Passive asset discovery tools and free SANS tools explained

August 9, 2019 | Rich Johnson

Author: Rich Johnson

October 26, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 5: Malware Defenses

This is Part 5 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with SANS’ Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. In Part 2 we looked at Inventory of Authorized and Unauthorized Software. In Part 3 we looked at Secure Configurations. In Part 4 we looked at…

October 21, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 4: Continuous Vulnerability Assessment & Remediation

This is Part 4 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with SANS’ Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. In Part 2 we looked at Inventory of Authorized and Unauthorized Software. In Part 3 we looked at Secure Configurations. Now we'll move on to…

Get the latest security news in your inbox.

Subscribe via email

RSS

October 12, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 3: Secure Configurations

This is Part 3 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with SANS’ Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. In Part 2 we looked at Inventory of Authorized and Unauthorized Software. Now we'll move on to Secure Configurations for Hardware and Software on…

September 16, 2015 | Rich Johnson

Free and Commercial Tools to Implement the SANS Top 20 Security Controls, Part 2

This is Part 2 of a 'How-To' in an effort to compile a list of tools (free and commercial) that can help an IT administrator comply with the Security Controls. In Part 1 we looked at Inventory of Authorized and Unauthorized Devices. The controls (ordered 1-20) are in order of importance. In other words, completing Control 1 will reduce the threat risk greater…