Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
Most exchange backends still run on Linux - matching engines, market-data services, FIX gateways, and high-throughput trading ...
These days, it's more important than ever to tighten up the security on your servers, yet if you were to look at several official hardening guides, they read as though they were written for Red Hat ...
While traditional Enterprise Linux waits for patches, RLC-H detects and disrupts kernel exploits at runtime, protecting enterprise infrastructure during the critical window before vulnerabilities are ...
Claim your complimentary eBook (worth $31.99) for free, before the offer expires today on Dec 15. From creating networks and servers to automating the entire working environment, Linux has been ...
Trusted Computer Solutions (TCS), a developer of cross-domain, operating system and network security solutions, has announced that it has partnered with Vicom Infinity, an IBM Premier Business Partner ...
Apply a few basic hardening principles to secure your cloud environment. I've written about simple server-hardening techniques in the past. Those articles were inspired in part by the Linux Hardening ...
A friend of mine is on the mildly paranoid train and sends everything through encrypted email to me, so this is kind of giving me an excuse to work on building a Linux desktop I can use for this. I'm ...