Graphically manage SSH keys with Seahorse Seahorse, also referred to as Passwords and Keys, allows you to manage SSH key generation and distribution even if you're not comfortable working on the command line.
Automate password resets with PWM PWM puts responsibility for password resets in users' hands, freeing IT for more pressing tasks.
Learn about computer security with the Raspberry Pi and Kali Linux Raspberry Pi is a great way to learn about computer security. Learn how in the 11th article in our getting-started series.
Protection Poker: An agile game for mitigating risk This game builds risk mitigation into your workflow before iteration planning to decrease security threats.
Securing privacy with Mycroft, an Open AI voice assistant Open source voice-assistant technology aims to avoid the privacy and security vulnerabilities seen in proprietary tech.
Reducing security risks with centralized logging Centralizing logs and structuring log data for processing can mitigate risks related to insufficient logging.