Articles
Collecting application logfiles with Kubernetes
Modern scale-out environments with containers make log collection difficult. We present concepts and methods for collecting application logfiles with a sidecar container in Kubernetes environments.
Incident Analysis with The Hive and Cortex
Deployed together, The Hive platform and Cortex automation tool optimize the workflow for your incident response team.
High-performance backup strategies
A sound backup strategy with appropriate hardware and software ensures you can backup and restore your data rapidly and reliably.
Harden services with systemd
Systemd comes with a metric for determining the security of your system, letting you track how any service can be secured step-by-step in a sandbox.
Exploiting, detecting, and correcting IAM security misconfigurations
Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Zero Trust as a security strategy
Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.
Workspace ONE for endpoint management
VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
Clustering with the Nutanix Community Edition
The free Community Edition of the Nutanix hyperconverged infrastructure, Nutanix on-premises cloud, is offered alongside its commercial product for those looking to take their first steps in the environment.
Data Compression as a CPU Benchmark
Data compression is a more realistic compute benchmark than number crunching.
Hardware-enhanced security
Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.