Insights
Cybersecurity information, thoughts and opinions you can actually use.
Blog
Providing insight, opinion and information to help define the problem, determine the solution and understand the cybersecurity landscape.
CIS Critical Security Control #4: Vulnerability Assessment & Remediation
3:30 min read | Vulnerabilities on Internet connected systems are targeted on a daily basis. The fourth CIS control addresses the need to keep them protected. "Continuous Vulnerability Assessment and Remediation" addresses keeping up with and fixing newly discovered...
CIS Critical Security Control #3: Secure Configurations
3:30 min read | The first two CIS Controls for Internet security address keeping an inventory of hardware and software. The third CIS Control deals with secure system configurations. Its central principle is that a strict process for change control and configuration...
CIS Critical Security Control #2: Inventory of Authorized & Unauthorized Software
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
CIS Critical Security Control #1: Inventory of Authorized & Unauthorized Devices
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
Maryland Cybersecurity Investment Incentive Tax Credit (CIITC)
1:45 min read Every once in a while in the annals of cybersecurity there is news that isn’t a warning about the newest breach or the release of the latest patch. In this case the news is good for Maryland buyers of cybersecurity. The General Assembly of Maryland, on...
CIS Critical Security Controls: The Essentials
1:35min read | We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement just the top 5 reduces known...
Corporate News
What’s going on with Anchor? These postings will give you a sense of what is happening with the organization, our team and give you a sense of our culture.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Upcoming Events
Anchor hosts numerous activities and events every year to grow the cybersecurity community, educate our clients and friends. Stay tuned here for what’s coming up.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Join Our Newsletter
True cybersecurity is a journey. Threats and vulnerabilities are ever evolving. Define your strategy, identify your risk, and manage that risk today — before its to late.