article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. Once we’ve created guidelines and templates for deploying secure devices and operating systems, we’re finished, right?

article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

If your organization handles either of these sensitive data types, you must follow guidelines to keep your systems secure. The Linux Audit system is a great solution. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. Compliance Scanning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The good, the bad and the ugly of the cyber west

Dataconomy

They possess skills similar to white hat hackers but may not always follow ethical guidelines. The organization’s security team then works to implement these recommendations, which may involve patching software, configuring firewalls, or implementing additional security controls. Featured image credit : Kerem Gulen/Midjourney.

Network 45
article thumbnail

Technology Short Take #50

Scott Lowe

This is kind of cool, and (in my humble opinion) a sign of changing times: Juniper has Vagrant boxes as well as a Vagrant plugin for working with vSRX (virtual firewall) VMs (via this article from Matt Oswalt). Here are some general guidelines for configuring syslog forwarding on a Cisco ASA firewall. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #57

Scott Lowe

Kirk Byers has a helpful article that provides some suggestions and guidelines for how to make your network automation/network scripts become more than just your own personal hobby at work. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy.

Windows 60