Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's Actually Changing in HIPAA (and What IT Teams Need to Fix Now)

Hosted by CalCom — helping healthcare and financial organizations secure and harden server environments for compliance frameworks like HIPAA, CIS, and NIST. Trusted by organizations managing regulated environments where configuration security and audit readiness matter. A HIPAA Auditor won't tell your servers to turn their head an cough, but your configurations may still not be healthy. Some security practices that used to be “recommended” are quickly becoming expected controls. This session breaks down what’s changing, what auditors will look for, and what you should address now.

Server Hardening Tools Explained: Tools, Strategies & Best Practices in 2025 | CalCom Webinar

Baseline server hardening is evolving rapidly. In this webinar, we break down the latest trends in server hardening and tools for 2025. Key Topics Covered Learn how CalCom Hardening Automation Suite (CHS) simplifies the process and saves IT teams hours of manual work.

Video On Demand - Configuration Drift and the Risk of Misconfiguration

Misconfigurations can undermine security even on fully patched systems. In this webinar, CalCom’s Co-Founder and Director of Business Development Roy Ludmir explains what configuration vulnerabilities are, how configuration drift happens, and why it matters for both cyber risk and compliance. Questions? Want to talk about server hardening for your organization? Contact us at info@calcomsoftware.com.

UNC Path Hardening Quick Knowledge Guide

UNC paths allow Windows systems to access shared network resources, but they can also be a target for cyberattacks if not properly secured. In this video, we break down the Hardened UNC Path policy—a crucial security feature that enforces mutual authentication and integrity checks on critical shares like NETLOGON and SYSVOL. You'll learn: How the Hardened UNC Path policy works Step-by-step setup using Group Policy and registry keys How SMB encryption can add extra security (and its compatibility risks)

What You Need to Know About 2025 Data Privacy Regulations in the U.S.

In 2025, US data privacy regulations are evolving rapidly. This video explores key state laws and regulations like the CCPA, CPRA, NY SHIELD Act, and the Massachusetts Data Privacy Protection Act. We discuss how these regulations impact businesses and the importance of robust security measures, including access controls, strong passwords, and regular audits. Learn how CalCom Hardening Suite can help your organization navigate these complex regulations and maintain a strong security posture.

SQL Server hardening

To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.

Network security LAN Manager Authentication Level

The LAN Manager (LM) is a group of early Microsoft client/server software products that enable users to connect personal computers on a single network. Its features include transparent file and printer sharing, user security features, and network administration tools. In Active Directory domains, the default authentication protocol is the Kerberos protocol. However, if Kerberos is not available for any reason, LM, NTLM, or NTLMv2 can be used as an alternative.