Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:Web Developers + (03:23:02, 23 October 2023)
- Category:Content Providers + (03:23:03, 23 October 2023)
- Category:Security Operations Entities + (03:23:03, 23 October 2023)
- Category:MSPs and MSSPs + (03:23:03, 23 October 2023)
- Category:ISPs + (03:23:04, 23 October 2023)
- Category:Information Sharing Organizations + (03:23:04, 23 October 2023)
- Category:Cybersecurity Providers + (03:23:04, 23 October 2023)
- Category:Carriers & Communications + (03:23:05, 23 October 2023)
- Category:Security Personnel + (03:23:05, 23 October 2023)
- Category:Developers and Development Organizations + (03:23:05, 23 October 2023)
- Category:Governments and Intergovernmental Organizations + (03:23:05, 23 October 2023)
- Category:Critical Infrastructure + (03:23:05, 23 October 2023)
- Category:Communities + (03:23:06, 23 October 2023)
- Category:Financial Institutions + (03:23:06, 23 October 2023)
- Category:Nonprofits & Charities + (03:23:06, 23 October 2023)
- Category:Registrars & Registries + (03:23:06, 23 October 2023)
- Category:Researchers + (03:23:07, 23 October 2023)
- Category:Individuals + (03:23:07, 23 October 2023)
- Category:All Businesses + (03:23:07, 23 October 2023)
- Category:CIS - 4.4 - Protect - Devices - Implement and Manage a Firewall on Servers + (03:23:46, 23 October 2023)
- Category:CIS - 11.3 - Protect - Data - Protect Recovery Data + (03:23:46, 23 October 2023)
- Category:CIS - 1.2 - Respond - Devices - Address Unauthorized Assets + (03:23:46, 23 October 2023)
- Category:CIS - 18.5 - Identify - Perform Periodic Internal Penetration Tests + (03:23:47, 23 October 2023)
- Category:CIS - 3 - Data Protection + (03:23:47, 23 October 2023)
- Category:CIS - 9.4 - Protect - Applications - Restrict Unnecessary or Unauthorized Browser and Email Client Extensions + (03:23:47, 23 October 2023)
- Category:CIS - 3.1 - Protect - Data - Encrypt Sensitive Data in Transit + (03:23:47, 23 October 2023)
- Category:CIS - 2.5 - Protect - Applications - Allowlist Authorized Software + (03:23:47, 23 October 2023)
- Category:CIS - 13.6 - Detect - Network - Collect Network Traffic Flow Logs + (03:23:48, 23 October 2023)
- Category:CIS - 13.7 - Protect - Devices - Deploy a Host-Based Intrusion Prevention Solution + (03:23:48, 23 October 2023)
- Category:CIS - 14.3 - Protect - Train Workforce Members on Authentication Best Practices + (03:23:48, 23 October 2023)
- Category:CIS - 16.13 - Protect - Applications - Conduct Application Penetration Testing + (03:23:48, 23 October 2023)
- Category:CIS - 9.6 - Protect - Network - Block Unnecessary File Types + (03:23:48, 23 October 2023)
- Category:CIS - 3.4 - Protect - Data - Enforce Data Retention + (03:23:49, 23 October 2023)
- Category:CIS - 8.6 - Detect - Network - Collect DNS Query Audit Logs + (03:23:49, 23 October 2023)
- Category:CIS - 5.3 - Respond - Users - Disable Dormant Accounts + (03:23:49, 23 October 2023)
- Category:CIS - 6 - Access Control Management + (03:23:49, 23 October 2023)
- Category:CIS - 16 - Application Software Security + (03:23:49, 23 October 2023)
- Category:CIS - 9.7 - Protect - Network - Deploy and Maintain Email Server Anti-Malware Protections + (03:23:50, 23 October 2023)
- Category:CIS - 1.5 - Detect - Devices - Use a Passive Asset Discovery Tool + (03:23:50, 23 October 2023)
- Category:CIS - 13.1 - Protect - Network - Perform Application Layer Filtering + (03:23:50, 23 October 2023)
- Category:CIS - 17.8 - Recover - Conduct Post-Incident Reviews + (03:23:50, 23 October 2023)
- Category:CIS - 16.12 - Protect - Applications - Implement Code-Level Security Checks + (03:23:50, 23 October 2023)
- Category:CIS - 16.4 - Protect - Applications - Establish and Manage an Inventory of Third-Party Software Components + (03:23:51, 23 October 2023)
- Category:CIS - 14.2 - Protect - Train Workforce Members to Recognize Social Engineering Attacks + (03:23:51, 23 October 2023)
- Category:CIS - 4.11 - Protect - Devices - Enforce Remote Wipe Capability on Portable End-User Devices + (03:23:51, 23 October 2023)
- Category:CIS - 18.2 - Identify - Network - Perform Periodic External Penetration Tests + (03:23:51, 23 October 2023)
- Category:CIS - 12.7 - Protect - Devices - Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure + (03:23:51, 23 October 2023)
- Category:CIS - 10.4 - Detect - Devices - Configure Automatic Anti-Malware Scanning of Removable Media + (03:23:51, 23 October 2023)
- Category:CIS - 17.1 - Respond - Designate Personnel to Manage Incident Handling + (03:23:52, 23 October 2023)
- Category:CIS - 7.1 - Protect - Applications - Establish and Maintain a Vulnerability Management Process + (03:23:52, 23 October 2023)
- Category:CIS - 3.3 - Protect - Data - Configure Data Access Control Lists + (03:23:52, 23 October 2023)
- Category:CIS - 7.6 - Identify - Applications - Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets + (03:23:52, 23 October 2023)
- Category:CIS - 7.3 - Protect - Applications - Perform Automated Operating System Patch Management + (03:23:52, 23 October 2023)
- Category:CIS - 16.1 - Protect - Applications - Apply Secure Design Principles in Application Architectures + (03:23:53, 23 October 2023)
- Category:CIS - 2.4 - Detect - Applications - Utilize Automated Software Inventory Tools + (03:23:53, 23 October 2023)