Tags: passwords

Cloud Security Best Practices: Finding, Securing, & Managing Secrets, Part 1

Secrets — passwords, API keys, secure tokens, private keys, and so on — protect access to sensitive resources in your environment. If not properly managed, they can end up in the wrong hands. In Part 1 of this post, we will show you how to find secrets using truffleHog and git-secrets. In Part 2,...
Read 0 Comments

4 Ways to Improve your Security Online Right Now

The last few years have seen a massive jump in the frequency of reports about digital security breaches and personal privacy issues, and no doubt this trend will continue. We hear about scammers moving to social media, nations using cyberattacks as part of coordinated offensive strategies, and the...
Read 0 Comments

keep-hackers-out.jpg

Computer security
Mike Guthrie answers some of the security-related questions received during his recent Linux Foundation webinar. Watch the free webinar on-demand.

How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered

Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they have made it in. This time, I’ll answer some of the excellent security questions I received during my recent Linux Foundation webinar. Watch the free webinar on-demand. How...
Read 2 Comments

The H Factor – Why You Should Be Building “Human Firewalls”

It is often the illusive “H Factor” – the human element – that ends up being the weakest link that makes cyber-attacks and data breaches possible, sometimes even more so than hackers exploiting zero-day system vulnerabilities or employing new malware.  According to the 2016 Verizon DBIR, human...
Read 0 Comments

binary-1188510_1920.jpg

security
Make your OpenSSH sessions more secure with these simple tips.

5 SSH Hardening Tips

When you look at your SSH server logs, chances are they are full of attempted logins from entities of ill intent. Here are 5 general ways (along with several specific tactics) to make your OpenSSH sessions more secure. 1. Make Password Auth Stronger Password logins are convenient, because you can...
Read 6 Comments
Click Here!