Attention Windows and Linux users: There is a new update for AuditTAP. Read here what version 5.7 has to offer.
Do you know how OS Hardening works? We give you an overview of the topic and answer the most important questions in FAQ style.
The IT security specialists of two large US authorities have joined forces to write a guide. The topic is the secure configuration of IT systems. These are the recommendations and advice from NSA and CISA.
With the latest update, AuditTAP is becoming an attractive Linux tool. You can now use it with a popular Ubuntu version to check whether you are using a securely configured system.
The detection of anomalies is an important measure in IT security. In order to be able to implement this correctly, there are various approaches and solutions.
Automotive suppliers and manufacturers must follow sector-specific industry standards such as VDA-ISA and TISAX to secure their IT systems. That is why system hardening is taking on an increasingly important role.
The legal term “state of the art” has received increased attention in recent years. Here’s what it means. And these measures can be taken.
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Nobody is perfect – especially no operating system! Therefore, system hardening for Linux is also recommended. However, the implementation can be complex in corporate environments. This is what you should consider.
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.