As Linux and Security Evolves, So Has LinuxSecurity.com!
Discover LinuxSecurity Features
Interview with Security Expert and Author Ira Winkler: Advanced Persistent Security, Threat Intelligence, Social Engineering and more
Brittany Day recently had a conversation with acclaimed cyber security expert Ira Winkler, author of Advanced Persistent Security: A Cyberwarfare Approach. Mr. Winkler is a security researcher and a former NSA employee who writes about cyber security and enterprise digital threat protection.
In the tech giant’s largest deal ever and one of the biggest deals in US history, IBM closed its $34 billion acquisition of Red Hat on Tuesday July 9, 2019. Red Hat will now be a unit of IBM’s hybrid cloud division and Red Hat CEO Jim Whitehurst will join IBM’s senior management team. This event has significant meaning that extends beyond is monetary value: it is a testament to the power of Open Source and the opportunity it offers businesses of all sizes across all industries.
Guardian Digital Celebrates 20 Years of Revolutionizing Digital Security, Securing Email with Open Source
Pioneers of business email security for the past 20 years, Guardian Digital draws on the merits of Open Source coupled with expert engineering and unparalleled customer support.
Press Release: Guardian Digital Leverages the Power of Open Source to Combat Evolving Email Security Threats
Cloud-based email security solution utilizes the open source methodology for securing business email, recognized by many as the best approach to the problem of maintaining security in the relentlessly dynamic environment of the Internet.
Is your solution doing enough to protect your users? This article helps you to decide.
These days, the words “spam email” and “data breach” are commonplace. With an estimated 3.8 billion email users worldwide (Radicati Group), it is no surprise that scammers and cyber criminals frequently utilize email as a vector to carry out their attacks. Most email users are aware of this exploitation, and many have taken what they believe are the necessary measures to secure their email accounts.
LinuxSecurity debunks some common myths and misconceptions regarding open source and Linux by answering a few Linux-related frequently asked questions.
After many months of development by a dedicated team of programmers and beta testers, the new LinuxSecurity is almost ready! With an all new look & feel, organizational changes, security events, and additions to our staff, we hope to better serve the Linux and open source community. Although there are many aesthetic improvements, a major part of our development has focused on creating a content structure and backend system that is easy to update.
As Linux and security evolves, so has Linuxsecurity.com!
Since 1996, Linuxsecurity.com has been the most comprehensive resource for all things in the world of security and open source. And as open source continues its rise in securing the world's information, we are continuing our pursuit in being at the forefront of this exciting growth. So we are unveiling the new look of Linux Security.
Resiliency is an important factor to consider when evaluating an email security solution, yet this characteristic often goes overlooked.
Blockchain, being a decentralized & dis-intermediated data store, is being considered for rapid adoption, in several industries like Supply Chain Management, P2P Global Transactions, Internet of Things, Electoral Voting, Stock Exchanges etc...
Defcon 26 provided individuals and organizations with valuable tips and insight on security and the latest and most effective defenses. Here are some security-related highlights from the event.
Cyber threats are more sophisticated and dangerous than ever before! Are you securing your email accounts with a solution that is capable of preventing these advanced attacks?