There are more and more requirements for companies and organizations that need secure configuration or system hardening. Find out what they are here.
System Hardening on the test bench: examples, tests and real-life results
Does System Hardening really achieve anything? Do the IT security measures really close many security gaps? How can you measure the results? And is a 100% hardening even possible? We provide you with some deep insights and verifiable facts here.
Continue reading “System Hardening on the test bench: examples, tests and real-life results”
Secure Configuration – FAQ: The 13 most important questions & answers
What is ‘Secure Configuration’, why is it so important and how can it be implemented? Find out everything you need to know about the secure configuration of systems here.
Continue reading “Secure Configuration – FAQ: The 13 most important questions & answers”
NIS 2, ISO 27001 and System Hardening: A triad that more and more companies need to think about
NIS 2 is here. The requirements of the EU-wide cybersecurity directive are very high. Here you can find out what you need to pay attention to when implementing the directive.
Configuration Management in accordance with ISO 27001:2022 – How to avoid a deviation
Does your company want to be certified according to the latest ISO 27001? Then you need to implement a professional Configuration Management – based on the latest standards! Here’s how you can master the challenge.
FAQ: How can you improve cyber security in your company?
Is cyber security and therefore System Hardening a ‘nice to have’? No, definitely not! Here we provide you with sound arguments as to why you should not neglect the secure configuration of applications and operating systems under any circumstances.
Continue reading “FAQ: How can you improve cyber security in your company?”
DORA: What does the EU regulation have to do with System Hardening? [Update]
If you work in the financial sector, you have probably already heard of DORA. We will explain what it is, what the EU regulation means for your company or organisation and the important role that System Hardening plays in this, briefly and succinctly.
Continue reading “DORA: What does the EU regulation have to do with System Hardening? [Update]”
WLA-SCS and Lottery Hardening: The path to secure lottery systems
Are you familiar with the World Lottery Association Security Control Standard? Do you know what Lottery Hardening is, why it is so important and how to apply it? You will find the answers to these questions in this guide.
Continue reading “WLA-SCS and Lottery Hardening: The path to secure lottery systems”
Why you absolutely must pay attention to IT security in an M&A deal
When companies take over other companies, it is not only the financial figures that are scrutinised. The state of IT security is also playing an increasingly important role in M&A deals. Find out here what you need to pay particular attention to and what the consequences of any deficiencies could be.
Continue reading “Why you absolutely must pay attention to IT security in an M&A deal”
Polymorphic malware: Are you already familiar with this protective measure in the fight against dangerous malware?
Polymorphic malware is a novel, hard-to-detect threat that is becoming increasingly sophisticated thanks to AI tools. Find out here how you can thwart the “shape-shifting malware” and minimize the risk of damage.