SecurityEverAfter 2018-03-29 21:17:00

I recently posted the below on the SANS Internet Storm Center.The CIS Controls serve as a “prioritized set of actions to protect your organization and data from known cyber attack vectors.”. Embraced by several organizations as outlined in the Case Studies section, significant improvements to their cyber security programs are listed and can serve as an inspiration to consider this approach to effective cyber defense.Recently Version 7 of the CIS Controls were released. This work reflects the engagement of over many volunteers who helped shape this update. Several key changes made to the CIS Controls are listed below, including the following seven principles.1....
Read more

Critical Security Controls v7 RELEASED

I have previously posted on the Critical Security Controls, which many still incorrectly called the "SANS Top 20" and the like, tho SANS hasn't been managing them for some time.  The current org that manages them is the Center for Internet Security, which has overseen them since around 2015.  They previously put out v6 and after about a year working on the have released v7.  You can download them from the CIS website, along with other materials.I haven't had the chance to full look at v7 and take a look at the differences from v6.  There are...
Read more

20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises

Today, I will be going over Control 20 from version 7 of the CIS top 20 Critical Security Controls – Penetration Tests and Red Team Exercises. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Take Aways from Control 20 Rely on the previous controls. So much of … Read More The post 20 Critical Security Controls: Control 20 – Penetration Tests and Red Team Exercises appeared first on The State of Security.
Read more

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and micro-virtualization of endpoints proactively minimizes the attack surface to dramatically reduce breaches and false alerts. You’ve heard the saying, “the best The post Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It appeared first on Bromium.
Read more

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model The post Securing the Modern Endpoint the SANS Maturity Way appeared first on Bromium.
Read more

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do The post A Cybersecurity Proof: The Application is the Endpoint appeared first on Bromium.
Read more

SANS Maturity Model Webinar Describes How to Grow Your Security Strategy

Setting your security strategy is a challenging task that comes with lot of opinions (and vendors!). SANS provides a rationale for growing protection that is logically calibrated to growth and expanding needs. Register for this webinar and even if you can’t make it, we’ll send you the recording (and a whitepaper). With so many security The post SANS Maturity Model Webinar Describes How to Grow Your Security Strategy appeared first on Bromium.
Read more

My first SANS/GIAC certification

I have several infosec certifications, but most are from ISC(2) and ISACA.This past week I learned that I passed the test I took for a new GIAC certification: the GSTRT, which is for the GIAC Strategic Planning, Policy, and Leadership.  Its tied to SANS's new MGT514: IT Security Strategic Planning, Policy, and Leadership, which I took last year.  At the time there was no cert, so I got to beta test the new exam.Not having done any of the GIAC certs, this was a new experience for me.  GIAC allows you to bring your books with you, so...
Read more
Page 1 of 212