Author: Rich Johnson

October 21, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 4: Continuous Vulnerability Assessment & Remediation

This is Part 4 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with SANS’ Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. In Part 2 we looked at Inventory of Authorized and Unauthorized Software. In Part 3 we looked at Secure Configurations. Now we'll move…

October 12, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 3: Secure Configurations

This is Part 3 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with SANS’ Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. In Part 2 we looked at Inventory of Authorized and Unauthorized Software. Now we'll move on to Secure Configurations for Hardware and…

Get the latest security news in your inbox.

Subscribe via Email

September 16, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 2

This is Part 2 of a 'How-To' in an effort to compile a list of tools (free and commercial) that can help an IT administrator comply with the Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. The controls (ordered 1-20) are in order of importance. In other words, completing Control 1 will reduce the threat risk greater…

September 10, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 1

This is the first in a series about the tools available to implement the SANS Top 20 Security Controls. The subsequent parts available now are: Part 1 - we look at Inventory of Authorized and Unauthorized Devices. Part 2 - we look at Inventory of Authorized and Unauthorized Software. Part 3 - we look at Secure Configurations. Part 4 - we look at Continuous Vulnerability…

Watch a Demo ›
Get Price Free Trial