Cybersecurity, Secure IT operations, Tech Insights, Uncategorized CIS IG1 Control 2.3 — Why Unauthorized Software Is a Hidden Threat Lurking on “Trusted” Devices Andrew Scott February 3, 2026
Cybersecurity, Secure IT operations, Tech Insights, Uncategorized CIS IG1 Control 2.2 — Why Running Supported Software Is a Security Requirement, Not an IT Preference Andrew Scott January 28, 2026
Cybersecurity, Secure IT operations, Tech Insights, Uncategorized CIS IG1 Spotlight: Why a Software Inventory Is More Than a Security Requirement Heath Gieson January 22, 2026
Cybersecurity, Secure IT operations, Tech Insights CIS IG1 Control 1.2: Why Addressing Unauthorized Assets Matters—and How to Do It Easily Heath Gieson January 15, 2026
Cybersecurity, Secure IT operations, Tech Insights CIS IG1 Control 1.1: Establish and Maintain a Detailed Enterprise Asset Inventory Heath Gieson January 5, 2026
Cybersecurity, Secure IT operations, Tech Insights CISOs’ Security Priorities: The Augmented Cyber Agenda—and How Forthright Is Leading the Way Heath Gieson January 2, 2026