Remove Architecture Remove Comparison Remove Operating Systems Remove Security
article thumbnail

Technology Short Take 167

Scott Lowe

Security GitHub recently had to change their RSA SSH host key ; be sure to check out the details. Rory McCune examines some container security fundamentals that arise from the fact that “containers are just processes. Operating Systems/Applications In Technology Short Take 166 , I mentioned Nick Schmidt’s article on D2.

article thumbnail

Microsoft secures your place in the world of business

Dataconomy

The Microsoft Certified Solutions Associate and Microsoft Certified Solutions Expert certifications cover a wide range of topics related to Microsoft’s technology suite, including Windows operating systems, Azure cloud computing, Office productivity software, Visual Studio programming tools, and SQL Server databases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 138

Scott Lowe

I recently came across this series on AWS security by ScaleSec. Here’s Chip Zoller’s comparison of Gatekeper and Kyverno. Operating Systems/Applications. Operating Systems/Applications. Want/need to better understand IPv6? Denise Fishburne has you covered. There’s a lot here!

IPv6 60
article thumbnail

DCAP Systems: Protecting Your Data with Advanced Technology

SecureWorld News

One of the most important responsibilities of security professionals is to avoid data breaches. Many advanced security systems cannot prevent a scenario in which a user takes a screenshot from a confidential document and then sends it via Telegram to an unauthorized recipient. What is Data-Centric Audit and Protection?

System 75
article thumbnail

Technology Short Take 135

Scott Lowe

SilentKnight is a set of security tools/checks for macOS. This list of best practices for securing OpenSSH systems may be useful. Here’s a two-part series (so far) on setting up a multi-architecture Kubernetes cluster ( part 1 , part 2 ). Operating Systems/Applications. Lots of geekery in here!

Linux 60
article thumbnail

Liveblog: Deep Dive on Amazon Elastic File System

Scott Lowe

Having covered these approaches, Naim returns to file storage (naturally) and talks about why file storage is popular: Works natively with operating systems. With regards to security, EFS offers a number of security-related features. Network access to EFS is controlled via security groups and NACLs.

System 60
article thumbnail

Technology Short Take 113

Scott Lowe

Diógenes Rettori has a comparison of Istio and Linkerd as solutions for service mesh. Keybase discusses some challenges with encrypted chat applications and how their architecture avoids some of those challenges. Operating Systems/Applications. Here’s a good article on packets-per-second limits in EC2.

Vmware 60