Blog

  • DFAR Guide & NIST 800-171

    In November 2010, the White House came up with the EO or Executive Order 13556. The order helped in establishing a uniform and open program across Defense and Civilian agencies for

    Read More
  • Overcoming the 3 biggest challenges in system hardening

    As delivered from the manufacturer, your network systems’ default configurations are often function-oriented rather than security-oriented. Changing the system’s default configuration to a more secure form is what we refer to

    Read More
  • NIST Free security assessment tool

    The National Institute of Standards and Technology (NIST) has issued a PDF of a cybersecurity self-assessment tool. The Baldrige Cybersecurity Excellence Builder v1.1 2019 is a self-assessment tool to help organizations better

    Read More
  • Server hardening, why should you automate it?

    Server security hardening is an essential element for preventing targeted attacks, as outlined in  recent researches reported by both Gartner and the NSA. Consistent, continual IT security hardening is your enterprise’s most

    Read More
  • Top 5 Tips for a Secure Password

    As the data of the world continues growing at an exponential rate year after year, cybercriminals have come up with highly complicated ways to get access to your personal information. They

    Read More
  • Remote Desktop Protocol (RDP) Vulnerability

    What is RDP? Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, providing the user access to remotely connect with another computer. Microsoft’s protocol is the best one available in

    Read More
  • Vulnerability Scanning & Vulnerability Management is not Hardening

    As a CISO or Security Manager, you understand your organization’s need to remain one step ahead of cybercriminals searching for gaps in your security posture. The market is flooded with solutions

    Read More
  • How to plan & manage your hardening project Infographic

    Our team has more than a decade of experience in server hardening. We’ll help you determine the right policy to achieve maximum compliance with minimal efforts.

    Read More
  • CVE-2021-42278 SAM & CVE-2021-42287 KDC vulnerability

    Microsoft continues urging its customers to understand two core security vulnerabilities in the domain controllers of Active Directory. These vulnerabilities had been addressed by the company in November 2021. It was

    Read More
  • Server Hardening Tools

    Defining and implementing a comprehensive server security policy is an essential step in the process of securing both Windows and Linux servers.  Organizations should establish different hardening policies for each system

    Read More
  • RDS Clipboard Redirection: Should you allow it?

    In this article we will provide basic information regarding the Clipboard Redirection setting, which enables the copy past function in remote desktop. Once you have decided the setting’s desired value, be

    Read More
  • What is Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0)?

    The DoD or Department of Defense of the United States of America implements the CMMC or Cybersecurity Maturity Model Certification to standardize or normalize the overall preparedness for cybersecurity across the

    Read More