Remove Engineering Remove Firewall Remove Linux Remove Operating Systems
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

To ensure ongoing security site reliability engineers must work hand-in-hand with the CISO’s (Chief Information Security Officer) office to implement Kubernetes security. Vulnerabilities at the operating system level may be exploited by rogue container workloads if not hardened. Use The Right Installer.

article thumbnail

Technology Short Take #77

Scott Lowe

In a bit of an older post from late summer 2016, Matt Oswalt outlines why network engineers should care about the network software supply chain. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. Operating Systems/Applications. This is a highly technical article on scheduling in the Linux kernel , but it’s well worth reading.

Linux 60
article thumbnail

Technology Short Take #46

Scott Lowe

This post by Matt Oswalt—the first in a series, apparently—provides a great introduction to 5 development tools for network engineers. It was good to read this post on Cumulus Linux first impressions by Jeremy Stretch. Operating Systems/Applications. I hope you are able to glean something useful. Networking.

Vmware 69
article thumbnail

The good, the bad and the ugly of the cyber west

Dataconomy

The organization’s security team then works to implement these recommendations, which may involve patching software, configuring firewalls, or implementing additional security controls. She uses publicly available sources like social media, DNS records, and search engines to identify potential entry points and weaknesses.

Network 45
article thumbnail

Technology Short Take #50

Scott Lowe

This is kind of cool, and (in my humble opinion) a sign of changing times: Juniper has Vagrant boxes as well as a Vagrant plugin for working with vSRX (virtual firewall) VMs (via this article from Matt Oswalt). Here are some general guidelines for configuring syslog forwarding on a Cisco ASA firewall. Operating Systems/Applications.

Vmware 60
article thumbnail

Technology Short Take 132

Scott Lowe

” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Operating Systems/Applications. Servers/Hardware.