Listen "7MS #284: The Quest for Critical Security Controls"
Episode Synopsis
For a long time I've been electronically in love with the Critical Security Controls. Not familiar with 'em? The CIS site describes them as: The CIS Controls are a prioritized set of actions that protect your critical systems and data from the most pervasive cyber attacks. They embody the critical first steps in securing the integrity, mission, and reputation of your organization. Cool, right? Yeah. And here are the top (first) 5 that many organizations start to tackle: Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges Google searches will show you that you can definitely buy expensive hardware/software to help you map to the CSCs, but I'm passionate about helping small businesses (and even home networks!) be more secure, so I'm on a quest to find implementable (if that's a word?) ways to put these controls in place. I'm focusing on control #1 to start, and I've heard great things about using Fingbox (not a sponsor) to get the job done, but I'm also exploring other free options, such as nmap + some scripting magic. More on today's episode...
More episodes of the podcast 7 Minute Security
7MS #710: I'm Taking a Break
17/01/2026
7MS #709: Second Impressions of Twingate
10/01/2026
7MS #708: Tales of Pentest Fail – Part 6
02/01/2026
7MS #706: Tales of Pentest Pwnage – Part 80
19/12/2025
7MS #705: A Phishing Campaign Fail Tale
12/12/2025
7MS #704: DIY Pentest Dropbox Tips – Part 12
05/12/2025
7MS #703: Tales of Pentest Pwnage – Part 79
28/11/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.