Tag: CIS Control
January 19, 2023 |
CIS Control 13: Network Monitoring and Defense
Cybersecurity today seems like an arms race: Enterprises implement more and more security tools to try defend their networks against increasingly frequent and sophisticated attacks. But simply increasing the number of tools in your arsenal is not an effective cybersecurity strategy. Rather, what...
September 16, 2022 |
Top 18 CIS Critical Security Controls for Cyber Defense
With the cost of a data breach at an all-time high of $4.35 million and regulations worldwide imposing steeper penalties for compliance failures, organizations must ensure that they have all necessary security controls in place to keep their data safe. Implementing the CIS Controls provides a sound...
July 28, 2022 |
CIS Implementation Group 1 (IG1): Essential Cyber Hygiene
Cybercrime has become more prevalent since the start of the COVID-19 pandemic. Indeed, 81% of organizations worldwide experienced an uptick in cyber threats and 79% suffered downtime due to cyberattacks during peak season, according to a 2021 report by McAfee Enterprise and FireEye. Attacks have...
June 23, 2022 |
CIS Control 17. Incident Response Management
The Center for Internet Security (CIS) offers Critical Security Controls (CSCs) that help organizations improve cybersecurity. CIS CSC 17 covers incident response and management. (In earlier versions of the CIS controls, handling of security incidents was covered in Control 19.)
CIS CSC 17...
June 23, 2022 |
CIS Critical Security Control 18. Penetration Testing
The Center for Internet Security (CIS) provides Critical Security Controls (CIS Controls) to support the evolving field of cybersecurity. CIS Control 18 covers penetration testing (this topic was covered by Control 20 in the previous version).
Penetration testing is the intentional launch of...
June 16, 2022 |
A Guide to CIS Control 10: Malware Defenses
Control 10 of CIS Critical Security Controls version 8 is focused on malware defenses. It describes safeguards to prevent or control the installation, spread and execution of malicious applications, code and scripts on enterprise assets. (In CIS version 7, this topic was covered by Control...
June 16, 2022 |
A Guide to CIS Control 8: Audit Log Management
Introduction to CIS Control 8
CIS Control 8 Center for Internet Security (CIS) version 8 covers audit log management. (In version 7, this topic was covered by Control 6.) This security control details important safeguards for establishing and maintaining audit logs, including their collection,...
May 4, 2022 |
CIS Control 1: Inventory and Control of Enterprise Assets
Unless you know what IT assets you have and how important each of them is to your organization, it’s almost impossible to make strategic decisions about IT security and incident response.
Indeed, inventory and control of enterprise assets is so important that it is the first in the set of...
May 4, 2022 |
CIS Control 4: Secure Configuration of Enterprise Assets & Software
Maintaining secure configurations on all your IT assets is critical for cybersecurity, compliance and business continuity. Indeed, even a single configuration error can lead to security incidents and business disruptions.
Control 4 of CIS Critical Security Controls version 8 details cyber...
May 4, 2022 |
CIS Control 6: Access Control Management
The Center for Internet Security (CIS) publishes Critical Security Controls that help organization improve cybersecurity. In version 8, Control 6 addresses access control management (in previous versions, this topic was covered by a combination of Control 4 and Control 14).
Handpicked related...