Automotive suppliers and manufacturers must follow sector-specific industry standards such as VDA-ISA and TISAX to secure their IT systems. That is why system hardening is taking on an increasingly important role.
What does “state of the art techniques” mean? What is to be done?
The legal term “state of the art” has received increased attention in recent years. Here’s what it means. And these measures can be taken.
Continue reading “What does “state of the art techniques” mean? What is to be done?”
ISO 27001 and system hardening: Do you already fulfill the new, legal requirements?
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Linux hardening guide: How does it work for Ubuntu, Debian, Fedora & Co.
Nobody is perfect – especially no operating system! Therefore, system hardening for Linux is also recommended. However, the implementation can be complex in corporate environments. This is what you should consider.
Continue reading “Linux hardening guide: How does it work for Ubuntu, Debian, Fedora & Co.”
Less “Red Alert”: How the Security Operations Center Benefits Significantly from System Hardening
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.
AuditTAP 5.5: Checks according to the latest curing recommendations
There is a fresh update for the AuditTAP! You can now check even better whether your systems are securely configured (“hardened”) to the state of the art. Additionally, current project requirements are implemented.
Continue reading “AuditTAP 5.5: Checks according to the latest curing recommendations”
Windows 10/11 as spyware: How to stop data transmission to Microsoft
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Continue reading “Windows 10/11 as spyware: How to stop data transmission to Microsoft”
Cyber insurance and system hardening: an important connection
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional system hardening.
Continue reading “Cyber insurance and system hardening: an important connection”
Browser Hardening: How to fundamentally secure your browser with hardening
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
Continue reading “Browser Hardening: How to fundamentally secure your browser with hardening”
SOC2 compliance ahead: How hardening supported ESRB on their way
How can high requirements of a information security certification be met? Especially when preventive measures like system hardening are a must have. This is how ESRB mastered that with our powerful hardening tool.
Continue reading “SOC2 compliance ahead: How hardening supported ESRB on their way”