The Policy Expert: Configuring Maximum Security Log Size

  • The Policy Expert: Configuring Maximum Security Log Size

    Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

    Read More
  • Docker host hardening guide

    Containerization, which allows organizations to better their IT network effectiveness, is without a doubt a hot topic nowadays. But many of those embracing containers are unaware that misconfiguration of the container

    Read More
  • How to best spend your cybersecurity budget- research based model

    This research aims to show a possible model for a decision making approach for cybersecurity investment in Small and Medium Enterprises (SMEs). The scope of cyberattacks on organizations is endless, but

    Read More
  • 2019 cyber-security statistics and future forecasts

    Earlier this month Hashedout published a disturbing report summarize 2019 cyber security statistics. Among their list of 80 statistics, few of them caught our attention. Here are 8 statistics we thought

    Read More
  • Docker host REST API vulnerability

    Docker containers are becoming more and more popular in organizations IT environments because they allow virtualization at the operating system level. Currently, the most common OS for Docker hosting is Linux

    Read More
  • RunC vulnerability from a host’s hardening point of view

    In February 2019, a vulnerability was found in runC container runtime. CVE-2019-5736 affects Docker’s containers that run on default settings, and can lead the attacker to gain root level access on

    Read More
  • Hardening IIS server guide

      IIS server- Microsofts’ Windows web server is one of the most used web server platforms on the internet. Hardening your IIS server is basic and essential for preventing cyber-attacks and

    Read More
  • Leaving TLS 1.2 and moving to TLS 1.3

    New version of TLS was launched in 2018 – the TLS 1.3 protocol. TLS 1.3 aims to solve all of the problems facing its older version – TLS 1.2. What is

    Read More
  • 8 Hardening Actions That Will Break Your IIS Server

    Security versus functionality is always the concern when approaching server hardening. Hardening your IIS server is one of the most crucial missions when trying to achieve a secured infrastructure. There are

    Read More
  • Hardening TLS/SSL protocols- What Might Break

      Is your organization still using old SSL/TLS protocols? June 2018 was the deadline for hardening SSL/TLS protocols and implementing a more secure encryption protocol. The PCI Security Standards Council requires

    Read More
  • Hardening Configurations using CIS Benchmarks

    The center for internet security (CIS) instructs to perform 20 different actions in order to achieve a cyber-attack resilient IT infrastructure. Among those 20 Controls, the first five found to be

    Read More
  • Why the hell WannaCry is still here?!

      According to December 2018 Top 10 Malware report, WannaCry malware holds the dubious lead of malware breakdowns with 28%. WannaCry total damage is estimated by 4 billion $ But as WannaCry might

    Read More