by Tim Marley Over the course of my career, and particularly in the last five to ten years, the topic…
CIS IG1 Control 2.3 — Why Unauthorized Software Is a Hidden Threat Lurking on “Trusted” Devices
Most organizations assume that corporate devices only run approved software. In reality, that assumption is often wrong. Users are inherently…
CIS IG1 Control 2.2 — Why Running Supported Software Is a Security Requirement, Not an IT Preference
Most security conversations focus on what software exists in an environment. CIS Control 2.2 pushes the conversation one step further…
CIS IG1 Spotlight: Why a Software Inventory Is More Than a Security Requirement
One of the themes we keep hitting in the CIS IG1 series is simple: you can’t protect what you don’t…
CIS IG1 Control 1.2: Why Addressing Unauthorized Assets Matters—and How to Do It Easily
When we kicked off this series with Control 1.1: Establish and Maintain a Detailed Enterprise Asset Inventory, we focused on…
CIS IG1 Control 1.1: Establish and Maintain a Detailed Enterprise Asset Inventory
By Heath Gieson If you don’t know what you have, how can you protect it? That simple question is why…