Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #851 to #900.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. CIS - 9.2 - Protect - Network - Use DNS Filtering Services‏‎ (1 member)
  2. PR.DS-5: Protections against data leaks are implemented‏‎ (1 member)
  3. CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory‏‎ (1 member)
  4. Business Accounts with Suppliers‏‎ (1 member)
  5. SMS or Text Messaging to Receive Codes‏‎ (1 member)
  6. CIS - 6.2 - Protect - Users - Establish an Access Revoking Process‏‎ (1 member)
  7. CIS - 8.12 - Detect - Data - Collect Service Provider Logs‏‎ (1 member)
  8. CIS - 8.4 - Protect - Network - Standardize Time Synchronization‏‎ (1 member)
  9. CIS - 16.14 - Protect - Applications - Conduct Threat Modeling‏‎ (1 member)
  10. CIS - 11.2 - Recover - Data - Perform Automated Backups‏‎ (1 member)
  11. CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components‏‎ (1 member)
  12. CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date‏‎ (1 member)
  13. Identity as a Service (IDaaS)‏‎ (1 member)
  14. What is Digital Currency?‏‎ (1 member)
  15. Online Reputation Management‏‎ (1 member)
  16. DE.AE-5: Incident alert thresholds are established‏‎ (1 member)
  17. Removing Data from the Internet‏‎ (1 member)
  18. Centralized Exchange Account Recovery‏‎ (1 member)
  19. ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis‏‎ (1 member)
  20. PR.IP-1: A baseline configuration of information technology or industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)‏‎ (1 member)
  21. Donation Card Dip Stations‏‎ (1 member)
  22. What are Digital Wallets?‏‎ (1 member)
  23. Debit Cards‏‎ (1 member)
  24. ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated‏‎ (1 member)
  25. Legal Considerations in Incident Response‏‎ (1 member)
  26. CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program‏‎ (1 member)
  27. CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process‏‎ (1 member)
  28. CIS - 2.3 - Respond - Applications - Address Unauthorized Software‏‎ (1 member)
  29. CIS - 3.1 - Identify - Data - Establish and Maintain a Data Management Process‏‎ (1 member)
  30. CIS - 17.9 - Recover - Establish and Maintain Security Incident Thresholds‏‎ (1 member)
  31. CIS - 3.5 - Protect - Data - Securely Dispose of Data‏‎ (1 member)
  32. CIS - 13.5 - Protect - Devices - Manage Access Control for Remote Assets‏‎ (1 member)
  33. CIS - 2.7 - Protect - Applications - Allowlist Authorized Scripts‏‎ (1 member)
  34. CIS - 3.6 - Protect - Devices - Encrypt Data on End-User Devices‏‎ (1 member)
  35. CIS - 17.5 - Respond - Assign Key Roles and Responsibilities‏‎ (1 member)
  36. CIS - 14.8 - Protect - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks‏‎ (1 member)
  37. CIS - 7.4 - Protect - Applications - Perform Automated Application Patch Management‏‎ (1 member)
  38. CIS - 9.1 - Protect - Applications - Ensure Use of Only Fully Supported Browsers and Email Clients‏‎ (1 member)
  39. CIS - 10.3 - Protect - Devices - Disable Autorun and Autoplay for Removable Media‏‎ (1 member)
  40. CIS - 14.5 - Protect - Train Workforce Members on Causes of Unintentional Data Exposure‏‎ (1 member)
  41. CIS - 6.1 - Protect - Users - Establish an Access Granting Process‏‎ (1 member)
  42. CIS - 12.6 - Protect - Network - Use of Secure Network Management and Communication Protocols‏‎ (1 member)
  43. CIS Controls - v8.0‏‎ (1 member)
  44. CIS - 5.5 - Identify - Users - Establish and Maintain an Inventory of Service Accounts‏‎ (1 member)
  45. CIS - 8.3 - Protect - Network - Ensure Adequate Audit Log Storage‏‎ (1 member)
  46. CIS - 3.7 - Identify - Data - Establish and Maintain a Data Classification Scheme‏‎ (1 member)
  47. CIS - 9.5 - Protect - Network - Implement DMARC‏‎ (1 member)
  48. CIS - 4.6 - Protect - Network - Securely Manage Enterprise Assets and Software‏‎ (1 member)
  49. CIS - 1.4 - Identify - Devices - Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory‏‎ (1 member)
  50. CIS - 2.2 - Identify - Applications - Ensure Authorized Software is Currently Supported‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)