Cybersecurity Quarterly
Summer 2018
A Publication from
How to Use Open Source Intelligence Effectively in Your Investigations Does Truly Secure User Authentication Mean Assuming Everyone is Already Compromised? The Financial Rewards of Proactive Cyber Defense
The Continued Evolution of the CIS Controls For over a decade, the CIS Controls have continuously adapted to the ever changing cyber threat landscape. The newest version sees some of the most significant changes in their history