Do you know how professionally your Red Hat Enterprise Linux is ‘hardened’? Test your system with the new AuditTAP version and receive a detailed test result.
Protective shield for robots: how the ‘pib’ is secured against attacks
Pupils, students and scientists love the ‘pib’. The robot is easy to make and easy to program. And thanks to our hardening script, the 3D-printed humanoid robot is now better armed against cyber attacks.
Continue reading “Protective shield for robots: how the ‘pib’ is secured against attacks”
WLA-SCS and Lottery Hardening: The path to secure lottery systems
Are you familiar with the World Lottery Association Security Control Standard? Do you know what Lottery Hardening is, why it is so important and how to apply it? You will find the answers to these questions in this guide.
Continue reading “WLA-SCS and Lottery Hardening: The path to secure lottery systems”
Why you absolutely must pay attention to IT security in an M&A deal
When companies take over other companies, it is not only the financial figures that are scrutinised. The state of IT security is also playing an increasingly important role in M&A deals. Find out here what you need to pay particular attention to and what the consequences of any deficiencies could be.
Continue reading “Why you absolutely must pay attention to IT security in an M&A deal”
Device Hardening: Definition and measures
What does “Device Hardening” mean? Why is it essential for IT security? And how can devices be “hardened”? You can find the answers to these questions here.
Continue reading “Device Hardening: Definition and measures”
Polymorphic malware: Are you already familiar with this protective measure in the fight against dangerous malware?
Polymorphic malware is a novel, hard-to-detect threat that is becoming increasingly sophisticated thanks to AI tools. Find out here how you can thwart the “shape-shifting malware” and minimize the risk of damage.
Group Policy vs. System Hardening: Why GPOs don’t provide sustainable security
We are often asked why we do not carry out System Hardening on the basis of Group Policies or Group Policy Objects. The quick answer: Because the handling is massively inefficient and the results are therefore unsatisfactory! We explain why this is the case in this article.
Continue reading “Group Policy vs. System Hardening: Why GPOs don’t provide sustainable security”
Project “pEAgasus”: When System Hardening and Attack Detection are effectively intertwined
Hardening systems and detecting cyber attacks are two different components of an IT security strategy. And both are actually independent of each other. That doesn’t have to be the case! With the “pEAgasus” project, we are bringing together what belongs together.
NIST Security Framework: There’s a lot to do – but don’t forget this one measure
With its step-by-step approach, the NIST Cybersecurity Framework offers very good guidance for the protection of IT systems. In our experience, one relevant point is often neglected during implementation. You can find out what this is here.
Continue reading “NIST Security Framework: There’s a lot to do – but don’t forget this one measure”
What does “OS hardening” mean? Why is this IT security measure so important?
Do you know how OS Hardening works? We give you an overview of the topic and answer the most important questions in FAQ style.
Continue reading “What does “OS hardening” mean? Why is this IT security measure so important?”