Collaboration with IT departments regarding network requirements for electronic physical security systems is common. This column’s question is about collaboration regarding system hardening. Q: I’m ...
System hardening has gotten a lot of attention over the last decade or so. News reports of large storms (ice storms, hurricanes, blizzards, etc.) hitting population centers and wiping out electric ...
As delivered from the manufacturer, your systems’ default configurations are often function-oriented rather than security-oriented. Changing the system’s default configuration to a more secure form is ...
The consequences of non-compliance have reached their peak in recent years. Global regulators now impose record-breaking penalties on institutions that fail to create adequate control systems: These ...
One annoying thing about IT security is the amount of recommended "best practice" methodologies which sound great in theory but in the coal face of IT don't actually work. Operating system hardening ...
Trusted Computer Solutions (TCS), a developer of cross-domain, operating system and network security solutions, has announced that it has partnered with Vicom Infinity, an IBM Premier Business Partner ...