Defend against the most pervasive and dangerous cyber attacks also, means



I have a pleasure to recall that, the following recommendations and guidance when well-implemented across an organization; these controls deliver specific, actionable information that is necessary to defend against the most pervasive and dangerous cyber attacks. 

The recommendations and guidance include:
  • Accurate hardware inventory.
  • Accurate software inventory.
  • Continuous configuration management and hardening.
  • Comprehensive vulnerability management.
  • Patch management.
  • Log management.
  • Identity and access management.
In additions, before any damage is done, it is vital for organizations to identify indicators of compromise quickly so that appropriate action can be taken.