

Part 8/9 – we looked at Data Recovery and Security Training.Part 7 - we looked at Wireless Access Control.Part 6 - we looked at Application Security.Part 5 - we looked at Malware Defenses.Part 4 - we looked at Continuous Vulnerability Assessment and Remediation.Part 3 - we looked at Secure Configurations.Part 2 - we looked at Inventory of Authorized and Unauthorized Software.Part 1 - we looked at Inventory of Authorized and Unauthorized Devices.It is now known as the Center for Internet Security (CIS) Security Controls. This is Part 16 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with what was formerly known as the "SANS Top 20 Security Controls".
