April 4, 2024, 4:16 p.m. | Stefan Hudelmaier

DEV Community dev.to

I don't have to tell you how important it is to make sure that your systems are not vulnerable to attacks. There are a number of complementary measures that you should implement. Here is an (incomplete) list:



  • Keeping your software supply chain secure

  • Protecting your systems from outside access through Firewalls and VPNs

  • Making sure that the operation system is always up-to-date in terms of security patches

  • Continuous scanning for vulnerabilities on the systems

  • Continuous scanning for vulnerabilities from the …

access attacks continuous cybersecurity don firewalls important list making monitoring nmap protecting security software software supply chain supply supply chain systems vpns vulnerability vulnerable

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom