What Systems Keep You Effective?

I recently posted the below on the SANS Internet Storm Center.Previously I discussed What’s On Your Not To Do List as a means to remain focused on priorities. I never fear running ...
CIS Controls Version 7 Launch Event | March 19th 2018

SecurityEverAfter 2018-03-29 21:17:00

I recently posted the below on the SANS Internet Storm Center.The CIS Controls serve as a “prioritized set of actions to protect your organization and data from known cyber attack vectors.”. Embraced ...

Critical Security Controls v7 RELEASED

I have previously posted on the Critical Security Controls, which many still incorrectly called the "SANS Top 20" and the like, tho SANS hasn't been managing them for some time. The current ...

20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

Today, I will be going over Control 20 from version 7 of the CIS top 20 Critical Security Controls – Penetration Tests and Red Team Exercises. I will go through the eight ...

SANS tips on using social media

The latest 'OUCH! newsletter offers reasonable (if basic) advice: Top Tips to Securely Using Social Media ...

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk ...
Webinar: Securing the Modern Endpoint

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently ...
A Cybersecurity Proof: The Application is the Endpoint

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to ...

SANS Maturity Model Webinar Describes How to Grow Your Security Strategy

Setting your security strategy is a challenging task that comes with lot of opinions (and vendors!). SANS provides a rationale for growing protection that is logically calibrated to growth and expanding needs ...
Loading...