By: Raul Mahiques

February 15, 2023 2:32 pm

1,130 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More



By: Michael Tabron

July 6, 2021 10:30 am

2,772 views

Technical Webinar: How apiphani delivers a superior end-user experience for SAP applications

Many businesses and government agencies depend on Managed Service Providers (MSPs) to provide reliable and secure SAP services. For MSPs to meet customer expectations for rapid time-to-market and around-the-clock service availability, they need to build and maintain a flexible and resilient infrastructure where the OS, database and applications are well-integrated. They also need the tools […]

Read More



By: Marcus Meissner

May 13, 2019 3:08 pm

7,210 views

SUSE addresses Microarchitectural Data Sampling Vulnerabilities

Researchers have identified new CPU side channel information leak attacks against various microarchitectural buffers used in Intel CPUs. These attacks allows local attackers to execute code to read out portions of recently read or written data by using speculative execution. Local attackers can be on the same OS or running code on the same thread […]

Read More



By: Meike Chabowski

November 15, 2017 10:28 am

5,996 views

Linux Magazine Special Edition “Getting Started with Linux” – and More!!

We who live in a Linux world know for "a while" now that Linux is “the better Windows”. But still – there are people out there who somehow do not dare to touch Linux in their private environment, on their laptops and desktops. Some of them – for whatever reason – are still […]

Read More