Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » Internet Security

CIS Benchmarks Volunteer Spotlight: Nancy Hidy Wilson

CIS Benchmarks Volunteer Spotlight: Nancy Hidy Wilson

More than 9,000 members of the CIS Benchmarks Community have developed and updated CIS Benchmarks for over 150 technologies. Our latest community interview is with CIS Benchmarks volunteer Nancy Hidy…

Top 10 Malware August 2018

Top 10 Malware August 2018

In August, malware activity decreased 20%, a change that was primarily driven by the 26% drop in the Top 10 Malware. In turn, the decline in Top 10 Malware activity…

The Chaos Experiment

The Chaos Experiment

By Sean Atkinson, Chief Information Security Officer Progression through development operation methods means introducing new elements that are assigned to break functionality rather than to confirm it. The chaos principles…

DevSecOps – An Integrated Approach to Coding Security

DevSecOps – An Integrated Approach to Coding Security

By Sean Atkinson, Chief Information Security Officer As the world requires more code, more applications, more interfaces, and more digital services, the coding pipeline must scale to industrial manufacturing levels.…

Albert: A Smart Solution for Network Monitoring

Albert: A Smart Solution for Network Monitoring

The world of network monitoring can seem a bit intimidating at first. There are a variety of solutions on the market offering to detect, alert, and mitigate your IT infrastructure…

CIS RAM and Use with Regulatory Frameworks

CIS RAM and Use with Regulatory Frameworks

By Chris Cronin, Partner, HALOCK Security Labs CIS RAM is an information security risk assessment method that helps organizations conduct cyber risk assessments. You can use CIS RAM’s step-by-step instructions,…

CIS RAM and Use with Regulatory Frameworks

CIS RAM and Use with Regulatory Frameworks

By Chris Cronin, Partner, HALOCK Security Labs CIS RAM is an information security risk assessment method that helps organizations conduct cyber risk assessments. You can use CIS RAM’s step-by-step instructions,…

CIS-CAT Pro Dashboard 1.1.3. Update – What You Need to Know

CIS-CAT Pro Dashboard 1.1.3. Update – What You Need to Know

This week, CIS SecureSuite® Members are receiving an update to CIS-CAT Pro Dashboard. CIS-CAT Pro Dashboard is the companion tool to CIS-CAT Pro Assessor. It consumes configuration assessment results and…

CIS-CAT Pro Dashboard 1.1.3. Update – What You Need to Know

CIS-CAT Pro Dashboard 1.1.3. Update – What You Need to Know

This week, CIS SecureSuite® Members are receiving an update to CIS-CAT Pro Dashboard. CIS-CAT Pro Dashboard is the companion tool to CIS-CAT Pro Assessor. It consumes configuration assessment results and…

Cumulonimbus Clouds Drift…Your Cloud Configuration Shouldn’t

Cumulonimbus Clouds Drift…Your Cloud Configuration Shouldn’t

Drifting is all good and well for the clouds in the sky, but when it comes to cloud computing, users should look out for configuration drift. A fully hardened server…

Page 1 of 8123Next ›Last »