Remove Authentication Remove Blog Remove Linux Remove Security
article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 112
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list. Of course, I need to securely configure my devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. An attempt to help secure open wireless networks with Opportunistic Wireless Encryption (OWE).

article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

Hinds is the project founder of Sigstore, a tool to verify and authenticate software artifacts. Hinds is also a founding board member of the Linux Foundation’s OpenSSF, a cross-industry effort to improve open-source software security, and was a distinguished engineer at Red Hat. Madrona previously backed Heptio.

article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

In today’s interconnected world, data security has never been more important. By training your IT staff to keep your systems secure, you can prevent harmful or costly data breaches. If your organization handles either of these sensitive data types, you must follow guidelines to keep your systems secure. Security policies.

article thumbnail

Passwords and Policies | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to our weekly blog post as we look at how to better secure your infrastructure. Last week, we discussed the use of password managers and multi-factor authentication (MFA). Early on in my security days, I was introduced to policies, which, at the time, I thought were a waste of time.

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Identity and security. Implement authentication. Implement secure data solutions.