Ascent Portal StaffApr 26, 20221 min readInformation Exchange ProtectionThe exchange of information performed by organizations must be protected with appropriate security controls. These controls need to be...
Ascent Portal StaffApr 18, 20222 min readNetwork Security Boundaries and ControlsNetwork-level security boundaries and controls cannot be ignored as they protect against intrusions, data exploitation, and support the...
Ascent Portal StaffApr 10, 20222 min readSecurity Boundary Defense SolutionsSecurity boundary defense solutions should be leveraged to protect organizations from the infiltration or exfiltration of data by bad...
Ascent Portal StaffApr 4, 20222 min readProcess for Implementing Different Types of Penetration TestingPenetration testing can be a daunting undertaking for organizations, but it is generally required for achieving and maintaining...
Ascent Portal StaffMar 28, 20222 min readCybersecurity ControlsThe term “cybersecurity” certainly has demonstrated longevity as a powerful buzzword for organizations across all industries, in all...
Ascent Portal StaffMar 21, 20222 min readProtect your Information Systems with Flaw RemediationFlaw remediation and fault logging capabilities help to ensure an organization’s information systems, including applications, continue to...
Ascent Portal StaffMar 15, 20222 min readSecurity Logging Tools for Information ProtectionThe confidentiality, integrity, and availability of security logging must be protected. Implementing controls for security logging of...
Ascent Portal StaffMar 9, 20222 min readAudit Logs Best Practices for SecurityAudit logs are key to monitoring for unauthorized activities, insider threats, and issues that may be affecting system performance. The...
Ascent Portal StaffMar 1, 20221 min readVulnerability Management ToolsMany organizations struggle with identifying and patching all vulnerabilities. Legacy systems that cannot be patched without impacting...
Ascent Portal StaffFeb 22, 20222 min readConfiguration Backup StrategyIf organizations do not effectively maintain regular backups of systems, configurations, and information, they are not likely to have the...