Towerwall's InfoSec Blog

Content Type

See all

Always be Prepared: Monitor, Analyze and Test your Security

Center for Internet Security (CIS) , Incident Response and Management , 20 Critical Security Controls , web application security , Penetration Tests , Application Software Security , open-source software , Red Team Exercises , CIS Controls , Compliance & Privacy , penetration testing , OWASP , cannabis , Enterprise

Michelle Drolet

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20 This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussedfalse

3 Ways to Protect Data and Control Access to It

Center for Internet Security (CIS) , private sector , Wireless Access Control , human error encryption , public sector , authentication , cannabis , cybersecurity , Enterprise

Michelle Drolet

Your company's data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you. Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The Critical Security Controls are best practices devised by the Center for Internet Security (CIS), a nonprofit dedicated to improving cybersecurity in the public and private sectors. A company’sfalse