Articles

Lead Image © limbi007, 123RF.com

Lead Image © limbi007, 123RF.com

Secure Kubernetes with Kubescape

Kubescape checks Kubernetes container setups for security and compliance issues, making life easier for administrators.
Lead Image © Aleksey Mnogosmyslov, 123RF.com

Lead Image © Aleksey Mnogosmyslov, 123RF.com

DevSecOps with DefectDojo

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Photo by Stoochi Lam on Unsplash

Photo by Stoochi Lam on Unsplash

Centralized monitoring and intrusion detection

Security Onion bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.
Photo by Karsten Würth on Unsplash

Photo by Karsten Würth on Unsplash

Self-hosted remote support

RustDesk supports self-hosted cross-platform remote support and maintenance. The client and optional basic server are open source and available free of charge.
Photo by Nathan Roser on Unsplash

Photo by Nathan Roser on Unsplash

Optimizing domain controller security

Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.

Bridging the Gap: The First Enterprise-Grade Linux Solution for the Cloud-to-Edge Continuum

SPONSORED: As the Linux market is set to soar to nearly USD 100 billion by 2032, businesses are facing mounting challenges in managing increasingly complex workloads spanning from the cloud to the edge. Traditional Linux distributions are not built to meet the specific demands of these modern use cases, creating an urgent need for a more specialized, enterprise-grade solution.
Photo by cdd20 on Unsplash

Photo by cdd20 on Unsplash

A feature-rich drop-in-replacement for Microsoft Exchange

Grommunio is a completely open source and fully compatible drop-in replacement for Microsoft Exchange that uncouples your company from Microsoft's cloud strategy and its severe security and data protection issues.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

An army of Xeon cores to do your bidding

Explore low-cost parallel computing.
Lead Image © Nah Ting Feng, 123RF.com

Lead Image © Nah Ting Feng, 123RF.com

Detecting system compromise

Runtime Integrity services provide assurance that a system is uncorrupted, offering increased confidence in core security services and the potential for enhanced security decisions across many use cases through the incorporation of integrity information in their inputs.
Lead Image © Sebastian Duda, 123RF.com

Lead Image © Sebastian Duda, 123RF.com

Build and host Docker images

When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.