DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Less “Red Alert”: How the Security Operations Center Benefits Significantly from System Hardening
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System Hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.
AuditTAP 5.5: Checks according to the latest curing recommendations
There is a fresh update for the AuditTAP! You can now check even better whether your systems are securely configured (“hardened”) to the state of the art. Additionally, current project requirements are implemented.
Continue reading “AuditTAP 5.5: Checks according to the latest curing recommendations”
Windows 10/11 as spyware: How to stop data transmission to Microsoft
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Continue reading “Windows 10/11 as spyware: How to stop data transmission to Microsoft”
Cyber insurance and System Hardening: an important connection
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional System Hardening.
Continue reading “Cyber insurance and System Hardening: an important connection”
Browser Hardening: How to fundamentally secure your browser with hardening
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
Continue reading “Browser Hardening: How to fundamentally secure your browser with hardening”
SOC2 compliance ahead: How hardening supported ESRB on their way
How can high requirements of a information security certification be met? Especially when preventive measures like System Hardening are a must have. This is how ESRB mastered that with our powerful hardening tool.
Continue reading “SOC2 compliance ahead: How hardening supported ESRB on their way”
This is why IT forensics and System Hardening belong together
IT forensics and System Hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and System Hardening belong together”
AuditTAP: What’s new in version 5.3?
On Github you can now find the latest version of the Audit Test Automation Package, AuditTAP for short. These improvements are included.
Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Continue reading “Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?”