Change & Configuration Management Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
Change Control has always been a key security best practice. With every change made to IT systems comes a risk of a weakening of security defenses, not to mention operational problems, through misconfigurations.
- Category: Change & Configuration Management
With just a few weeks left of National Cyber Security Awareness month, this is a great time for organizations of all sizes to take a good look at their security posture and consider what can be done to strengthen your IT environment.
- Category: Change & Configuration Management
According to a recent report by the Office of the Inspector General, the Department of Homeland Security still has a lot of work to do when it comes to the agency’s cyber security posture.
- Category: Change & Configuration Management
This final article in the series of 3 focuses on one of the key security best practices that is usually the hardest to implement, one requiring wholesale organizational and cultural change within the IT Team: Change Management.
- Category: Change & Configuration Management
Is a gun better than a knife? I've been trying hard for an analogy, but this one kind of works. Which is better? A gun or a knife? Both will help defend you against an attacker. A gun may be better than a knife if you are under attack from a big group of attackers running at you, but without ammunition, you are left defenseless. The knife works without ammunition and always provides a consistent deterrent, so in some respects, gives better protection than a gun.
- Disable Windows Services
- What are the recommended Audit Policy settings for Windows & Linux
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- Windows Server 2008 2008R2 Hardening Guide
- File Integrity Monitoring Software
- Linux Server Hardening
- The Windows Advanced Audit Policy Configuration
- The Top Ten of Audit and Event Log Monitoring
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?