Blog Posts Tagged with "DISA"
The Urgent Need for Mobile Device Security Policies
November 20, 2011 Added by:Kevin Johnson
When gaps are uncovered in an environment, they must be augmented with new policies, as is the case with mobile devices. The need for businesses and government to establish strong policies for mobile environments and the protection of information used with mobile devices is immediate...
Comments (0)
Red Hat 5 STIG: Kernel Modules
August 29, 2011 Added by:Jamie Adams
The new draft STIG requires entries in a configuration file to prevent the kernel from loading modules – even if the modules aren't installed on the system. Nonetheless, I have compiled a list of the required settings which must be set in your modprobe.conf configuration file...
Comments (0)
Red Hat 5 STIG: Network Settings
August 23, 2011 Added by:Jamie Adams
I would caution administrators from rushing to add all because most are defaults. The settings must be implicitly set in the sysctl.conf config file. My recommendation is to review the entire STIG in order to define a complete sysctl.conf file, so that it can be deployed and tested all at once...
Comments (0)
Getting Started with the New Red Hat 5 STIG
August 18, 2011 Added by:Jamie Adams
The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...
Comments (2)
DoD to Carry Out Clandestine Operations in Cyberspace
May 11, 2011 Added by:Headlines
"There is a lack of historical precedent for what constitutes traditional military activities in cyberspace... Section (962) would clarify that the Secretary of Defense has the authority to conduct clandestine cyberspace activities in support of military operations..."
Comments (0)
DISA UNIX STIG for Red Hat Enterprise Linux 5 and 6
February 10, 2011 Added by:Jamie Adams
Organizations which use Red Hat Enterprise Linux 5 and must adhere to the DISA UNIX STIG have been stuck with documentation and assessment tools which only support up to Red Hat Enterprise Linux 4. This frustrates system administrators because they must deal with false positives From SRR scripts...
Comments (2)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider