CIS Critical security controls, What are they and how you should use them?
CIS Critical security controls, What are they and how you should use them? Cybersecurity has an extensive field, and it may seem that many inside the security of the information will never be able to “complete” it, but this no longer has to be the case. Regardless of the Budget, it may seem impossible for […]
How to reduce your attack surface with system hardening
How to reduce your attack surface with system hardening In most cases, new digital assets such as servers and operative systems, comes in a non configured status. When you install an asset, everything is predetermined. All the app services are activated and all the ports are open. At the same time, mosto f the new […]