Nobody is perfect – not even Linux. You may still have an undiscovered security vulnerability on your system that allows attackers to penetrate the network via your printers. Here’s how you can avoid a CUPS disaster.
Is your Windows Server Hardening compliant with CIS Benchmarks 3.0.0? Do the check!
With the new version of AuditTAP you can check, among other things, whether your Server System Hardening complies with the current specifications of the Center for Internet Security.
Cybersecurity in practice: System Hardening using the case study ‘SMBv1’ and ‘Eternal Blue Exploit’
SMBv1 is insecure – this has been known since 2014. Despite this, the Eternal Blue Exploit is still hitting some company networks. We show you how you can prevent attackers from using this ‘popular’ vulnerability as a gateway.
DORA: What does the EU regulation have to do with System Hardening? [Update]
If you work in the financial sector, you need to know about DORA. Here you can find out what the new EU regulation means for your company or organisation and what important role system hardening plays in this.
Continue reading “DORA: What does the EU regulation have to do with System Hardening? [Update]”
Current laws, regulations & standards: Why System Hardening 2025 is a “must have” for your company
There are more and more requirements for companies and organizations that need secure configuration or system hardening. Find out what they are here.
System Hardening on the test bench: examples, tests and real-life results
Does System Hardening really achieve anything? Do the IT security measures really close many security gaps? How can you measure the results? And is a 100% hardening even possible? We provide you with some deep insights and verifiable facts here.
Continue reading “System Hardening on the test bench: examples, tests and real-life results”
Secure Configuration – FAQ: The 13 most important questions & answers
What is ‘Secure Configuration’, why is it so important and how can it be implemented? Find out everything you need to know about the secure configuration of systems here.
Continue reading “Secure Configuration – FAQ: The 13 most important questions & answers”
NIS 2, ISO 27001 and System Hardening: A triad that more and more companies need to think about
NIS 2 is here. The requirements of the EU-wide cybersecurity directive are very high. Here you can find out what you need to pay attention to when implementing the directive.
Configuration Management in accordance with ISO 27001:2022 – How to avoid a deviation
Does your company want to be certified according to the latest ISO 27001? Then you need to implement a professional Configuration Management – based on the latest standards! Here’s how you can master the challenge.
FAQ: How can you improve cyber security in your company?
Is cyber security and therefore System Hardening a ‘nice to have’? No, definitely not! Here we provide you with sound arguments as to why you should not neglect the secure configuration of applications and operating systems under any circumstances.
Continue reading “FAQ: How can you improve cyber security in your company?”