Controls

To Protect Your Network, You Must First Know Your Network

Strong security starts with understanding exactly what you need to protect and where it resides within your organization.
December 13, 2017
1 min. read

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least cited control, with only 16% of CISOs leveraging it. Some may consider inventory an IT responsibility, not a security responsibility, but this is a serious oversight. Building and maintaining an accurate asset inventory is the foundation for the security team’s work. Let’s explore why….

 

Read the full article published December 1, 2017 here: https://www.helpnetsecurity.com/2017/12/01/strong-security-starts/ by Help Net Security.

Join the Discussion
Authors & Contributors
Raymond Pompon (Author)

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
article 13 min. read
What Is Access Control?
What Is Access Control?
article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
article 13 min. read