Welcome to our first FAQ blog post where we recap popular questions we’ve received along with the answers to them. What is the inspiration for this particular post? While on the road recently, at KubeCon + CloudNativeCon Europe, as well
The post Deepfe…
Tag: Open Source
Europe, Global Security News, North America
The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey
by Prakash Sinha •
A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft, Venmo, Equifax, Instagram, Facebook, Amazon, PayPal, and many others. If even these tech-savvy organizations …
Global Security News, North America
Boards, CEOs demand software supply chain security improvements
by Help Net Security •
Venafi announced the findings of a global study of 1,000 CIOs, in which 82% say their organizations are vulnerable to cyberattacks targeting software supply chains. The shift to cloud native development, along with the increased speed in development br…
Global Security News, North America
pfSense vs Netgear router: What are the main differences?
by James La Forte •
When taking steps to ensure your business’s network security, the pfSense firewall solution and Netgear routers are top choices.
The post pfSense vs Netgear router: What are the main differences? appeared first on TechRepublic.
Europe, Global Security News, North America
How to Manage Your Open Source Licenses in 2022
by Luke Mcbride •
Organizations are absorbing a huge amount of open source component software. These tools come with unique requirements that are becoming unwieldy to resolve. Companies are asking for problems both by allowing licenses they should not and by not …
Europe, Global Security News, North America
Wicked Good Development: Dev Nexus Reflections and Conversations Part 1
by Kadi Grigg •
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Global Security News, North America
How to eliminate the weak link in public cloud-based multi-party computation
by Help Net Security •
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning algorithms, as well as developing open-source software and games. Now, digital…
Global Security News, North America
Hijacking of popular ctx and phpass packages reveals open source security gaps
by Help Net Security •
The Python module “ctx” and a fork of the PHP library “phpass” have recently been modified by an unknown attacker to grab AWS credentials/keys and send them to a Heroku app. But what at first seemed like the work of a malicious …
Europe, Global Security News, North America
Create a JumpCloud-Managed VPN Using Pritunl
by David Worthington •
Get strong perimeter security with zero trust access control at sustainable costs with JumpCloud and Pritunl.
The post Create a JumpCloud-Managed VPN Using Pritunl appeared first on JumpCloud.
The post Create a JumpCloud-Managed VPN Using Pritunl appea…
Global IT News
Strata Identity launches open-source project enabling multi-cloud access policy management for organizations
by Pragya Sehgal •
New open-source standard launched by U.S.-based Identity Orchestration for multi-cloud company will unify incompatible cloud identity systems for organizations
The post Strata Identity launches open-source project enabling multi-cloud access policy management for organizations first appeared on IT World Canada.
Europe, Global Security News, North America
Strata Identity Proposes Standard to Simplify Identity Management
by Michael Vizard •
Strata Identity today launched an open source project that makes it possible to employ a common policy format to declaratively define identity and access policies—without requiring an agent, proxy software or some other form of local code. The project…
Global IT News
Student wins national competition for social media tool aimed at reducing misinformation
by Samira Balsara •
Arvin Jagayat, a psychology student at Toronto Metropolitan University (formerly Ryerson University), has received an award for his efforts to reduce the spread of misinformation online. Jagayat is one of five winners of the Social Sciences and Humanities Research Council’s (SSHRC) national 2022 Storytellers Challenge, and received a C$4000 cash prize. The competition challenges Canadian […]
The post Student wins national competition for social media tool aimed at reducing misinformation first appeared on IT World Canada.
Europe, Global Security News, North America, Vulnerabilities
OpenSSF Seeks $150M+ to Address Open Source Software Security
by Michael Vizard •
The Open Source Security Foundation (OpenSSF) this week outlined a plan to better secure open source software by focusing on 10 streams of investment that, in total, would require more than $150 million. The overall goal, announced at the Open Source …
Global Security News, North America
A 10-point plan to improve the security of open source software
by Help Net Security •
The Linux Foundation and the Open Source Software Security Foundation, with input provided by executives from 37 companies and many U.S. government leaders, delivered a 10-point plan to broadly address open source and software supply chain security, by…
Global IT News
Open-source software community releases plan to boost application security
by Howard Solomon •
Under pressure after the discovery of several open source vulnerabilities including Log4Shell, leading open-source groups and software firms have created a 10-point plan for ensuring ongoing improvements in the security of open-source code. The plan, released Thursday with the encouragement of the White House, includes commitments of US$30 million in funding from Amazon, Google, Intel, […]
The post Open-source software community releases plan to boost application security first appeared on IT World Canada.
Global IT News
Red Hat announces 2022 Innovation Award winners
by Samira Balsara •
Red Hat announced the winner of the 2022 Innovator of the Year award during its Red Hat Summit this week. For the 16th year, the Red Hat Innovation Awards recognize the technological achievements of Red Hat customers globally who demonstrated creative problem-solving to make a positive impact on the business world and on society. Innovator […]
The post Red Hat announces 2022 Innovation Award winners first appeared on IT World Canada.
Europe, Global Security News, North America
Deepfence Is Heading to KubeCon + CloudNativeCon Europe
by Michelle Brinich •
We’re excited to join our fellow open source and cloud native technologists at KubeCon + CloudNativeCon Europe next week in Valencia, Spain from 16 – 20 May 2022! If you’re attending in person or virtually, come by and meet us.
The post Deepfence Is He…
Global IT News
Red Hat announces a series of new features and services, prioritizing hybrid cloud
by Samira Balsara •
Red Hat Inc, a provider of open source solutions, made a series of announcements focusing on hybrid cloud acceleration during its annual Red Hat Summit.
The post Red Hat announces a series of new features and services, prioritizing hybrid cloud first appeared on IT World Canada.
Global IT News
Red Hat and General Motors collaborate to help advance software-defined vehicles at the edge
by Samira Balsara •
Today at the Red Hat Summit 2022, open source solutions provider Red Hat and General Motors (GM) announced a partnership to help advance software-defined vehicles at the edge. The two companies plan to expand an ecosystem of innovation around the Red Hat In-Vehicle Operating System. It provides a functional-safety certified Linux operating system Foundation, meant […]
The post Red Hat and General Motors collaborate to help advance software-defined vehicles at the edge first appeared on IT World Canada.
Global Security News, North America
How to use KDE Plasma’s Konsole SSH plugin
by Jack Wallen •
Looking for an incredibly easy tool to manage your SSH connections? KDE’s terminal application has a handy trick up its sleeve.
The post How to use KDE Plasma’s Konsole SSH plugin appeared first on TechRepublic.
Europe, Global Security News, North America, Vulnerabilities
Network Traffic Observability: Three PacketStreamer Use Cases
by Shyam Krishnaswamy •
A few weeks ago, we announced a new open source project called PacketStreamer, which provides a simple, lightweight, scalable technique for capturing and streaming packets from virtualized environments (K8s, VMs, AWS Fargate) and across multiple clouds…
Malware Indicators (IoCs)
OpenSSF Launches Package Analysis Tool To Detect Malicious Packages
by Abeerah Hashim •
Given the rise in malicious packages flooding the open-source environment, a new “Package Analysis” tool…
OpenSSF Launches Package Analysis Tool To Detect Malicious Packages on Latest Hacking News.
Europe, Global Security News, North America, Vulnerabilities
Spring4Shell Marks the end of ‘Snooze Button’ Security
by Daniel Elkabes •
Spring4Shell illustrates why back-to-back attacks are a call to action for organizations to revise and prioritize security best practices.
The post Spring4Shell Marks the end of ‘Snooze Button’ Security appeared first on Security Boulevard.
Uncategorized
How to deploy a CockroachDB cluster in secure mode
by Jack Wallen •
If you’ve found the CockroachDB insecure mode too restricting, Jack Wallen is here to help you deploy the same cluster, only in secure mode, so you can better manage your databases.
The post How to deploy a CockroachDB cluster in secure mode appeared f…
Global Security News, North America
Nimbuspwn bugs allow attackers to gain root privileges on some Linux machines (CVE-2022-29799, CVE-2022-29800)
by Zeljka Zorz •
Microsoft has unearthed two security vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon that may be exploited by attackers to gain root on many Linux endpoints, allowing them to deploy backdoors, malware, ransomware, or …
Global Security News, North America
Principles for Kubernetes security and good hygiene
by Help Net Security •
Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make it less vulnerable. What’s different about Kubernetes security? This article walks through several key idea…
Global Security News, North America
Ubuntu 22.04 LTS released, delivers enterprise-grade security
by Industry News •
Canonical Ubuntu 22.04 LTS is now generally available, featuring significant leaps forward in cloud confidential computing, real-time kernel for industrial applications, and enterprise Active Directory, PCI-DSS, HIPAA, FIPS and FedRAMP compliance ̵…
Global Security News, North America
The state of open-source software supply chain security in 2022
by Help Net Security •
In this video for Help Net Security, Donald Fischer, CEO at Tidelift, talks about the state of open-source software supply chain security in 2022. Open source is the modern application development platform and is becoming an indispensable part of the s…
Global Security News, North America
Challenges development teams face when building applications with open source
by Help Net Security •
Tidelift released a report providing critical insights into the state and practice of open source software supply chain management. This comprehensive study of nearly 700 technologists, now in its fourth year, explored the most urgent challenges develo…
Global Security News, North America
81% of codebases contain known open source vulnerabilities
by Help Net Security •
Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications …
Global Security News, North America
The state of open source security in 2022
by Help Net Security •
In this video for Help Net Security, Kurt Seifried, Chief Blockchain Officer and Director of Special Projects at Cloud Security Alliance, talks about the state of open source security in 2022. Open source is everywhere, it’s in everything, and ev…
Global Security News, North America
Ledger vs Trezor: Crypto hardware wallet comparison
by Cedric Pernet •
The leaders among cryptocurrency hardware wallets are Ledger and Trezor. Read this features comparison of the Ledger Nano X and the Trezor Model T.
The post Ledger vs Trezor: Crypto hardware wallet comparison appeared first on TechRepublic.
Uncategorized
How to safely store passwords on a Linux server
by Jack Wallen •
If you work on headless Linux servers, you might want to have a command-line password storage tool. Jack Wallen shows you how to use GnuPG and pass for this purpose.
The post How to safely store passwords on a Linux server appeared first on TechRepublic.
Europe, Global Security News, North America
What is Code Quality? 5 Software Development Checks You Should be Automating
by Stephen Magill •
Product development is a delicate balancing act of delivering new features and investing in architecture and technology, all while trying to focus on building the right product. Have you ever experienced one of these scenarios?
The post What is …
Global Security News, North America
What you need to look out for when installing packages from public repositories
by Help Net Security •
In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, talks about the risks posed by malicious open source packages. Malicious packages can harm systems in many different ways. They can cause a simple proof of concept hack…
Global Security News, North America
How to scan your websites for malware with ISPProtect
by Jack Wallen •
Websites should be scanned regularly for malware. Jack Wallen shows you how to do this on Linux with the help of ISPProtect.
The post How to scan your websites for malware with ISPProtect appeared first on TechRepublic.
Global Security News, North America
How to scan your websites for malware with ISPProtect
by Jack Wallen •
Websites should be scanned regularly for malware. Jack Wallen shows you how to do this on Linux with the help of ISPProtect.
The post How to scan your websites for malware with ISPProtect appeared first on TechRepublic.
Malware Indicators (IoCs), Vulnerabilities
Severe XSS Vulnerability Found In Microweber CMS
by Abeerah Hashim •
Researchers found a severe cross-site scripting (XSS) vulnerability in Microweber CMS. Exploiting the bug could…
Severe XSS Vulnerability Found In Microweber CMS on Latest Hacking News.
Global Security News, North America
Cloud-native adoption shifts security responsibility across teams
by Help Net Security •
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during their digital transformation journeys. As organizations increase adoption, the re…
Uncategorized
How to run a security audit on AlmaLinux with Lynis
by Jack Wallen •
Just because you use Linux, doesn’t mean you shouldn’t take security precautions. Jack Wallen shows you how to run a security audit on AlmaLinux with Lynis.
The post How to run a security audit on AlmaLinux with Lynis appeared first on TechRepublic.