Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter, explore the rise in Linux malware, what this means for you and your business, and how to protect against this growing threat. 

In addition, we discuss a unified endpoint management and security solution we love that can automate Linux patch management and make the process simple, efficient and effective.

Finally, we explain how your physical security strategy is essential to your cybersecurity healththe main methods of blending cyber and physical security and the critical role that open-source intelligence (OSINT) plays in facilitating the convergence of physical security and cybersecurity.

Hope you enjoy!

Yours in Open Source,

Brittany Signature 150

7.Locks HexConnectionsIn this article, we we explain how your physical security strategy is essential to your cybersecurity health, the main methods of blending cyber and physical security and the critical role that open-source intelligence (OSINT) plays in facilitating the convergence of physical security and cybersecurity.

Learn About Cyber-Physical Security>

 

22.Lock ScreenEffectIn this article, we explore the rise in Linux malware, what this means for you and your business, and how to protect against this growing threat.

Learn About Linux Malware>

 

32.Lock Code CircularPatching endpoints is one of the most exhausting and redundant tasks that Linux admins are burdened with, but keeping up with the latest security updates is crucial in maintaining a robust security posture. Learn about a unified endpoint management and security solution we love that can automate Linux patch management and make the process simple, efficient and effective.

Learn How To Automate Patch Management>