CIS Critical Control 11: Secure Configurations for Network Devices
This blog is a continuation of our blog series on the CIS Critical Controls. We’ve now passed the halfway point in the CIS Critical Controls. The 11th deals with Secure Configurations for Network Devices. When we say network devices, we’re referring to firewalls,…
Defense in Depth - Embracing the Attacker Mindset - Followup
As a follow up to our webinar on Defense in Depth – Embracing the Attacker Mindset, I'd like to post my slide notes for the first section after Wade's intro. I apologize again for the audio issues. We did an hour of sound check beforehand,…