Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Will the pre-pandemic norm of exclusively in-office work ever return? The answer is a resounding no. What was coined as the new normal in 2020 has seamlessly transitioned into the normal of 2023 and beyond. Research from Gartner® forecasts that "almo...
Will the pre-pandemic norm of exclusively in-office work ever return? The answer is a resounding no. What was coined as the new normal in 2020 has seamlessly transitioned into the normal of 2023 and beyond. Research from Gartner® forecasts that "almost 50% of employees will continue to work remotely post COVID-19."
Fall of August 1991: Linus Torvalds, a student at the University of Helsinki, creates an operating system as a hobby. The motive? Creating a free, open-source alternative to MINIX.
Since the beginning of the modern internet, distributed denial of service (DDoS) attacks have been a scourge. The first known example of a major DDoS attack happened in 1996 when prominent New York commercial internet provider Panix suffered an attack that knocked its servers offline for several days. In the years since then, the size and scope of DDoS attacks have grown, alongside a significant increase in their frequency.
Scaling a software application successfully is no small feat. Like raising a child, it requires planning, having the right foundations, and being prepared to adapt along the way. Just as kids outgrow clothes and need bigger shoes, our software creations need room to grow and stretch as user demand escalates. That's where scalability comes in - the capacity to handle increased usage without breaking stride.
Linux security is anything but stagnant. It’s no secret that cybercriminals are exploiting the growing popularity of the OS and the high-value servers and devices it powers worldwide with new and evolving attacks such as malware and rootkits. Despite the reputation Linux has earned of being an exceptionally secure and stable OS, Linux malware is on the rise, and the number of new Linux malware variants reached a record high in the first half of 2022, as researchers discovered nearly 1.7 million samples during this period.
System administrators make mistakes, and that's fine as long as they learn from them. Learning from your mistakes will develop more skills, advance your career, and make you a better systems admin. However, It's also helpful to learn from the blunders of others. This is why I've compiled a list of 10 common mistakes system admins make and how to address these problems.
Web applications are an integral part of most business operations today. They are commonly used for storing, processing, or transmitting data in various business operations. However, these web applications are often exposed to huge cyber risks. They attract malicious hackers who exploit the application vulnerabilities for their personal gain, thereby raising major web application security concerns. To address this growing concern thorough penetration testing should be performed to proactively assess the applications and identify vulnerabilities in them. This security testing technique is an effective way of identifying security gaps and addressing them immediately. We will elaborate on this technique in detail and explain the importance of web application penetration testing. But first, let us understand what a web application penetration test is.
Whenever you buy something, you receive the product of a massive collaboration, not just one company. That shirt started as raw materials at cotton farms that passed through logistics providers to get to manufacturers, who sent it through more trucking companies to land at a retailer. Just as physical products pass through this supply chain, so does software.
With online privacy and security becoming increasingly critical concerns, VPNs have gained immense popularity recently. Nevertheless, an abundance of false information about this tool for safeguarding online privacy is circulating.
Email is one of the most prominent methods of modern business communication. It acts as a critical dissemination channel for sharing legal documents and other confidential business information in any formal environment. However, email is also the root cause of over 90% of all cyberattacks such as phishing, URL spoofing, malicious attachments, trojans, and malware.
If you’ve been keeping up with security news, you may have noticed that it seems as if there have been an increasing number of attacks on Linux in recent years. The number of new Linux malware variants reached a record high in the first half of 2022, as nearly 1.7 million samples were discovered.
In today's rapidly evolving digital landscape, where agility and scalability are paramount, traditional software deployment methods often fall short. Container technology is a game-changing innovation that has revolutionized how software is deployed, managed, and scaled. It offers many benefits, ensuring that applications run consistently regardless of the hosting environment.
No matter how often you go online and how or why you primarily use the Internet, you’ve probably seen phishing attack attempts. They’re now so common and problematic that cybersecurity professionals regularly provide information to help people spot and avoid phishing attacks.
There are many factors to consider when choosing an OS, security being among one of the most critical. The general consensus among experts is that Linux is the most secure OS by design - an impressive feat that can be attributed to a variety of characteristics including its transparent open-source code, strict user privilege model, diversity, built-in kernel security defenses and the security of the applications that run on it.
It is no secret that the OS you choose is a key determinant of your security online. After all, your OS is the most critical software running on your computer - it manages its memory and processes, as well as all of its software and hardware. The general consensus among experts is that Linux is a highly secure OS - arguably the most secure OS by design. This article will examine the key factors that contribute to the robust security of Linux, and evaluate the level of protection against vulnerabilities and attacks that Linux offers administrators and users.
WordPress is one of the most popular content management systems in the world due to the ability it gives non-technical, inexperienced users to create professional, effective websites. According to data from W3Techs, WordPress was used by 43% of all websites on the Internet in 2022.