Proactively Hardening Systems: Application and Version Hardening
The first article in this series examined configuration hardening, essentially looking at ports, processes and services as the “doors, gates and windows” into a network where security configuration management (SCM) becomes the job of determ… Continue reading Proactively Hardening Systems: Application and Version Hardening