerbated by Dark Web Data

A flood of data to the dark web in the last 12 months has kicked up the cybercrime risk of password reuse. Here's how to protect your data ...
See Our Solutions at Work in New Case Studies

See Our Solutions at Work in New Case Studies

Clients love the ID Agent Digital Risk Protection Platform. But don't take our word for it - hear from them directly in 2 new case studies! ...

Techstrong Group