Remove Authentication Remove Linux Remove Open Source Remove Security
article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 112
article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

(Stacklok Photo) A pair of cloud computing vets are jumping back into entrepreneurship with a new startup that helps enterprises vet software supply chains amid a rise in cyber-breaches stemming from open-source code. Hinds is the project founder of Sigstore, a tool to verify and authenticate software artifacts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Microsoft, under Satya Nadella, has taken a new stance on open-source , which to some is a complete flip-flop from the Microsoft of the past. Windows Subsystem for Linux (WSL). Visual Studio Code.

Linux 143
article thumbnail

Technology Short Take 136

Scott Lowe

The content this time around seems to be a bit more security-focused, but I’ve still managed to include a few links in other areas. Rory McCune points out that Kubernetes is a router , and users should not rely on the fact that pods are not accessible from the outside by default as any form of a security barrier. Networking.

Linux 60
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Since we’re on a bit of a security kick this time around, then the recent announcement by HyTrust of HyTrust CloudControl 6.0 Networking.

Linux 60
article thumbnail

Technology Short Take 165

Scott Lowe

Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Lee Briggs covers the plethora of ways to authenticate to AWS. Welcome to Technology Short Take #165!

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Give it a look if you’re interested in learning more.