Tags: Chrony

CII Audit Identifies Most Secure NTP Implementation

Since its inception the CII has considered network time, and implementations of the Network Time Protocol, to be “core infrastructure.” Correctly synchronising clocks is critical both to the smooth functioning of many services and to the effectiveness of numerous security protocols; as a result...
Read 0 Comments
Click Here!