Defend against the most pervasive and dangerous cyber attacks also, means



I have a pleasure to recall that, the following recommendations and guidance when well-implemented across an organization; these controls deliver specific, actionable information that is necessary to defend against the most pervasive and dangerous cyber attacks. 

The recommendations and guidance include:
  • Accurate hardware inventory.
  • Accurate software inventory.
  • Continuous configuration management and hardening.
  • Comprehensive vulnerability management.
  • Patch management.
  • Log management.
  • Identity and access management.
In additions, before any damage is done, it is vital for organizations to identify indicators of compromise quickly so that appropriate action can be taken.

Popular Posts