Tags: security

Why Is the Kernel Community Replacing iptables with BPF?

Author Note: this is a post by long-time Linux kernel networking developer and creator of the Cilium project, Thomas Graf The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered...
Read 0 Comments

Docker Enterprise Edition 2.0 Launches With Secured Kubernetes

After months of development effort, Kubernetes is now fully supported in the stable release of the Docker Enterprise Edition. Docker Inc. officially announced Docker EE 2.0 on April 17, adding features that have been in development in the Docker Community Edition (CE) as well as enhanced enterprise...
Read 0 Comments

How to Scale Security with a Hardware Chain of Trust

A hardware-rooted chain of trust verifies the integrity of every relevant component in the cloud platform, giving you security automation that flexibly integrates into the DevOps pipeline. A true chain of trust would start in the host chip firmware and build up through the container engine and...
Read 0 Comments

Quantum Mechanics Could Solve Cryptography's Random Number Problem

Peter Bierhorst’s machine is no pinnacle of design. Nestled in the Rocky Mountains inside a facility for the National Institute of Standards and Technology, the photon-generating behemoth spans an entire building. Its lasers, mirrors, and lenses are split among three laboratories, two of them at...
Read 0 Comments

marten-mickos.jpg

Marten Mickos
Software security requires discipline and diligence, said Mårten Mickos, speaking at the Open Source Leadership Summit.

Software Security Is a Shared Responsibility

Achieving effective security takes constant discipline and effort on everyone’s part – not just one team or group within a company. That was Mårten Mickos’s message in his keynote speech appropriately titled, “Security is Everyone’s Responsibility,” at The Linux Foundation’s recent Open Source...
Read 0 Comments

Cybersecurity Vendor Selection: What Needs to Be in a Good Policy

Operating a company in the modern enterprise landscape requires a reliance, to some degree, on third-party vendors. It's unavoidable. But the addition of each new vendor brings with it a certain amount of risk. Starting small is key. Company leaders should work with their CISO or CSO to determine...
Read 0 Comments

Learn Advanced SSH Commands with the New Cheat Sheet

Secure Shell (SSH) is a powerful tool for connecting to remote servers. But with all that power comes a dizzying array of options and flags. The ssh client command has many options—some for daily use and some arcane. I put together a cheat sheet for some common SSH uses. It doesn't begin to cover...
Read 0 Comments

penguin_key.jpg

Linux kernel
The Linux Foundation will provide Linux maintainers with a free digital token to help improve the security of their PGP keys. Learn more.

Nitrokey Digital Tokens for Linux Kernel Developers

The Linux Foundation IT team has been working to improve the code integrity of git repositories hosted at kernel.org by promoting the use of PGP-signed git tags and commits. Doing so allows anyone to easily verify that git repositories have not been altered or tampered with no matter from which...
Read 0 Comments

Introduction: A New Quantum Revolution

When two good things get together, they can create something even better. That’s the case with quantum information—the marriage of quantum physics and computing theory. The National Institute of Standards and Technology (NIST) has contributed to much of its history and is helping to shape its...
Read 0 Comments

ipfire.png

IPFire
IPFire was designed for users new to firewalling, so it places a premium on user-friendliness.

IPFire: A User-Friendly Linux Firewall Distribution

Securing your network is an incredibly challenging task, one that’s made even more difficult by software that adds yet another layer of complexity on top. And let’s face it, most firewall tools are the stuff of user nightmare. That’s why, when a firewall tool strips away some of that complexity, it...
Read 0 Comments

Pages

Click Here!