Make 2024 the year of cybersecurity and think about System Hardening. Because there are more and more threat situations and also specifications that require systems to be hardened. Here is an overview.
NIST Security Framework: There’s a lot to do – but don’t forget this one measure
With its step-by-step approach, the NIST Cybersecurity Framework offers very good guidance for the protection of IT systems. In our experience, one relevant point is often neglected during implementation. You can find out what this is here.
Continue reading “NIST Security Framework: There’s a lot to do – but don’t forget this one measure”
What does “OS hardening” mean? Why is this IT security measure so important?
Do you know how OS Hardening works? We give you an overview of the topic and answer the most important questions in FAQ style.
Continue reading “What does “OS hardening” mean? Why is this IT security measure so important?”
Is your Microsoft Edge properly hardened? Do the check!
Do you use Microsoft Edge? Is it configured securely? With the latest AuditTAP version, you can check whether your browser complies with the strictest hardening requirements, among other things.
Continue reading “Is your Microsoft Edge properly hardened? Do the check!”
Layered Hardening, Rapid Hardening & Lifecycle Hardening: Which method is the best for you?
There are various ways in which you can implement System Hardening in your company. Here we present the special features as well as the advantages and disadvantages of Rapid Hardening, Layered Hardening and Lifecycle Hardening.
AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more
Attention Windows and Linux users – there is a new update for AuditTAP! Read here what version 5.7.1 has to offer.
Continue reading “AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more”
Windows Server 2012/R2 – End of support: What you should do now
Microsoft is extending support for Windows Server 2012, even though the operating system is considered “retired”. You now have these options.
Continue reading “Windows Server 2012/R2 – End of support: What you should do now”
What do the NSA and CISA advise for securing IT systems? System hardening!
The IT security specialists of two large US authorities have joined forces to write a guide. The topic is the secure configuration of IT systems. These are the recommendations and advice from NSA and CISA.
Continue reading “What do the NSA and CISA advise for securing IT systems? System hardening!”
AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!
With the latest update, AuditTAP is becoming an attractive Linux tool. You can now use it with a popular Ubuntu version to check whether you are using a securely configured system.
Continue reading “AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!”
Anomaly detection in IT: methods, examples, solutions and other important facts
The detection of anomalies is an important measure in IT security. In order to be able to implement this correctly, there are various approaches and solutions.
Continue reading “Anomaly detection in IT: methods, examples, solutions and other important facts”