LearnAboutLinux.com

1 2

illusive networks' Deceptions Everywhere

Monday, 29 August 2016 - 11:11 AM - (Security)

illusive networks' bread and butter is its deception cybersecurity technology called Deceptions Everywhere whose approach is to neutralize targeted attacks and Advanced Persistent Threats by creating a deceptive layer across the entire network. more>>

Read More...

Contrast Security's Contrast Enterprise

Tuesday, 30 August 2016 - 13:30 PM - (Security)

The phrase with which Contrast Security describes the one-of-a-kind protection provided by the new Contrast Enterprise is "continuous application security". more>>

Read More...

iguaz.io

Friday, 02 September 2016 - 15:30 PM - (Security)

An IT megatrend in progress involves the shift from legacy monolithic apps running on enterprise storage to systems of engagement that interact with users, collect real-time data from many sources and store it in elastic and shared data services. more>>

Read More...

NordVPN for Android

Tuesday, 06 September 2016 - 13:08 PM - (Security)

The prospect of privacy protection and occulting your smartphone's IP address with a VPN are sufficient selling points, but the ability to watch your Spanish-dubbed Turkish telenovellas while on the beach in Tahiti should seal the deal for real. more>>

Read More...

Securing the Programmer

Tuesday, 13 September 2016 - 13:00 PM - (Security)

I have a favorite saying: "If you are a systems administrator, you have the keys to the kingdom. If you are an open-source programmer, you don't know which or how many kingdoms you have the keys to." We send our programs out into the world to be run by anyone for any purpose. Think about that: by anyone, for any purpose. more>>

Read More...

Synopsys' Coverity

Tuesday, 20 September 2016 - 16:11 PM - (Security)

The new version 8.5 of Synopsys' Coverity extends the security umbrella of the static analysis tool to mitigate a wider range of security vulnerabilities. more>>

Read More...

Android Browser Security--What You Haven't Been Told

Thursday, 22 September 2016 - 12:00 PM - (Security)

This article focuses on flaws in Android's stock web libraries, while acknowledging related exploits. Some modern Android browsers have critically weak encryption and other dangerous flaws that cannot be patched or otherwise corrected. This weakness extends to multiple browsers and applications and is determined by the linkage to the system webcore on older OS versions. more>>

Read More...

Secure Desktops with Qubes: Compartmentalization

Thursday, 13 October 2016 - 11:00 AM - (Security)

This is the third article in my series about Qubes. In the first two articles, I gave an overview about what Qubes is and described how to install it. more>>

Read More...

Let's Automate Let's Encrypt

Tuesday, 01 November 2016 - 10:08 AM - (Security)

HTTPS is a small island of security in this insecure world, and in this day and age, there is absolutely no reason not to have it on every Web site you host. Up until last year, there was just a single last excuse: purchasing certificates was kind of pricey. more>>

Read More...

Security Exercises

Thursday, 10 November 2016 - 11:12 AM - (Security)

Regular security exercises are, bar none, the most powerful, cost-effective tool for maturing a project's information security operations—when done well. more>>

Read More...

Example Security Exercises

Friday, 11 November 2016 - 14:20 PM - (Security)

The following is a list of security exercises you can try after reading Susan Sons' article "Security Exercises".

1) It's Gone more>>

Read More...

FutureVault Inc.'s FutureVault

Monday, 28 November 2016 - 13:35 PM - (Security)

Though short of Mr Torvalds' aim of world domination, FutureVault, Inc., has set the ambitious goal to "change the way business is done" with its FutureVault digital collaborative vault application. more>>

Read More...

Bruce Nikkel's Practical Forensic Imaging (No Starch Press)

Friday, 09 December 2016 - 18:37 PM - (Security)

Forensic image acquisition is an important part of the process of after-the-fact incident response and evidence collection. Digital forensic investigators acquire, preserve and manage digital evidence as part of criminal and civil court cases; they examine violations of organizational policy; and they analyze cyber attacks. more>>

Read More...

Secure Desktops with Qubes: Extra Protection

Thursday, 15 December 2016 - 15:33 PM - (Security)

This article is the fourth in my series about the Qubes operating system, a security-focused Linux distribution that compartmentalizes your common desktop tasks into individual VMs. more>>

Read More...

USMobile, Inc.'s Scrambl3

Monday, 19 December 2016 - 12:57 PM - (Security)

The special sauce in USMobile, Inc.'s Scrambl3, the mobile app that facilitates "the world's most private calls and messages", is a set of open-source components that create a top-secret-grade VPN, encryption algorithms and internet protocols. more>>

Read More...

1 2