Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #601 to #650.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. Switches‏‎ (1 member)
  2. PR.AT-4: Senior executives understand their roles and responsibilities‏‎ (1 member)
  3. ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners‏‎ (1 member)
  4. Encryption Keys‏‎ (1 member)
  5. PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools‏‎ (1 member)
  6. DE.DP-4: Event detection information is communicated‏‎ (1 member)
  7. NIST CSF v1.1‏‎ (1 member)
  8. CIS - 3.4 - Protect - Data - Enforce Data Retention‏‎ (1 member)
  9. Reporting‏‎ (1 member)
  10. RS.IM-2: Response strategies are updated‏‎ (1 member)
  11. DE.AE-2: Detected events are analyzed to understand attack targets and methods‏‎ (1 member)
  12. Decentralized Exchange Account Recovery‏‎ (1 member)
  13. BYOD Policy Implementation‏‎ (1 member)
  14. PR.AT-2: Privileged users understand their roles and responsibilities‏‎ (1 member)
  15. Business AI Chatbots‏‎ (1 member)
  16. Cash Registers‏‎ (1 member)
  17. CIS - 8.6 - Detect - Network - Collect DNS Query Audit Logs‏‎ (1 member)
  18. CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory‏‎ (1 member)
  19. CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software‏‎ (1 member)
  20. CIS - 9.6 - Protect - Network - Block Unnecessary File Types‏‎ (1 member)
  21. CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents‏‎ (1 member)
  22. CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process‏‎ (1 member)
  23. CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work‏‎ (1 member)
  24. RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)‏‎ (1 member)
  25. CIS - 14.3 - Protect - Train Workforce Members on Authentication Best Practices‏‎ (1 member)
  26. CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software‏‎ (1 member)
  27. CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution‏‎ (1 member)
  28. CIS - 5.3 - Respond - Users - Disable Dormant Accounts‏‎ (1 member)
  29. CIS - 9.7 - Protect - Network - Deploy and Maintain Email Server Anti-Malware Protections‏‎ (1 member)
  30. CIS - 18.4 - Protect - Network - Validate Security Measures‏‎ (1 member)
  31. Business Accounts with Suppliers‏‎ (1 member)
  32. CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews‏‎ (1 member)
  33. CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory‏‎ (1 member)
  34. SMS or Text Messaging to Receive Codes‏‎ (1 member)
  35. Identity as a Service (IDaaS)‏‎ (1 member)
  36. Software as a Service (SaaS)‏‎ (1 member)
  37. Kenya‏‎ (1 member)
  38. Decentralized Transaction Mixer‏‎ (1 member)
  39. Risks in Play-to-Earn Games‏‎ (1 member)
  40. Security Testing‏‎ (1 member)
  41. Customer Authentication‏‎ (1 member)
  42. CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts‏‎ (1 member)
  43. CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments‏‎ (1 member)
  44. Removing Data from the Internet‏‎ (1 member)
  45. Centralized Exchange Account Recovery‏‎ (1 member)
  46. Donation Card Dip Stations‏‎ (1 member)
  47. What are Digital Wallets?‏‎ (1 member)
  48. Debit Cards‏‎ (1 member)
  49. Legal Considerations in Incident Response‏‎ (1 member)
  50. Online Reputation Management‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)