Many AI applications are great because they increase the efficiency of companies. However, they can also pose a threat to information security. Find out here how AI Hardening makes your systems more secure.
Is your Microsoft Edge properly hardened? Do the check!
Do you use Microsoft Edge? Is it configured securely? With the latest AuditTAP version, you can check whether your browser complies with the strictest hardening requirements, among other things.
Continue reading “Is your Microsoft Edge properly hardened? Do the check!”
Layered Hardening, Rapid Hardening & Lifecycle Hardening: Which method is the best for you?
There are various ways in which you can implement System Hardening in your company. Here we present the special features as well as the advantages and disadvantages of Rapid Hardening, Layered Hardening and Lifecycle Hardening.
AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more
Attention Windows and Linux users – there is a new update for AuditTAP! Read here what version 5.7.1 has to offer.
Continue reading “AuditTAP 5.7.1: Debian & SUSE hardening checks, current CIS checks and more”
Windows Server 2012/R2 – End of support: What you should do now
Microsoft is extending support for Windows Server 2012, even though the operating system is considered “retired”. You now have these options.
Continue reading “Windows Server 2012/R2 – End of support: What you should do now”
What do the NSA and CISA advise for securing IT systems? System hardening!
The IT security specialists of two large US authorities have joined forces to write a guide. The topic is the secure configuration of IT systems. These are the recommendations and advice from NSA and CISA.
Continue reading “What do the NSA and CISA advise for securing IT systems? System hardening!”
AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!
With the latest update, AuditTAP is becoming an attractive Linux tool. You can now use it with a popular Ubuntu version to check whether you are using a securely configured system.
Continue reading “AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!”
Anomaly detection in IT: methods, examples, solutions and other important facts
The detection of anomalies is an important measure in IT security. In order to be able to implement this correctly, there are various approaches and solutions.
Continue reading “Anomaly detection in IT: methods, examples, solutions and other important facts”
VDA-ISA and TISAX: Why system hardening is becoming a “must have” in the automotive industry
Automotive suppliers and manufacturers must follow sector-specific industry standards such as VDA-ISA and TISAX to secure their IT systems. That is why system hardening is taking on an increasingly important role.
ISO 27001 and system hardening: Do you already fulfill the new, legal requirements?
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.