Attention Windows and Linux users – there is a new update for AuditTAP! Read here what version 5.7.1 has to offer.
Continue reading “AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more”
System Hardening & Secure Configuration
Attention Windows and Linux users – there is a new update for AuditTAP! Read here what version 5.7.1 has to offer.
Continue reading “AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more”
Microsoft is extending support for Windows Server 2012, even though the operating system is considered “retired”. You now have these options.
Continue reading “Windows Server 2012/R2 – End of support: What you should do now”
With the latest update, AuditTAP is becoming an attractive Linux tool. You can now use it with a popular Ubuntu version to check whether you are using a securely configured system.
Continue reading “AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!”
The detection of anomalies is an important measure in IT security. In order to be able to implement this correctly, there are various approaches and solutions.
Continue reading “Anomaly detection in IT: methods, examples, solutions and other important facts”
Automotive suppliers and manufacturers must follow sector-specific industry standards such as VDA-ISA and TISAX to secure their IT systems. That is why system hardening is taking on an increasingly important role.
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
There is a fresh update for the AuditTAP! You can now check even better whether your systems are securely configured (“hardened”) to the state of the art. Additionally, current project requirements are implemented.
Continue reading “AuditTAP 5.5: Checks according to the latest curing recommendations”
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Continue reading “Windows 10/11 as spyware: How to stop data transmission to Microsoft”
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional System Hardening.
Continue reading “Cyber insurance and System Hardening: an important connection”
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
Continue reading “Browser Hardening: How to fundamentally secure your browser with hardening”