In this article, I'll analyze a few open source tools and concepts that you might use to increase privacy on the Internet for yourself.
Chief Architect for the central US at Red Hat, Thomas Cameron, will present at the 14th annual Southern Californian Linux Expo (SCaLE 14x) this year on An Introduction to Container Security and Gluster Quickstart. In this interview, Thomas to discusses container security.
In this week's Top 5, we highlight how to keep your Linux system safe, open source chat apps, a new Linux story from our series, why Vagrant?, and how to earn respect as a leader from Red Hat CEO Jim Whitehurst.
As the the encryption access debate heats up in the United States and abroad, Mark Bohannon weighs the consequences of revisiting the Communications Assistance for Law Enforcement Act (CALEA).
While most of the Linux community would agree that viruses don't affect Linux, there are some people we share files with who are affected by viruses and other malware.
In this week's edition of our open source news roundup, we take a look at the Internet Bug Bounty, a smart robotic spider powered by Snappy Ubuntu Core, and more open source news. Open source news roundup for September 6 - 12, 2015
Few things in the Linux world evoke a strong reaction like SELinux, the security enhancement for Linux. At LinuxCon, Susan Lauber hopes to soften that response and show people the light. In her talk, SELinux—it's all about the labels, Lauber will teach SELinux basics and describe why it's a must-... Read more
Laura is the founder and lead consultant for SafeStack, a specialist security training, development, and consultancy firm. Laura tells me in this interview: "we want security to be any empowering tool for growth rather than a costly hindrance to innovation."
Even as the US government bids adieu to Clipper Chip, an infamous episode that influenced the cryptography debate for years, there is renewed focus in a number of quarters that it should not repeated. The most recent evidence comes from a new report from the United Nation's Office of the High... Read more
The security of a strongly encrypted software tool is not compromised by having its code openly available as open source. In fact, that the tool's source code is open strengthens its security and, by extension, the safety and privacy of its users.