Featured Image

ICS OT Security Controls

šŸ’” Selecting, implementing, assessing and monitoring the ICS OT Security Controls require preliminary activities to be executed as part of the whole ICS OT Cyber Security Assurance life cycle. šŸŸ” […]
Read More
Featured Image

Cisco IOS Switch Security Configuration Guide

Overview Switches direct and control much of the data flowing across computer networks. Ā This guide provides technical recommendations intended to help network administrators improve the security of their networks. Ā Using […]
Read More
Featured Image

Cisco Router Secure Configuration Guidelines

Preface Routers direct and control much of the data flowing across computer networks. ThisĀ guide provides technical guidance intended to help network administrators and security officers improve the security of their […]
Read More
Featured Image

Firewall Secure Configuration Guide

Executive Summary Firewalls are devices or programs that control the flow of network traffic between networks or hosts thatĀ employ differing security postures. At one time, most firewalls were deployed at […]
Read More