Mapping Your Way To Compliance With Cybersecurity Frameworks
BrandPost CIS

Mapping Your Way To Compliance With Cybersecurity Frameworks

Make cybersecurity program work more efficiently by "mapping" frameworks to security resources

Managing Your Cybersecurity Program for the Win
BrandPost CIS

Managing Your Cybersecurity Program for the Win

Discover how the right tool helps save time, prevents errors, offers transparency, and measures compliance

Remediate Insecure Configurations to Improve Cybersecurity
BrandPost CIS

Remediate Insecure Configurations to Improve Cybersecurity

With CIS, translate cyber threat information into action while saving time

How Configuration Assessments Help Improve Cyber Defenses
BrandPost CIS

How Configuration Assessments Help Improve Cyber Defenses

Assessing Regularly is the Key to Reducing Risk from Poorly Configured Systems

Getting a Grip on Basic Cyber Hygiene with the CIS Controls
BrandPost CIS

Getting a Grip on Basic Cyber Hygiene with the CIS Controls

Guidelines will help distinguish the ‘should’ from the ‘must-do’ precautions

3 Key Elements of a Strong Cybersecurity Program
BrandPost CIS

3 Key Elements of a Strong Cybersecurity Program

Know what you have, focus on endpoints, and stay in compliance

Configuration Security for Remote Endpoints with CIS-CAT Pro
BrandPost CIS

Configuration Security for Remote Endpoints with CIS-CAT Pro

Check out these resources to automate your configuration review

2021 Cybersecurity Trends to Prepare For
BrandPost CIS

2021 Cybersecurity Trends to Prepare For

Read why Zero Trust, Remote Work, Ransomware, are Privacy Top of Mind for these Experts

How to Scan Remote Endpoints From Wherever You Are
BrandPost CIS

How to Scan Remote Endpoints From Wherever You Are

Discover this secure way to measure security against standard benchmarks — from anywhere

20 Years of Creating Confidence in the Connected World
BrandPost CIS

20 Years of Creating Confidence in the Connected World

From a Handful of People to a Movement

The Tool Every Organization Needs to Implement Secure Configurations Faster
BrandPost CIS

The Tool Every Organization Needs to Implement Secure Configurations Faster

Three Tips for Success Adopting and Using Security Benchmarks

How to Improve Your Organization’s Cyber Hygiene
BrandPost CIS

How to Improve Your Organization’s Cyber Hygiene

Self-Assessment tool simplifies access to powerful security best practices

Cyber Hygiene Matters, and So Do Definitions
BrandPost CIS

Cyber Hygiene Matters, and So Do Definitions

In an earlier article, I wrote about the importance of cyber hygiene and offered up a specific definition of basic cyber hygiene based on CIS Controls Implementation Group 1. I’d like to expand a bit on why having a clear-cut...

The Tool to Help Track and Manage Your Cybersecurity Program
BrandPost CIS

The Tool to Help Track and Manage Your Cybersecurity Program

If you‘re a cybersecurity professional, you’ve likely heard of the consensus-driven best practices known as the CIS Controls. You may have even implemented them! But to what extent? How confident are you in your implementation,...

Top Videoconferencing Attacks and Security Best Practices
BrandPost CIS

Top Videoconferencing Attacks and Security Best Practices

Videoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technology has also attracted nefarious characters whose motivations can range from simple...

How to Defend Against Today’s Top 5 Cyber Threats
BrandPost CIS

How to Defend Against Today’s Top 5 Cyber Threats

Knowing the Threats is not enough; Discover resources to keep you safe

The Journey to Better Cybersecurity in 2020 and Beyond
BrandPost CIS

The Journey to Better Cybersecurity in 2020 and Beyond

The year 2020 will be remembered as the time when widespread Internet-enabled remote working became a reality. IT administrators saw their responsibilities increase dramatically as enterprise scrambled to provide organizational...

The Resources You Need for Your Next Cybersecurity Compliance Audit
BrandPost CIS

The Resources You Need for Your Next Cybersecurity Compliance Audit

Reading a list of cybersecurity compliance frameworks is like looking at alphabet soup: NIST CSF, PCI DSS, HIPAA, FISMA, GDPR…the list goes on. It’s easy to be overwhelmed, and not only because of the acronyms. Many frameworks do...

CIS Password Policy Guide: Passphrases, Monitoring, and More
BrandPost CIS

CIS Password Policy Guide: Passphrases, Monitoring, and More

Love them or hate them, but passwords are a time-tested and imperfect method for user authentication that can protect organizations from cyber-attacks if used correctly. To be truly effective however, an organization's password...

How to Overcome the Cybersecurity Challenges of a Remote Workforce
BrandPost CIS

How to Overcome the Cybersecurity Challenges of a Remote Workforce

IT teams have spent recent months supporting staff at their organizations who work from home. Unexpected cybersecurity challenges related to patch management and new or expanded remote access vulnerabilities are two of the...

Load More