<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic network hygeine and security fundamentals  prevent the vast majority of cyber incidents in Welcome</title>
    <link>https://community.isc2.org/t5/Welcome/Basic-network-hygeine-and-security-fundamentals-prevent-the-vast/m-p/4230#M260</link>
    <description>&lt;P&gt;I often say that if an organization doesn't do the first five critical security controls, the other 15 don't really matter.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For an interesting addition to that, Rob Joyce, the head of NSA's Tailored Access Operations (TAO) delivered a rare public talk at the USENIX Enigma conference in 2016. The major takeaway from that is that application whitelisting is that "one thing" that dramatically raises the cost of successfully prosecuting an attack, even for state sponsored actors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A video of that talk can be found here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=bDJb8WOJYdA" target="_blank"&gt;https://www.youtube.com/watch?v=bDJb8WOJYdA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Dec 2017 16:46:12 GMT</pubDate>
    <dc:creator>Badfilemagic</dc:creator>
    <dc:date>2017-12-11T16:46:12Z</dc:date>
    <item>
      <title>Basic network hygeine and security fundamentals  prevent the vast majority of cyber incidents</title>
      <link>https://community.isc2.org/t5/Welcome/Basic-network-hygeine-and-security-fundamentals-prevent-the-vast/m-p/4224#M259</link>
      <description>&lt;P&gt;The seemingly daily cyber incidents&amp;nbsp;and and data breaches we read about reinforce&amp;nbsp;the need to adhere to basic network hygiene and security fundamentals. Event the most technically proficient exploit is usually foiled through comprehensive system patching, permissions and user rights management, and a team&amp;nbsp;well trained in the basics. see more at&amp;nbsp;&lt;A href="http://managethenet.blogspot.com" target="_blank"&gt;http://managethenet.blogspot.com&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:22:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Basic-network-hygeine-and-security-fundamentals-prevent-the-vast/m-p/4224#M259</guid>
      <dc:creator>StevenJ6052</dc:creator>
      <dc:date>2023-10-09T08:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Basic network hygeine and security fundamentals  prevent the vast majority of cyber incidents</title>
      <link>https://community.isc2.org/t5/Welcome/Basic-network-hygeine-and-security-fundamentals-prevent-the-vast/m-p/4230#M260</link>
      <description>&lt;P&gt;I often say that if an organization doesn't do the first five critical security controls, the other 15 don't really matter.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For an interesting addition to that, Rob Joyce, the head of NSA's Tailored Access Operations (TAO) delivered a rare public talk at the USENIX Enigma conference in 2016. The major takeaway from that is that application whitelisting is that "one thing" that dramatically raises the cost of successfully prosecuting an attack, even for state sponsored actors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A video of that talk can be found here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=bDJb8WOJYdA" target="_blank"&gt;https://www.youtube.com/watch?v=bDJb8WOJYdA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 16:46:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Basic-network-hygeine-and-security-fundamentals-prevent-the-vast/m-p/4230#M260</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2017-12-11T16:46:12Z</dc:date>
    </item>
  </channel>
</rss>

