Tags: security

The 4 Major Tenets of Kubernetes Security

In a previous article, we learned about the threats to a Kubernetes deployment that may result in a multitude of compromises and undesirable scenarios. With these threat models in mind, we can now explore Kubernetes security along four major tenets: authentication and authorization resource...
Read 0 Comments

pgp-security.jpg

PGP
If you write code that goes into public source repositories, you can benefit from the practical PGP guidelines provided in this series.

Protecting Code Integrity with PGP — Part 1: Basic Concepts and Tools

In this article series, we take an in-depth look at using PGP to ensure the integrity of software. These articles will provide practical guidelines aimed at developers working on free software projects and will cover the following topics: PGP basics and best practices How to use PGP with Git...
Read 0 Comments

How to Measure the Efficacy of Your Container Security Solution with Real World Exploits

There has never been a better time to be a DevOps engineer. Compared to traditional web stacks, containerization has dramatically streamlined the task of deploying web services such as databases, key/value stores and servers. Furthermore, container orchestration tools, like Google’s Kubernetes and...
Read 0 Comments

KPTI/KAISER Meltdown Initial Performance Regressions

The recently revealed Meltdown and Spectre bugs are not just extraordinary issues of security, but also performance. The patches that workaround Meltdown introduce the largest kernel performance regressions I've ever seen. Many thanks to the engineers working hard to develop workarounds to these...
Read 0 Comments

fish-1907607_1920.jpg

Seahorse
Learn how to manage both PGP and SSH keys with the Seahorse GUI tool.

How to Manage PGP and SSH Keys with Seahorse

Security is tantamount to peace of mind. After all, security is a big reason why so many users migrated to Linux in the first place. But why stop with merely adopting the platform, when you can also employ several techniques and technologies to help secure your desktop or server systems. One such...
Read 0 Comments

toys-2670425_1280.jpg

chatbot
Emotionally vulnerable chatbot Replika is based on open source software so the world can build on its emotional intelligence.

This Week in Open Source News: Emotional Chatbots, LF Networking Fund & More

This week in open source and Linux news, developer Eugenia Kuyda's fascinating open source-built chatbot is emotionally intelligent,  The Linux Foundation forms new networking umbrella, & more!  Software developer Eugenia Kuyda is releasing the code to her chatbot, which can apply emotion into...
Read 0 Comments

Embracing the Cultural Shift that Comes with Secure DevOps

As organizations strive to innovate quickly and be more agile, development teams are driven to deliver code faster and with more stability. Enter DevOps, which Gartner characterizes as the rapid and agile iteration from development into operations, with continuous monitoring and analytics at the...
Read 0 Comments

Mitigating Known Security Risks in Open Source Libraries

This is an excerpt from Securing Open Source Libraries, by Guy Podjarny. Read the preceding chapter or view the full report. There are several ways to fix vulnerable packages, but upgrading is the best choice. If that is not possible, patching offers a good alternative. The following sections...
Read 0 Comments

Reckoning the Spectre and Meltdown Performance Hit for HPC

While no one has yet created an exploit to take advantage of the Spectre and Meltdown speculative execution vulnerabilities that were exposed by Google six months ago and that were revealed in early January, it is only a matter of time. The patching frenzy has not settled down yet, and a big...
Read 0 Comments

A Fast-Evolving New Botnet Could Take Gadgets in Your Home to the Dark Side

Satori is built to turn routers, thermostats, and other household devices into zombies. There’s a new botnet in town. Since December, security researchers have been tracking an insidious piece of malware called Satori, which hijacks internet-connected devices and turns them into “zombies” that can...
Read 0 Comments

Pages

Click Here!