Most linked-to categories
From GCA ACT
Jump to navigationJump to search
Showing below up to 50 results in range #601 to #650.
- Switches (1 member)
- PR.AT-4: Senior executives understand their roles and responsibilities (1 member)
- ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners (1 member)
- Encryption Keys (1 member)
- PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools (1 member)
- DE.DP-4: Event detection information is communicated (1 member)
- NIST CSF v1.1 (1 member)
- CIS - 3.4 - Protect - Data - Enforce Data Retention (1 member)
- Reporting (1 member)
- RS.IM-2: Response strategies are updated (1 member)
- DE.AE-2: Detected events are analyzed to understand attack targets and methods (1 member)
- Decentralized Exchange Account Recovery (1 member)
- BYOD Policy Implementation (1 member)
- PR.AT-2: Privileged users understand their roles and responsibilities (1 member)
- Business AI Chatbots (1 member)
- Cash Registers (1 member)
- CIS - 8.6 - Detect - Network - Collect DNS Query Audit Logs (1 member)
- CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory (1 member)
- CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software (1 member)
- CIS - 9.6 - Protect - Network - Block Unnecessary File Types (1 member)
- CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents (1 member)
- CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process (1 member)
- CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work (1 member)
- RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) (1 member)
- CIS - 14.3 - Protect - Train Workforce Members on Authentication Best Practices (1 member)
- CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software (1 member)
- CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution (1 member)
- CIS - 5.3 - Respond - Users - Disable Dormant Accounts (1 member)
- CIS - 9.7 - Protect - Network - Deploy and Maintain Email Server Anti-Malware Protections (1 member)
- CIS - 18.4 - Protect - Network - Validate Security Measures (1 member)
- Business Accounts with Suppliers (1 member)
- CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews (1 member)
- CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory (1 member)
- SMS or Text Messaging to Receive Codes (1 member)
- Identity as a Service (IDaaS) (1 member)
- Software as a Service (SaaS) (1 member)
- Kenya (1 member)
- Decentralized Transaction Mixer (1 member)
- Risks in Play-to-Earn Games (1 member)
- Security Testing (1 member)
- Customer Authentication (1 member)
- CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts (1 member)
- CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments (1 member)
- Removing Data from the Internet (1 member)
- Centralized Exchange Account Recovery (1 member)
- Donation Card Dip Stations (1 member)
- What are Digital Wallets? (1 member)
- Debit Cards (1 member)
- Legal Considerations in Incident Response (1 member)
- Online Reputation Management (1 member)