Background Left Background Right

CalCom Insights

Expert Tips & Updates

Securing SSH on RHEL: 5 Essential Configuration Steps

Securing SSH on RHEL: 5 Essential Configuration Steps

June 9, 2025

Linux distributions, such as Red Hat Enterprise Linux (RHEL), dominate the enterprise and cloud computing sectors.…

Using CIS Hardening Scripts for Windows Server: Benefits and Risks

Using CIS Hardening Scripts for Windows Server: Benefits and Risks

April 28, 2025

With each new version of Windows Server released, comes new security risks. Whilst each update enhances…

Hardening Systems for HIPAA 2025: A Hospital IT Guide to Compliance

Hardening Systems for HIPAA 2025: A Hospital IT Guide to Compliance

April 7, 2025

The U.S. Department of Health and Human Services (HHS), the governmental body responsible for enforcing and…

CIS Benchmarks Checklist: Is Your Windows Server 2025 Secure?

CIS Benchmarks Checklist: Is Your Windows Server 2025 Secure?

February 2, 2025

Windows Server 2025, the latest iteration of Microsoft’s flagship server operating system, introducing new features, enhanced…

CIS Controls v8.1: Everything You Need to Know

CIS Controls v8.1: Everything You Need to Know

January 14, 2025

What are CIS Controls? The Center for Internet Security (CIS) Controls are a prioritized set of…

Ensure IP forwarding is disabled a RHEL Benchmark

Ensure IP forwarding is disabled a RHEL Benchmark

January 9, 2025

IP forwarding in Linux is a feature that allows a system to route packets between network…

What You Need to Know About 2025 Data Privacy Regulations in the U.S.

What You Need to Know About 2025 Data Privacy Regulations in the U.S.

December 30, 2024

In an era where data breaches make headlines almost weekly and cybercrime costs businesses billions annually,…

X Display Manager Control Protocol (XDMCP) Explained

X Display Manager Control Protocol (XDMCP) Explained

December 22, 2024

What is XDMCP  X Display Manager Control Protocol (XDMCP) is a remote desktop protocol using X11…

23 NYCRR Part 500 Amendment Compliance Checklist

23 NYCRR Part 500 Amendment Compliance Checklist

December 18, 2024

Be Ready for 2025 Regulatory Requirements Banks and Insurance companies in New York are grappling with…

Disable Core Dump Backtraces and Why

Disable Core Dump Backtraces and Why

December 16, 2024

What is a core dump backtrace A core dump is a snapshot capturing the state of…

How to Enable Hardened UNC Path

How to Enable Hardened UNC Path

December 9, 2024

What is a Hardened UNC Path? Hardened UNC Path is a Group Policy Object present at:…

Windows Zero-Day Threat: Protect Your NTLM Credentials

Windows Zero-Day Threat: Protect Your NTLM Credentials

December 8, 2024

A newly discovered zero-day vulnerability in Windows potentially exposes users across multiple Windows versions to credential…

Understanding Cryptographic Mechanisms 

Understanding Cryptographic Mechanisms 

December 2, 2024

Cryptographic mechanisms protect the integrity of audit tools by ensuring that the data they collect is…

Kernel DMA Protection Hardening to Secure Your Systems

Kernel DMA Protection Hardening to Secure Your Systems

November 26, 2024

Kernel DMA Protection Kernel Direct Memory Access (DMA) Protection is a security feature in Windows designed…

Leaving TLS 1.2 and moving to TLS 1.3

Leaving TLS 1.2 and moving to TLS 1.3

November 22, 2024

What is TLS? Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication…

Quick Guide to GNOME Display Manager (GDM)

Quick Guide to GNOME Display Manager (GDM)

November 18, 2024

The GNOME Display Manager (GDM) is a program that facilitates graphical user login for Linux systems…