Articles

Right-Sized  

We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.

Negotiating Hurdles  

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.

Inspection  

Kubescape checks Kubernetes container setups for security and compliance issues, making life easier for administrators.

The Early Bird  

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.

Alarm System  

Security Onion bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.

Guardian Angel  

The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file integrity checks, Windows registry monitoring, and rootkit detection. It can be deployed virtually anywhere and supports the Linux, Windows, and macOS platforms.

The Clock Is Ticking  

Disconnect OpenSSH user sessions after a certain period of inactivity with the systemd-logind service.

Disconnected  

Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.

From A to B  

We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.

One Against All  

Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.