Basic Center for Internet Security’s (CIS) Critical Security Controls Version 7.0

Rather than a lack of choices in security solutions, a major problem in cyber security is an inability to implement mature processes – many organizations lack a defined and repeatable process for selecting, implementing and monitoring the security controls that are most effective against real-world threats. Implementing the Center for Internet Security’s (CIS) Critical Security […]

New Model for Assessing and Planning Security: How 5th Generation Cyber Threats Grew and What to Do

Today’s 5th generation cyber attacks are the most advanced and destructive the world has seen. They are highly evasive and multi-vector. And, they are succeeding because most businesses are relying on second- and third-generation security systems that are typically composed of non-integrated, detect-only point products. A new approach is needed to ensure companies are secure […]