Do you know how professionally your Red Hat Enterprise Linux is ‘hardened’? Test your system with the new AuditTAP version and receive a detailed test result.
Laws, regulations & standards: Why System Hardening 2024 & 2025 is a ‘must have’ for your company
There are ever more and ever stricter requirements for companies and organisations that require System Hardening. You can find out what these are here.
Protective shield for robots: how the ‘pib’ is secured against attacks
Pupils, students and scientists love the ‘pib’. The robot is easy to make and easy to program. And thanks to our hardening script, the 3D-printed humanoid robot is now better armed against cyber attacks.
Continue reading “Protective shield for robots: how the ‘pib’ is secured against attacks”
FAQ: How can you improve cyber security in your company?
Is cyber security and therefore System Hardening a ‘nice to have’? No, definitely not! Here we provide you with sound arguments as to why you should not neglect the secure configuration of applications and operating systems under any circumstances.
Continue reading “FAQ: How can you improve cyber security in your company?”
DORA: What does the EU regulation have to do with System Hardening? [Update]
If you work in the financial sector, you have probably already heard of DORA. We will explain what it is, what the EU regulation means for your company or organisation and the important role that System Hardening plays in this, briefly and succinctly.
Continue reading “DORA: What does the EU regulation have to do with System Hardening? [Update]”
WLA-SCS and Lottery Hardening: The path to secure lottery systems
Are you familiar with the World Lottery Association Security Control Standard? Do you know what Lottery Hardening is, why it is so important and how to apply it? You will find the answers to these questions in this guide.
Continue reading “WLA-SCS and Lottery Hardening: The path to secure lottery systems”
Why you absolutely must pay attention to IT security in an M&A deal
When companies take over other companies, it is not only the financial figures that are scrutinised. The state of IT security is also playing an increasingly important role in M&A deals. Find out here what you need to pay particular attention to and what the consequences of any deficiencies could be.
Continue reading “Why you absolutely must pay attention to IT security in an M&A deal”
Polymorphic malware: Are you already familiar with this protective measure in the fight against dangerous malware?
Polymorphic malware is a novel, hard-to-detect threat that is becoming increasingly sophisticated thanks to AI tools. Find out here how you can thwart the “shape-shifting malware” and minimize the risk of damage.
Secure Configuration – FAQ: The 13 most important questions & answers
What is ‘secure configuration’, why is it so important and how can it be implemented? Find out everything you need to know about the secure configuration of systems here.
Continue reading “Secure Configuration – FAQ: The 13 most important questions & answers”
What does “OS hardening” mean? Why is this IT security measure so important?
Do you know how OS Hardening works? We give you an overview of the topic and answer the most important questions in FAQ style.
Continue reading “What does “OS hardening” mean? Why is this IT security measure so important?”