Proactive System Hardening: Continuous Hardening’s Coming of Age
The first article in this series examined configuration hardening—essentially looking at ports, processes and services where security configuration management (SCM) is key. The second article looked at application and version hardening strategies… Continue reading Proactive System Hardening: Continuous Hardening’s Coming of Age