http://www.sans.org/critical-security-controls/control.php?id=5 The next control on the list is boundary defence. It has been recognised by many organisations that protecting the perimeter, whilst important, is no longer what it is all about. Many organisations have what what we generally consider a hard crunchy outside and a soft squishy centre. The “internal”…
Critical Control 2
From a support point of view, when someone calls the Helpdesk with a “there’s something going on with my pc” question, very early in the process you’ll want to know what is installed on that computer, and then what versions of each installed application. It’s also handy to know *when*…
Cyber Security Awarness Month Day 3 – Critical Control 2
From a support point of view, when someone calls the Helpdesk with a “there’s something going on with my pc” question, very early in the process you’ll want to know what is installed on that computer, and then what versions of each installed application. It’s also handy to know *when*…
What are the 20 Critical Controls?, (Mon, Oct 3rd)
[the following is a guest diary contributed by Dr. Eric Cole] One of the questions I often receive is what are the twenty critical controls. Details can be found at www.sans.org/cag but the general approach of the controls is to begin the process of establishing the prioritized baseline of information…
Amazon Web Services receives critical gov’t certification
IDG News Service – Amazon on Thursday said that many of its Web services now have a crucial certification that allows federal government agencies with strict security requirements to use the services. Amazon’s Elastic Compute Cloud, Simple Storage Service and Virtual Private Cloud have all received Federal Information Security Management…
2011-08-19 – SANS Announces the Release of a Major Update to the 20 Critical Controls
SANS Announces the Release of a Major Update to the 20 Critical Controls View full post on SANS Press Room Other links you may like: Check out Gregory Evans on Entertainment Tonight http://www.youtube.com/no1hacker#p/u/1/t0Jyf3cWqoA, LocatePC, Fake Emails go to SPOOFEM.COM, LIGATT Security, Hacker Gear OnlineStolen Computer Alert View full post on…