Month: April 2011

SANS 20 Critical IT Controls – #10: Continuous Vulnerability Assessment

Attackers are constantly are on the prowl for new vulnerabilities to exploit. You can expect hackers to launch numerous attacks right after vulnerabilities are discovered and announced. That is why it is important to apply vulnerability patches almost immediately after the vendor makes the patch available to you.

SANS 20 Critical Controls #9: Controlled Access Based on Need to Know

The first step you must take is to identify your sensitive data, by establishing a data identification scheme. A multi level data sensitivity classification based on the sensitive level of the data is especially useful.

In Archive