IT Security and Compliance Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
- Category: CIS Controls
This article focuses on CIS Control 1: Inventory and Control of Hardware Assets and the eight requirements associated with the first of the twenty CIS Controls.
- Category: CIS Controls
This article delves into CIS Control 2: Inventory and Control of Software Assets and the ten sub controls associated with the second basic CIS Control.
- Category: CIS Controls
This article breaks down CIS Control 3: Continuous Vulnerability Management and the seven sub controls associated with the third basic security control.
- Category: CIS Controls
This article highlights CIS Control 4: Controlled Use of Administrative Privileges and the nine requirements associated with the fourth basic CIS Control.
- Category: CIS Controls
The default configuration settings for most platforms, applications and devices are optimized for ease of use and deployment, not security.
- Category: CIS Controls
This article breaks down the sixth and final basic CIS Control, CIS Control 6: Maintenance, Monitoring and Analysis of Audit Logs.
- Category: CIS Controls
This article breaks for the seventh CIS Control which represents the first Foundational CIS Control (Controls 7-16).
- Category: CIS Controls
This article breaks down CIS Control 8 and the eight sub-controls associated with the second Foundational CIS Control.
- Category: CIS Controls
This article delves into CIS Control 9 and the five sub-controls associated with the third Foundational CIS Control.
- Category: CIS Controls
This article breaks down CIS Control 10 and the five sub controls associated with the third foundational security control.
- Disable Windows Services
- What are the recommended Audit Policy settings for Windows & Linux
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- File Integrity Monitoring Software
- Windows Server 2008 2008R2 Hardening Guide
- Linux Server Hardening
- The Windows Advanced Audit Policy Configuration
- The Top Ten of Audit and Event Log Monitoring
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?