20 CIS Controls – Control 1: Inventory and Control of Hardware AssetsTravis SmithMay 2, 2018IT Security and Data Protection
20 CIS Controls: Control 3 – Continuous Vulnerability ManagementTyler RegulyApr 30, 2018IT Security and Data Protection
20 CIS Controls: Control 4 – Controlled Use of Administrative PrivilegesTravis SmithApr 26, 2018IT Security and Data Protection
20 CIS Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and ServersTravis SmithApr 19, 2018IT Security and Data Protection
20 CIS Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit LogsTravis SmithApr 18, 2018IT Security and Data Protection
20 CIS Controls: Control 7 – Email and Web Browser ProtectionsTravis SmithApr 17, 2018IT Security and Data Protection
20 CIS Controls: Control 10 – Data Recovery CapabilitiesTravis SmithApr 9, 2018IT Security and Data Protection
20 CIS Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and SwitchesTravis SmithApr 6, 2018IT Security and Data Protection
20 CIS Controls: Control 14 – Controlled Access Based on the Need to KnowTravis SmithApr 2, 2018IT Security and Data Protection
20 CIS Controls: Control 15 – Wireless Access ControlTravis SmithMar 28, 2018IT Security and Data Protection
20 CIS Controls: Control 16 – Account Monitoring and ControlTravis SmithMar 27, 2018IT Security and Data Protection
20 CIS Controls: Control 17 – Implement a Security Awareness and Training ProgramTravis SmithMar 26, 2018IT Security and Data Protection
20 CIS Controls: Control 19 – Incident Response and ManagementTravis SmithMar 21, 2018IT Security and Data Protection
20 CIS Controls: Control 20 – Penetration Tests and Red Team ExercisesTravis SmithMar 20, 2018Featured Articles
Some Stick & Rudder for Your Security Bread & ButterTripwire Guest AuthorsJul 1, 2014Risk-Based Security for Executives
Overcoming Internal Barriers to Adopting Cyber SecurityPrevious ContributorsJun 22, 2014Risk-Based Security for Executives
Demonstrating Enterprise Commitment to Best PracticeTripwire Guest AuthorsJun 18, 2014Risk-Based Security for Executives
Threat Mitigation and the 20 Critical Security Controls with Tony SagerPrevious ContributorsJun 5, 2014Risk-Based Security for Executives
Webinar: Tony Sager on How the 20 Critical Controls Address Real ThreatsPrevious ContributorsJun 1, 2014IT Security and Data Protection