Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page
CIS CONTROL #20: Penetration Tests and Red Team Exercises

CIS CONTROL #20: Penetration Tests and Red Team Exercises

by Perry Lynch | Jan 3, 2020 | Blog, CIS Critical Security Controls

4:00 min read | The CIS controls have covered basic network practices, user and account management, software protection, hardware issues, and human concerns. In the end, the question remains, do these measures adequately prevent or combat hostile actions? Being...
CIS Critical Security Control #13: Data Protection

CIS Critical Security Control #13: Data Protection

by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls

4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...

Recent Posts

  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust

Categories

Tags

account theft Administrative Privileges assessment authorized CIS control CMMC CMMC Compliance Compliance Compromise configuration Cyber culture at work Data Data Loss Prevention Data Protection Department of Defense devices DoD Email Encryption Ethical Hack exploit Firewall gap analysis human security risk Integrity inventory myCYPR Network Device password patching penetration test phishing Risk Management Risk Rating RSA Conference scan Security Control software Test third-party third-party risk unauthorized Vendor security vulnerability vulnerability scanning
Tweets by Path2Protection
  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust
  • Compliance Management via the Calendar and Automation
  • Creating a Culture of Cybersecurity at Work
  • What are Cybersecurity Risk Ratings?
  • Physical Security and Cyber Risk Management

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

Privacy Policies

BREACH RESPONSE HOTLINE: breach@anchortechnologies.com 866.841.0777, option #8

  • Facebook
  • Twitter