Another fundamental aspect of Cybersecurity is collecting logs. Whether you're using Windows, Linux, or Mac. Whether you're using Sophos XG Firewalls or Fortinet. Whether you're using Cisco Switches and routers or Brocade. Nearly
Every field has some fundamental law that every other aspect of the field builds upon. For Cybersecurity, that is the CIA triad, and no that's not for the Central Intelligence Agency.
CIA in
I wanted to start a series of posts on the basics of Cybersecurity. I am not going to go in any particular order, just whatever fits my fancy that particular time. I also
Before we get to deep into this topic, let's first discuss what the Center for Internet Security (CIS) 18 controls are, what Implementation Groups (IGs) are, and then we will discuss why every small business should work towards the CIS 18 IG1.
Welcome to my second post in this series! This post will focus on the second control of the CIS 18, which is the Inventory and Control of Software Assets.