Blog
Proactively Hardening Systems: Application and Version Hardening
By Megan Freshley on Mon, 10/08/2018
The first article in this series examined configuration hardening, essentially looking at ports, processes and services as the “doors, gates and windows” into a network where security configuration management (SCM) becomes the job of determining which of these gateways should be open, closed, or locked at any given time. Now it’s time to look at...