Blog
Customizing Security with Security Configuration Management (SCM)
By Michael Betti on Thu, 02/22/2024
Many of the breaches of the past ten years have taken advantage of weak or nonexistent security settings. Conversely, for example, companies that configured their Docker application to the CIS recommended security settings for container users and privileges were not as vulnerable to container escape exploits. Arguably, a configuration change...