CIS Benchmark Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
New Net Technologies has access to security configuration benchmarks from the Center for Internet Security (CIS). Click on a link below to find out more about these benchmarks and CIS benchmark hardening.
A panel of experts comprising Adam Montville, David Froud and Mark Kedgley collaborated on a variety of cyber-security issues at a roundtable discussion.
The Center for Internet Security has embarked on a new branding effort to reflect the new services, features, and partnerships they’ll be introducing to meet the cyber security needs of the both global public and private organizations.
Target has agreed to pay $39.4 million to resolve claims by banks and credit unions that are said to have lost money because of the retailer’s notorious 2013 data breach.
Since the introduction of the Windows Advanced Audit Policy, fine-grain control has been provided to system activity auditing. This allows detailed auditing to be applied more precisely with unwanted events being suppressed at source. The audit policy settings work in conjunction with a 'System Access Control List' (SACL). The SACL is defined for each system object (e.g. folder, file etc) and defines the access attempts to be logged.
Recommended Linux security audit checklist guide Audit Policy settings for PCI DSS and other compliance standards – configuration settings for audit.d conf
What are the recommended Audit Policy settings for Windows when implementing logging for the PCI DSS or other security standard?
Recommended Windows Audit Policy settings for PCI DSS and other compliance standards – Advanced Audit Policy templates for 2008R2, 2012R2, Server 2016 and Windows 10