Using an Open Source Threat Model for Prioritized Defense
The CIS Critical Security Controls the International Standard for Defense
Automating Post Exploitation with PowerShell
Enterprise PowerShell for Remote Security Assessments
An Introduction to PowerShell for Security Assessments
Practical steps for assessing tablet & mobile device security Utilizing the Critical Security Controls to Secure Healthcare Technology
An Introduction to PowerShell for Security Assessments
Information Assurance Metrics: Practical Steps to Measurement
Governance fail security fail
The intersection of cool mobility and corporate protection
Recent changes to the 20 critical controls
Prioritizing an audit program using the 20 critical controls
Overview of the 20 critical controls