There are more and more requirements for companies and organizations that need secure configuration or system hardening. Find out what they are here.
System Hardening on the test bench: examples, tests and real-life results
Does System Hardening really achieve anything? Do the IT security measures really close many security gaps? How can you measure the results? And is a 100% hardening even possible? We provide you with some deep insights and verifiable facts here.
Continue reading “System Hardening on the test bench: examples, tests and real-life results”
Secure Configuration – FAQ: The 13 most important questions & answers
What is ‘Secure Configuration’, why is it so important and how can it be implemented? Find out everything you need to know about the secure configuration of systems here.
Continue reading “Secure Configuration – FAQ: The 13 most important questions & answers”
NIS 2, ISO 27001 and System Hardening: A triad that more and more companies need to think about
NIS 2 is here. The requirements of the EU-wide cybersecurity directive are very high. Here you can find out what you need to pay attention to when implementing the directive.
Configuration Management in accordance with ISO 27001:2022 – How to avoid a deviation
Does your company want to be certified according to the latest ISO 27001? Then you need to implement a professional Configuration Management – based on the latest standards! Here’s how you can master the challenge.
FAQ: How can you improve cyber security in your company?
Is cyber security and therefore System Hardening a ‘nice to have’? No, definitely not! Here we provide you with sound arguments as to why you should not neglect the secure configuration of applications and operating systems under any circumstances.
Continue reading “FAQ: How can you improve cyber security in your company?”
AuditTAP 5.10: How good is your Red Hat Enterprise Linux system hardening? Do the check!
Do you know how professionally your Red Hat Enterprise Linux is ‘hardened’? Test your system with the new AuditTAP version and receive a detailed test result.
Protective shield for robots: how the ‘pib’ is secured against attacks
Pupils, students and scientists love the ‘pib’. The robot is easy to make and easy to program. And thanks to our hardening script, the 3D-printed humanoid robot is now better armed against cyber attacks.
Continue reading “Protective shield for robots: how the ‘pib’ is secured against attacks”
DORA: What does the EU regulation have to do with System Hardening? [Update]
If you work in the financial sector, you have probably already heard of DORA. We will explain what it is, what the EU regulation means for your company or organisation and the important role that System Hardening plays in this, briefly and succinctly.
Continue reading “DORA: What does the EU regulation have to do with System Hardening? [Update]”
WLA-SCS and Lottery Hardening: The path to secure lottery systems
Are you familiar with the World Lottery Association Security Control Standard? Do you know what Lottery Hardening is, why it is so important and how to apply it? You will find the answers to these questions in this guide.
Continue reading “WLA-SCS and Lottery Hardening: The path to secure lottery systems”