Remove Blog Remove Firewall Remove Linux Remove Operating System
article thumbnail

Cybersecurity Snapshot: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance

Tenable

We have completely revamped this updated 5th version to align with modern technologies and challenges,” reads the CSA blog “ New Cloud Security Guidance from CSA. CISA has authorization to conduct SilentShield assessments, whose purpose is to work with the impacted agency and help its security team strengthen its cyberdefenses.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall.

Backup 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Vulnerability Scanning – Roadmap to Securing Your Infrastructure

Linux Academy

Keep in mind, vulnerabilities are not only within server operating systems and applications, but on network devices, IoT devices, workstations, printers, and every other computing device you have. For internal vulnerability scanning, you can set up an OpenVAS server running on Linux. Oh yes, I’m talking to everyone!

article thumbnail

Kubernetes tools are helpful for your team and sadly, your attacker

Lacework

In recent years, leveraging commonly found binaries on Windows/Linux systems has become more popular with offensive security professionals. The methodology of “living off the land,” and using a system’s native binaries is attractive to adversaries and red teamers alike. Pivoting via Kubectl Proxy.

Tools 59
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

Vulnerabilities at the operating system level may be exploited by rogue container workloads if not hardened. These policies, like any firewall, provide an invaluable means of limiting attack vectors both inside and outside the VPC. These suggestions and others are covered in Linux Academy’s Kubernetes Security Course.

article thumbnail

Why “as-is” SAP cloud migration can be more complex than expected

Protera

Even if the platform could be copied to the cloud—as is the case with Linux— there are many challenges, such as legacy technologies, outdated operating systems and unclean data, that need to be addressed before migration.

Cloud 52
article thumbnail

Why “as-is” SAP cloud migration can be more complex than expected

Protera

Even if the platform could be copied to the cloud—as is the case with Linux— there are many challenges, such as legacy technologies, outdated operating systems and unclean data, that need to be addressed before migration.

Cloud 52