Blog

  • Docker host REST API vulnerability

    Docker containers are becoming more and more popular in organizations IT environments because they allow virtualization at the operating system level. Currently, the most common OS for Docker hosting is Linux

    Read More
  • RunC vulnerability from a host’s hardening point of view

    In February 2019, a vulnerability was found in runC container runtime. CVE-2019-5736 affects Docker’s containers that run on default settings, and can lead the attacker to gain root level access on

    Read More
  • Hardening IIS server guide

      IIS server- Microsofts’ Windows web server is one of the most used web server platforms on the internet. Hardening your IIS server is basic and essential for preventing cyber-attacks and

    Read More
  • Leaving TLS 1.2 and moving to TLS 1.3

    New version of TLS was launched in 2018 – the TLS 1.3 protocol. TLS 1.3 aims to solve all of the problems facing its older version – TLS 1.2. What is

    Read More
  • 8 Hardening Actions That Will Break Your IIS Server

    Security versus functionality is always the concern when approaching server hardening. Hardening your IIS server is one of the most crucial missions when trying to achieve a secured infrastructure. There are

    Read More
  • Hardening TLS/SSL protocols- What Might Break

    Is your organization still using old SSL/TLS protocols? June 2018 was the deadline for hardening SSL/TLS protocols and implementing a more secure encryption protocol. The PCI Security Standards Council requires all

    Read More
  • Hardening Configurations using CIS Benchmarks

    The center for internet security (CIS) instructs to perform 20 different actions in order to achieve a cyber-attack resilient IT infrastructure. Among those 20 Controls, the first five found to be

    Read More
  • Why the hell WannaCry is still here?!

      According to December 2018 Top 10 Malware report, WannaCry malware holds the dubious lead of malware breakdowns with 28%. WannaCry total damage is estimated by 4 billion $ But as WannaCry might

    Read More
  • CIS controls and how to approach them

    CIS (Center of Internet Security) controls and how to approach them A study of the previous of the CIS Controls found that 85% of cyber incidents could be prevented by implementing

    Read More
  • 4 tips for a successful baseline hardening project

    The emerging cyber security threat and a large number of successful cyber attacks  occurred in the past years are encouraging CISO’s and IT teams to review their security posture and get

    Read More
  • Server hardening-Regulatory overview

      Baseline security hardening is a fundamental task in ensuring the organization’s servers are secure and compliant. OS and applications are provided from the manufacture with default configuration. The default configuration

    Read More
  • Hardening the IT infrastructure from servers to applications

    Hardening the IT infrastructure is an obligatory task for achieving a resilient to attacks infrastructure and complying with regulatory requirements. Hackers’ attack information systems and websites in an ongoing basis using

    Read More