Configuration management is vitally important as part of a sound cybersecurity strategy. We have previously published how patching alone is not enough, as that does not alter a system’s customized configuration. Misconfigurations can be as damaging to security as a deliberate attack on a system. As the manufacturer of Tripwire Enterprise (TE) , we thought that it would be prudent to help our readers learn about some of the more important configuration pitfalls to avoid in order to get the most value out of the TE product. Open ports on a firewall With many products that use agents to…
This article has been indexed from Blog RSS Feed