Auditing Databases with Nessus

Auditing Databases with Nessus

/
As a companion to another post on hardening network devices and creating baseline configurations, I wanted to look at another area where standardizing configurations can pay off in a big way. While there is plenty of fertile ground out there, I decided to focus on some specific aspects of databases ... Read More
Secure Configuration Baselines for Network Devices

Secure Configuration Baselines for Network Devices

/
In a recent blog post, Ted Gary discussed results from a Tenable survey about configuration hardening at the system level. In short, organizations are making progress on enforcing and auditing their desktops and servers for secure configurations, but there is still a lot of work to do. While the whole ... Read More