Continuous Vulnerability Scanning Within Your Remote Network
by Danielle Corsa on May 7, 2020 at 1:45 PM
By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …
Security Concerns to Consider Amid Re-Opening
by CJ Hurd on April 29, 2020 at 1:00 PM
During this unprecedented time in our country, many companies are under strain due to the changing conditions in their workplace. Unemployment rates have now surpassed twenty percent, meaning many companies are now operating with much less staff than they were a couple of months ago.
COVID-19: Is Management Asking the Right Questions?
by Jerry Hughes on April 24, 2020 at 4:00 PM
What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …
The SANS Top 20, A Vulnerability Assessment, and Penetration Testing
by Geoff Yeagley on February 11, 2016 at 10:00 AM
The SANS Top 20 Critical Security Controls outline the 20 most critical controls that an organization should implement to ultimately reduce their overall risk of suffering a data breach. These controls were originally developed in 2008 by the NSA at the request of the Office of the Se …
IT Risk Assessment and the SANS Top 20 - Part I
by Geoff Yeagley on February 2, 2016 at 10:30 AM
Last week we discussed the SANS Top 20 Critical Security Controls (CSC), what they are, and where they came from. This week we are going to start to dig into a handful of the Critical Security Controls to discuss what they are and why these controls are so important. In fact, industry …
IT Risk Assessments and the SANS Top 20
by Geoff Yeagley on January 26, 2016 at 10:14 AM
No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.