security

Security B-Sides conferences attract growing information security crowd

Security B-Sides conferences attract growing information security crowd
In this interview with the event organizer of Security B-Sides DC , learn how this conference provides a community framework to build events for and...Read more

Secured DevOps for microservices

Secured DevOps for microservices
Containers and microservices have revolutionized application development and infrastructure management. What are some of the new security challenges...Read more

Solving the Linux kernel code reviewer shortage

Solving the Linux kernel code reviewer shortage
Operating system security is top of mind right now , and Linux is a big part of that discussion. One of the questions to be solved is: How do we...Read more

The best way to develop software with effective security

The best way to develop software with effective security
Learn why the best way to get through the security process is to include it early in the product specification, design, and implementation.Read more

Let's Encrypt: Why create a free, automated, and open CA?

spider web
Starting a new CA is a lot of work. The Internet Security Research Group co-founder and director explains why they decided to build a new free,...Read more

Prepare to be hacked: Information security for small organizations

Information security for small organizations
At OSCON 2016, Kelsey Gilmore-Innis gave a talk on how her small nonprofit has done some creative thinking about security.Read more

Preventing break-ins on your Linux system

Preventing break-ins on your Linux system
Simple steps you can take to make your Linux system more secure.Read more

Managing passwords in Linux with KeePassX

Managing passwords in Linux with KeePassX
KeePassX remembers hundreds of passwords across various applications. It also generates strong, secure passwords when you need them.Read more