Intro to CIS CSC 2

Inventory and Control of Software Assets

Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that all unauthorized and unmanaged software is found and prevented from installation or execution.

Read More

CIS CSC v7.1 Control 2

 

Intro to CIS CSC 1

Inventory and Control of Hardware Assets

Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.

Read More

CIS CSC v7.1 Control 1-2

Teambuilding 101

Ingredients of an Effective Security Team

Cyber defense is a team sport with varied roles that need to be filled in a balanced way. Let’s take a high level look at what it takes to successfully orchestrate a security team.

Read More

Security Teams-1

Red vs Blue

The role of attackers and defenders in cyber teams

Strong security efforts combine the efforts of dedicated defenders and those assigned to test defenses. Learn about team colors.

Read More

Red vs Blue