
This publication is designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture, covering topics such as:
- Secure Configurations for Hardware and Software
- Continuous Vulnerability Assessment and Remediation
- Controlled Use of Administrative Privileges
- Maintenance, Monitoring, and Analysis of Audit Logs
The author, a respected security executive, distills each of the 20 controls down to their key takeaways with illustrative examples, and recommends management actions that readers can follow up with in their organizations.
|
|
|
Climbing the Vulnerability Management Mountain
In the first of this new series, we look at the path to vulnerability management excellence. Like climbing a mountain, there is a lot of planning and work required, but when you get to the top, the view is amazing and well worth the journey.
|
|
|
|
|
To Air-Gap or Not Air-Gap Industrial Control Networks
Over the years, many networks in many different verticals from governments, military, financial services, nuclear power plants and industrial manufacturing, to name a few, have been so-called “air-gapped.” Take a look at the pros and cons.
|
|
|
|
|
The 7 Habits of Highly Effective Vulnerability Management
How do you know your vulnerability management program is effective? In order to shed some light on that question, we take a look at seven habits of highly effective VM programs.
|
|
|
|
The State of Security now publishes a daily digest to help you stay informed on all the latest security threats and trends. Save time by letting the best security news and featured content come to you!
|
|
|
|
|