Remove Industry Remove Information Security Remove Linux Remove Security
article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! We will test you on common security misconfigurations that open doors to attackers!

Linux 60
article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! We will test you on common security misconfigurations that open doors to attackers!

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Self-Audits | Roadmap to Securing Your Infrastructure

Linux Academy

However, in information security, I believe we should embrace audits and advocate for them. Now, before you think I’m crazy — hear me out, because it’s important and here’s why: Security Audits Find Red Flags. After years in the industry, I now look at audits with appreciation. Is it logged?

article thumbnail

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

March is upon us as we continue with our roadmap to securing your infrastructure. Hopefully, February’s posts reignited your passion for security. In the information security industry, one thing we cannot do is become stagnant. The security mindset. We deal with troubles day in and day out and get run down.

article thumbnail

Backups | Roadmap to Securing Your Infrastructure

Linux Academy

As information security professionals, it may not be our job to manage system backups, but it is our job to realize the importance backups have in the realm of information security. So, now that we’ve established backups are a part of information security, what’s next? What does this mean to us?

Backup 60
article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

Critical Start today released its biannual Cyber Intelligence Report, featuring the top threats observed in the first half of 2023 and emerging cybersecurity trends impacting the healthcare, financial services, and state and local government industries.

Trends 72
article thumbnail

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined.