|
By Matthew Album
Before the AI spectacle of RSA arrives, let’s talk about what actually keeps regulated organizations secure RSA is only weeks away. And if you’ve been paying any attention to the pre-conference buzz, or if you work in technology generally, you already know what it’s going to feel like walking that floor: artificial intelligence, everywhere, in everything. AI-powered detection. Autonomous response. Agentic security copilots in everything from threat monitoring to your morning coffee.
|
By Roy Ludmir
Your systems are fully patched. Your vulnerability scanner comes back clean. But are they actually secure?
|
By Dean Roberts
A multinational financial institution walks into its annual PCI DSS review confident it has “checked the boxes.” Firewalls are segmented, logs are retained, access controls are documented, and the audit report is clean. Months later, the same organization is reprimanded by the UK Information Commissioner’s Office (ICO). The controls were properly implemented.
|
By Joan Levin
Big changes to HIPAA are coming in February 2026 including new rules on how sensitive health data is handled, and updates to the required patient privacy notices. IT teams will play a key role in making sure those protections are actually enforced.
|
By Roy Ludmir
If your organization does business with the U.S. Department of Defense, or plans to, you need to know about a major change that just went into force. CMMC, or Cybersecurity Maturity Model Certification, is the Department of Defense’s standard for ensuring contractors meet basic cybersecurity requirements. It was designed to protect sensitive government data across the entire defense supply chain. As of November 2025, CMMC is no longer optional.
|
By Roy Ludmir
Interactive logon refers to users authenticating directly to a Windows system through its interface, such as a GUI or command line. Because these logons grant immediate access to a live session, misconfigured interactive logon policies can expose systems to credential theft and unauthorized access. This guide explains which interactive logon settings matter, where risks commonly appear, and how to harden them effectively.
|
By Roy Ludmir
Creating a safe and secure environment is a top priority for all types of organizations. To accomplish this goal, it is essential to adhere to group policy best practices, particularly in the realm of GPO security. By configuring fundamental Group Policy Settings correctly, organizations can significantly enhance their security posture. When Group Policies are utilized effectively, they play a crucial role in safeguarding users’ computers from various threats and potential breaches.
|
By Jonny Gold
Continuous Threat Exposure Management (CTEM) is a proactive cybersecurity framework that continuously reduces your attack surface in response to emerging threats.
|
By CalCom
NTLM Relay attacks should be history. Yet in 2025, they remain one of the most effective ways to compromise Active Directory. We first covered this problem back in 2020, when we wrote about a troubling vulnerability that refused to die: NTLM Relay attacks. At the time, many believed NTLM Relay attacks were a relic of the past, an old problem long solved by Kerberos and modern authentication protocols.
|
By CalCom
CISA has just added a new CVE regarding SMB, with a very high CVSS rating. CVE-2025-33073 is a high-severity (CVSS 8.8) vulnerability in the Windows SMB client caused by improper access control (CWE-284). An authenticated attacker can exploit it over the network to gain elevated privileges. Microsoft has issued guidance on how it should be patched and CalCom recommend this be done immediately.
|
By CalCom Software
Hosted by CalCom — helping healthcare and financial organizations secure and harden server environments for compliance frameworks like HIPAA, CIS, and NIST. Trusted by organizations managing regulated environments where configuration security and audit readiness matter. A HIPAA Auditor won't tell your servers to turn their head an cough, but your configurations may still not be healthy. Some security practices that used to be “recommended” are quickly becoming expected controls. This session breaks down what’s changing, what auditors will look for, and what you should address now.
|
By CalCom Software
Baseline server hardening is evolving rapidly. In this webinar, we break down the latest trends in server hardening and tools for 2025. Key Topics Covered Learn how CalCom Hardening Automation Suite (CHS) simplifies the process and saves IT teams hours of manual work.
|
By CalCom Software
Misconfigurations can undermine security even on fully patched systems. In this webinar, CalCom’s Co-Founder and Director of Business Development Roy Ludmir explains what configuration vulnerabilities are, how configuration drift happens, and why it matters for both cyber risk and compliance. Questions? Want to talk about server hardening for your organization? Contact us at info@calcomsoftware.com.
|
By CalCom
UNC paths allow Windows systems to access shared network resources, but they can also be a target for cyberattacks if not properly secured. In this video, we break down the Hardened UNC Path policy—a crucial security feature that enforces mutual authentication and integrity checks on critical shares like NETLOGON and SYSVOL. You'll learn: How the Hardened UNC Path policy works Step-by-step setup using Group Policy and registry keys How SMB encryption can add extra security (and its compatibility risks)
|
By CalCom
In 2025, US data privacy regulations are evolving rapidly. This video explores key state laws and regulations like the CCPA, CPRA, NY SHIELD Act, and the Massachusetts Data Privacy Protection Act. We discuss how these regulations impact businesses and the importance of robust security measures, including access controls, strong passwords, and regular audits. Learn how CalCom Hardening Suite can help your organization navigate these complex regulations and maintain a strong security posture.
|
By CalCom
In this video discussing server hardening, you’ll learn why server hardening is so important to your IT Enterprise. Whether you’re a seasoned CISO or IT professional, this video is a must-watch for anyone who wants to keep their servers secure.
|
By CalCom
Explore the core principles behind these baselines, including risk management, threat identification, and control selection. Gain insights into the latest updates and revisions, ensuring you stay up-to-date with the best practices and industry standards.
|
By CalCom
To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.
|
By CalCom
When installing a new Linux server, you should be aware that its level of security is very low by default, to allow as much functionality as possible. Therefore, performing basic hardening actions before the server is installed in production is crucial. CalCom Software is hardening RedHat / Linux.
|
By CalCom
The LAN Manager (LM) is a group of early Microsoft client/server software products that enable users to connect personal computers on a single network. Its features include transparent file and printer sharing, user security features, and network administration tools. In Active Directory domains, the default authentication protocol is the Kerberos protocol. However, if Kerberos is not available for any reason, LM, NTLM, or NTLMv2 can be used as an alternative.
- April 2026 (1)
- March 2026 (3)
- February 2026 (1)
- January 2026 (2)
- December 2025 (3)
- November 2025 (2)
- October 2025 (2)
- September 2025 (3)
- July 2025 (1)
- June 2025 (4)
- May 2025 (1)
- April 2025 (4)
- March 2025 (1)
- February 2025 (1)
- January 2025 (2)
- December 2024 (8)
- November 2024 (8)
- October 2024 (7)
- September 2024 (10)
- August 2024 (10)
- July 2024 (12)
- June 2024 (14)
- May 2024 (17)
- April 2024 (11)
- March 2024 (14)
- February 2024 (4)
- January 2024 (17)
- December 2023 (1)
- November 2023 (4)
- October 2023 (5)
- September 2023 (1)
- July 2023 (5)
- June 2023 (5)
- May 2023 (4)
- April 2023 (2)
- March 2023 (4)
- January 2023 (12)
- December 2022 (2)
- November 2022 (4)
- September 2022 (1)
- August 2022 (1)
- July 2022 (2)
- June 2022 (2)
- May 2022 (6)
- April 2022 (4)
- March 2022 (6)
- January 2022 (1)
- December 2021 (3)
- November 2021 (3)
- October 2021 (1)
- May 2021 (2)
- April 2021 (3)
- March 2021 (1)
- January 2021 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (7)
- April 2019 (1)
- March 2019 (2)
- February 2019 (1)
CalCom Hardening Solution (CHS) is the ideal choice for IT Ops & CISOs looking to create a secured configured infrastructure.
CHS is a flexible hardening tool, with the unique ability to ‘learn’ where desired hardening changes will adversely impact production activity. CHS determines the impact of baseline changes before they implemented, producing visible conclusions for decision-makers. CHS eliminates time-consuming lab testing, reduces the cost and impact of hardening, and centering infrastructure control, thereby stopping security breaches and operational mistakes.
How Can CalCom Hardening Suite Make a Huge Difference In Server Hardening:
- Cost effective server hardening process: Save time and resources required for testing security policies in lab environments.
- Zero server outages: Ensure that production services are not harmed during server hardening.
- Prevent & monitor unauthorized policy changes: Stop security breaches and operational mistakes before they happen.
Make Your Hardening Project Effortless.