article thumbnail

Malware and Antivirus Systems for Linux

Galido

Each computer system may have a malware or viruses, including Linux. Fortunately, there are only a few viruses which can affect Linux, but users are usually not installing antivirus software but later on they pray that their OS is not endangered. Thankfully, a low-footprint software exists for Linux. Linux Viruses.

Linux 60
article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. Having this OS on your desktop allows you to relax a little bit when it comes to many forms of security breaches, which would probably inflict serious damage to less security-oriented systems.

Linux 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Backups | Roadmap to Securing Your Infrastructure

Linux Academy

As information security professionals, it may not be our job to manage system backups, but it is our job to realize the importance backups have in the realm of information security. So, now that we’ve established backups are a part of information security, what’s next? Vulnerability Scanning.

Backup 60
article thumbnail

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the information security industry, one thing we cannot do is become stagnant. CIS (Center for Internet Security) releases a “Top 20 Security Controls” list every year. The post March Intro | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog. 1 or 2 on that list.

article thumbnail

Roadmap to Securing Your Infrastructure

Linux Academy

“Cyber” encompasses all things computer-based, including the internet, phones, and even our refrigerators and coffee pots. As an information security professional, I’m often asked, “What can I do to make my company safe from cyber threats?” However, we are continuously fighting off “cyber” attacks. Are you with me?

article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

To ensure ongoing security site reliability engineers must work hand-in-hand with the CISO’s (Chief Information Security Officer) office to implement Kubernetes security. Kubernetes out-of-the-box doesn’t exactly default to a secure enterprise grade cluster. Server Hardening.

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Their experience makes theirs perfect security blog to stay up-to-date with the latest zero-day threats and cybersecurity news. Help Net Security. Help Net Security has been a valuable resource for information security news since 1998. Zone Alarm Cyber Security Blog. Info Security Magazine.

Resources 113