Insights
Cybersecurity information, thoughts and opinions you can actually use.
Blog
Providing insight, opinion and information to help define the problem, determine the solution and understand the cybersecurity landscape.
CIS Critical Security Control #16: Account Monitoring and Control
3:30 min read | Account hijacking lets criminals impersonate employees and contractors. They can trick others into getting information and gain access to systems. It's especially dangerous when they get control of inactive accounts, since they might escape detection...
CIS Critical Security Control #15: Wireless Access Control
3:45 min read | Wireless access presents a special challenge for network security. A weak security implementation will allow intruders to gain an almost physical level of access; they may be able to bypass your firewall and directly connect to your information systems...
CIS Critical Security Control #14: Controlled Access Based on the Need to Know
2:45 min read | The fewer ways there are to reach information, the less risk there is of unauthorized access. This is the point of CIS Control #14, "Controlled Access Based on the Need to Know." This is closely related to Control #13, "Data Protection," but focuses on...
CIS Critical Security Control #13: Data Protection
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...
CIS Critical Security Control #12: Boundary Defense
3:30 min read | Defending network boundaries is an increasingly complicated and difficult task. Cloud services, remote access, and mobile devices can make it difficult to identify the exact boundaries of a network. CIS Control #12, which deals with the defense of...
CIS Critical Security Control #11: Secure Configurations for Network Devices such as Firewalls, Routers and Switches
3:30 min read | Firewalls, routers, and switches play a critical role in network security. How well they succeed depends on the level of attention administrators pay to their configuration. CIS Control #11 addresses the need to configure network devices carefully and...
Corporate News
What’s going on with Anchor? These postings will give you a sense of what is happening with the organization, our team and give you a sense of our culture.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Upcoming Events
Anchor hosts numerous activities and events every year to grow the cybersecurity community, educate our clients and friends. Stay tuned here for what’s coming up.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Join Our Newsletter
True cybersecurity is a journey. Threats and vulnerabilities are ever evolving. Define your strategy, identify your risk, and manage that risk today — before its to late.