Controls

To Protect Your Network, You Must First Know Your Network

Strong security starts with understanding exactly what you need to protect and where it resides within your organization.
December 13, 2017
1 min. read

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least cited control, with only 16% of CISOs leveraging it. Some may consider inventory an IT responsibility, not a security responsibility, but this is a serious oversight. Building and maintaining an accurate asset inventory is the foundation for the security team’s work. Let’s explore why….

 

Read the full article published December 1, 2017 here: https://www.helpnetsecurity.com/2017/12/01/strong-security-starts/ by Help Net Security.

Authors & Contributors
Raymond Pompon (Author)

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read