Linux Security Week: May 16, 2022
Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we speak with industry-leading Linux endpoint encryption provider WinMagic about the challenges of securing today’s Linux endpoints, the importance of defense-in-depth and full disk encryption to support a Zero Trust strategy, and what is required to fortify a modern Linux infosec architecture with a robust endpoint security strategy.
We also examine how you can redirect all traffic of your Arch Linux or Kali Linux OS through the Tor Network to strengthen your privacy online with two free and open-source shell scripts we love: archtorify and kalitorify.
Finally, we invite you to share your knowledge with a community of fellow Linux security enthusiasts and make an impact by contributing an article for our site. Let's discuss! Read on to get the details on these critical topics.
Yours in Open Source,
Strengthen Your Linux Endpoint Security & Zero Trust Strategy with Defense-in-Depth & Endpoint EncryptionTo understand what is required to fortify the a modern Linux infosec architecture with a robust endpoint security strategy, we spoke with |
How To Create a Transparent Proxy through the Tor Network to Protect Your Privacy Online with archtorify & kalitorifyIf you are an Arch Linux or Kali Linux user looking to improve your privacy online with Tor, this article will explain how you can create a Transparent Proxy through the Tor Network to redirect all traffic of your OS through the Tor Network with two two free and open-source shell scripts we love: archtorify and kalitorify.
|
Call for Contributors with Knowledge of Linux Firewalls!We’re looking for contributors with an understanding of Linux firewalls who can help provide insight into how firewalls can be implemented and configured to improve the security of a Linux system. Sound like something you could do? Learn how to get started! Learn more about call for contributors with knowledge of linux firewalls
|