Microsoft is extending support for Windows Server 2012, even though the operating system is considered “retired”. You now have these options.
Continue reading “Windows Server 2012/R2 – End of support: What you should do now”
System Hardening & Secure Configuration
Microsoft is extending support for Windows Server 2012, even though the operating system is considered “retired”. You now have these options.
Continue reading “Windows Server 2012/R2 – End of support: What you should do now”
The IT security specialists of two large US authorities have joined forces to write a guide. The topic is the secure configuration of IT systems. These are the recommendations and advice from NSA and CISA.
Continue reading “What do the NSA and CISA advise for securing IT systems? System hardening!”
With the latest update, AuditTAP is becoming an attractive Linux tool. You can now use it with a popular Ubuntu version to check whether you are using a securely configured system.
Continue reading “AuditTAP 5.6: How good is your Ubuntu hardening? Do the quick check!”
The detection of anomalies is an important measure in IT security. In order to be able to implement this correctly, there are various approaches and solutions.
Continue reading “Anomaly detection in IT: methods, examples, solutions and other important facts”
Automotive suppliers and manufacturers must follow sector-specific industry standards such as VDA-ISA and TISAX to secure their IT systems. That is why system hardening is taking on an increasingly important role.
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System Hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.
There is a fresh update for the AuditTAP! You can now check even better whether your systems are securely configured (“hardened”) to the state of the art. Additionally, current project requirements are implemented.
Continue reading “AuditTAP 5.5: Checks according to the latest curing recommendations”
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Continue reading “Windows 10/11 as spyware: How to stop data transmission to Microsoft”
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional System Hardening.
Continue reading “Cyber insurance and System Hardening: an important connection”