Remove Authentication Remove Linux Remove Security Remove Transportation
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

To ensure ongoing security site reliability engineers must work hand-in-hand with the CISO’s (Chief Information Security Officer) office to implement Kubernetes security. Kubernetes out-of-the-box doesn’t exactly default to a secure enterprise grade cluster. Server Hardening. Server Hardening. Rotate Your Certificates.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Researchers have uncovered a potential security flaw in Apple Silicon CPUs; more details in this 9to5Mac article. I’m not sure how I feel about security researchers calling this flaw “not that bad.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. 509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). It provides the basics behind X.509v3

Storage 60
article thumbnail

Learning NVP, Part 4: Adding Hypervisors to NVP

Scott Lowe

I’m assuming that you’ve already gone through the process of getting KVM installed on your Linux host; if you need help with that, a quick Google search should turn up plenty of “how to” articles (it’s basically a sudo apt-get install kvm operation). Create a Transport Zone. Click Save. Here’s how.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.