IT forensics and System Hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and System Hardening belong together”
System Hardening & Secure Configuration
IT forensics and System Hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and System Hardening belong together”
On Github you can now find the latest version of the Audit Test Automation Package, AuditTAP for short. These improvements are included.
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Continue reading “Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?”
With the current update, several new features have been added to AuditTAP. One of the new features is particularly important for companies.
Continue reading “Risk assessment, new hardening configurations and more: AuditTAP 5.2 is here!”
Have you engaged a service provider? Does it really comply with regulatory requirements, for example in the area of IT security? Use this tool to check the quality of your service provider.
A new tool from the German Federal Office for Information Security can be used to check how much telemetry information an unsecured Windows 10 or Windows 11 sends to Microsoft. We tried it out and came up with some astonishing results.
Continue reading “How much telemetry data do Windows 10 and Windows 11 really spy on?”
Bug fixes and fresh features: AuditTAP 5.1 has a few small but nice changes up its sleeve.
Continue reading “AuditTAP 5.1: What does the new version offer?”
To ensure that company-relevant information is protected in the best possible way, those responsible must rely on System Hardening, among other things. We explain exactly what this is here.
Continue reading “What is System Hardening? What measures and solutions are possibe?”
And again there is a certificate for Enforce Administrator: Our security configuration management solution for hardening IT systems passed an important security test again.
Continue reading “Enforce Administrator has passed another penetration test with flying colors!”
Effective monitoring, System Hardening and more: Security Configuration Management makes it possible to create “secure environments”. These points should be considered and implemented.
Continue reading “Security Configuration Management: This is why it is so important for IT security”