Looking past Shiny Objects and Fatigue to Fight Cyberthreats
May 9, 2017
Article recommends the CIS Controls.
“The most effective defenses against these attack vectors are the most foundational security controls. Whether you choose to implement a framework like NIST’s Cybersecurity Framework, or implement best practice controls like those from the Center for Internet Security, the basic groundwork of defending a network doesn’t change.”