Tags: security

lets-encrypt-security.jpg

Let's Encrypt
We’re incredibly close to a Web that is more encrypted than not, says Josh Aas in this update from the Let’s Encrypt project.

3 Lessons in Web Encryption from Let’s Encrypt

As exciting as 2016 was for encryption on the Web, 2017 seems set to be an even more incredible year. Much of the infrastructure and many of the plans necessary for a 100 percent  encrypted Web really solidified in 2016, and the Web will reap the rewards in 2017. Let’s Encrypt is proud to have been...
Read 0 Comments

security-tips.jpg

security tips
In this series, we’ll cover essential information for keeping hackers out of your system. Watch the free webinar on-demand for more information.

How to Keep Hackers out of Your Linux Machine Part 2: Three More Easy Security Tips

In part 1 of this series, I shared two easy ways to prevent hackers from eating your Linux machine. Here are three more tips from my recent Linux Foundation webinar where I shared more tactics, tools and methods hackers use to invade your space. Watch the entire webinar on-demand for free. Easy...
Read 1 Comments

Google Ventures into Public Key Encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys. Google announced an early prototype of Key Transparency, its latest open source effort to ensure simpler, safer, and secure communications for everyone. The project’s goal is to make it easier for...
Read 0 Comments

Google Infrastructure Security Design Overview

This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google. This infrastructure provides secure deployment of services, secure...
Read 0 Comments

gaming.jpg

game controller
Linux can take some credit in Windows upping its gaming game.

This Week in Open Source News: Linux Forces Improved Windows Gaming, Blockchain's Importance Surges in 2017 & More

This week in Linux and OSS news, Steven J. Vaughn-Nichols explains why Linux is forcing Windows to up its gaming game, blockchain is especially important in the current sociopolitical climate, and more! Read on to keep on top of the most important tech stories. 1)  Linux can take some credit for...
Read 0 Comments

Dockerfile Security Tuneup

I recently watched 2 great talks on container security by Justin Cormack from Docker at Devoxx Belgium and Adrian Mouat from Container Solutions at GOTO Stockholm. We were following many of the suggestions but there was still room for improvement. So we decided it was good time to do a security...
Read 0 Comments

key-openssl.jpg

OpenSSL
In this tutorial, Carla Schroder explains how to protect your Postfix/Dovecot mail server with OpenSSL.

OpenSSL For Apache and Dovecot: Part 2

Last week, as part of our meandering OpenSSL series, we learned how to configure Apache to use OpenSSL and to force all sessions to use HTTPS. Today, we'll protect our Postfix/Dovecot mail server with OpenSSL. The examples build on the previous tutorials; see the Resources section at the end for...
Read 0 Comments

The Basics of Web Application Security

We discussed how authentication establishes the identity of a user or system (sometimes referred to as a principal or actor). Until that identity is used to assess whether an operation should be permitted or denied, it doesn't provide much value. This process of enforcing what is and is not...
Read 0 Comments

The Hard Truths about Microservices and Software Delivery

Everybody’s talking about Microservices right now. But are you having trouble figuring out what it means for you?  At the recent LISA conference, I had the pleasure of giving a joint talk with Avan Mathur, Product Manager of ElectricFlow, on Microservices. With Microservices, what was once one...
Read 0 Comments

security-webinar.jpg

Keep hackers out
In this series, we’ll cover the five easiest ways to keep hackers out. Watch the free webinar on-demand for more information.

How to Keep Hackers out of Your Linux Machine Part 1: Top Two Security Tips

There is nothing a hacker likes more than a tasty Linux machine available on the Internet. In my recent Linux Foundation webinar I shared tactics, tools, and methods hackers use to invade your space. In this blog series, we’ll cover the five easiest ways to keep hackers out and know if they have...
Read 4 Comments

Pages

Click Here!