Another fundamental aspect of Cybersecurity is collecting logs. Whether you're
using Windows, Linux, or Mac. Whether you're using Sophos XG Firewalls or
Fortinet. Whether you're using Cisco Switches and routers or Brocade. Nearly
Every field has some fundamental law that every other aspect of the field builds
upon. For Cybersecurity, that is the CIA triad, and no that's not for the
Central Intelligence Agency.
CIA in
I wanted to start a series of posts on the basics of Cybersecurity. I am not
going to go in any particular order, just whatever fits my fancy that particular
time. I also
Before we get to deep into this topic, let's first discuss what the Center for Internet Security (CIS) 18 controls are, what Implementation Groups (IGs) are, and then we will discuss why every small business should work towards the CIS 18 IG1.
Welcome to my second post in this series! This post will focus on the second control of the CIS 18, which is the Inventory and Control of Software Assets.