![]() ![]() “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says. In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. These range from making an inventory of enterprise assets to account management to auditing logs. In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks-web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |