CIS Benchmark Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
New Net Technologies has access to security configuration benchmarks from the Center for Internet Security (CIS). Click on a link below to find out more about these benchmarks and CIS benchmark hardening.
A panel of experts comprising Adam Montville, David Froud and Mark Kedgley collaborated on a variety of cyber-security issues at a roundtable discussion.
The Center for Internet Security has embarked on a new branding effort to reflect the new services, features, and partnerships they’ll be introducing to meet the cybersecurity needs of both global public and private organizations.
Target has agreed to pay $39.4 million to resolve claims by banks and credit unions that are said to have lost money because of the retailer’s notorious 2013 data breach.
Since the introduction of the Windows Advanced Audit Policy, fine-grain control has been provided to system activity auditing. This allows detailed auditing to be applied more precisely with unwanted events being suppressed at source. The audit policy settings work in conjunction with a 'System Access Control List' (SACL). The SACL is defined for each system object (e.g. folder, file etc) and defines the access attempts to be logged.
Recommended Linux audit security checklist guide Audit Policy settings for PCI DSS and other compliance standards – configuration settings for audit.d conf
Recommended Windows Audit Policy settings for PCI DSS and other compliance standards – Advanced Audit Policy templates for 2008R2, 2012R2, Server 2016 and Windows 10
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.