Remove Authentication Remove Open Source Remove Operating Systems Remove Storage
article thumbnail

Technology Short Take 176

Scott Lowe

This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. Rory McCune explains Kubernetes authentication. Operating Systems/Applications Here’s one person’s take on sudo for Windows.

Linux 112
article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud.

Cloud 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. marks the first release of the open source container orchestration platform that is signed using Sigstore (more details here ). Operating Systems/Applications. Kubernetes 1.24 Programming.

article thumbnail

Technology Short Take 111

Scott Lowe

VyOS is an open source Linux-based network operating system.). Part 1 covers auto-unsealing Vault ; part 2 covers authenticating to Vault using instance metadata ; and part 3 discusses authenticating to Vault using an IAM user or role. Operating Systems/Applications. Go check out part 2.

article thumbnail

Technology Short Take 165

Scott Lowe

Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Lee Briggs covers the plethora of ways to authenticate to AWS. Welcome to Technology Short Take #165!

article thumbnail

Technology Short Take 116

Scott Lowe

As would be expected with any maturing open source project that is starting to see increased adoption, Kubernetes has seen its share of security vulnerabilities over the last couple of months. Lennart Koopmann provides a guide to Yubikey authentication in the real world. Operating Systems/Applications.

Storage 60