Senteon Blog

1 min read

Exploring CIS Benchmarks and IT Security

Introduction to CIS Benchmarks and IT Security In the 26th episode of the Senteon and CIS webinar series, we delve deep into the CIS benchmarks, a crucial aspect of IT security. Host Zach from Senteon, along with Rich McGraw from CIS, welcomed David...

READ MORE

2 min read

System Hardening: The Keystone of Cybersecurity Defense

In an era where cyber threats evolve at a breakneck pace, the need for robust cybersecurity measures has never been...

READ MORE

2 min read

Balancing Technical Mastery and Well-being in Cybersecurity

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats and understanding the nuances of...

READ MORE

2 min read

Building a Fortress: Layered Defense and CIS Benchmarks in Cybersecurity

Discover the importance of proactive measures, the human element in security, and the role of CIS Benchmarks in risk...

READ MORE

2 min read

Mastering Cybersecurity: Harnessing CIS Benchmarks for Advanced Defense

In the ever-evolving landscape of digital threats, robust cybersecurity is not just a necessity; it’s a mandate for...

READ MORE

1 min read

Securing Digital Assets: A Guide to CIS Controls for Enhanced Protection

In the digital arena where cyber threats constantly evolve, the hardening of workstations, servers, and browsers isn’t...

READ MORE

2 min read

7 Cybersecurity Essentials from the Experts

Unearth the top cybersecurity tactics from our expert-led webinar with special guest Marty Godsey from Rudio. Dive into...

READ MORE

2 min read

Revolutionizing Endpoint Management: Senteon’s Labeling System

Something that’s been popping up in our discussions quite often this past month is our chosen methods of organization...

READ MORE

Windows Logon Session Types: NewCredentials

Logon Type — NewCredentials Used with RunAs or mapping a network drive with alternate credentials. Create a new logon...

READ MORE