Media Summary: Watch Red Canary's experts as they hash out the state of In this episode, Jay and Joao discuss recent government policy that will have far reaching effects - and this time it isn't coming ... The window between vulnerability disclosure and

Webinar Linux Security Is Complicated Let S Fix It - Detailed Analysis & Overview

Watch Red Canary's experts as they hash out the state of In this episode, Jay and Joao discuss recent government policy that will have far reaching effects - and this time it isn't coming ... The window between vulnerability disclosure and An amazing evening with Vivek R where we discuss the fundamentals of Credential theft is the cause of enterprise data breaches today. While traditional SSO (Okta, Entra, Ping) is a great start, ... Ethical Hacking Roadmap 2025 Want to start your career in Cybersecurity & Ethical Hacking? Here's the complete step-by-step ...

A groundbreaking UEFI bootkit, 'Bootkitty,' targets Sponsored by LF Education & OpenSSF There is no shortage of reasons why leaders need a better approach to upskilling their IT ... Sharing the best practices and use cases of data protection and vulnerability management from AWS, KernelCare and Efinity ...

Photo Gallery

[Webinar] Linux security is complicated. Let's fix it
LF Live Webinar: Harden Your Security Mindset: Break Down the Critical Security Risks for Web Apps
⚠️ CISA Emergency Alert — Linux Root Hack Being Actively Exploited Now! | ByteAlert
🔒 Linux Security & Hardening: The Ultimate Practical Guide!
STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide
Enterprise Linux Security Episode 102 - The Cybersecurity Resilience Act
How RLC-Hardened brings active defense to the operating system | CIQ Webinar
The Linux Family Tree is INSANE! 😱
Why I don’t use transparent terminals #security #linux
Webinar | Linux Under the Hood(Understanding Linux Security)
Linux Security: Don't Get Hacked in 2025! Beginner Playbook 🛡️
Security and real-time Linux in a shifting automotive world
View Detailed Profile
[Webinar] Linux security is complicated. Let's fix it

[Webinar] Linux security is complicated. Let's fix it

Watch Red Canary's experts as they hash out the state of

LF Live Webinar: Harden Your Security Mindset: Break Down the Critical Security Risks for Web Apps

LF Live Webinar: Harden Your Security Mindset: Break Down the Critical Security Risks for Web Apps

Presented by LF

⚠️ CISA Emergency Alert — Linux Root Hack Being Actively Exploited Now! | ByteAlert

⚠️ CISA Emergency Alert — Linux Root Hack Being Actively Exploited Now! | ByteAlert

CISA confirms

🔒 Linux Security & Hardening: The Ultimate Practical Guide!

🔒 Linux Security & Hardening: The Ultimate Practical Guide!

Are you looking to

STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide

STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide

In this

Enterprise Linux Security Episode 102 - The Cybersecurity Resilience Act

Enterprise Linux Security Episode 102 - The Cybersecurity Resilience Act

In this episode, Jay and Joao discuss recent government policy that will have far reaching effects - and this time it isn't coming ...

How RLC-Hardened brings active defense to the operating system | CIQ Webinar

How RLC-Hardened brings active defense to the operating system | CIQ Webinar

The window between vulnerability disclosure and

The Linux Family Tree is INSANE! 😱

The Linux Family Tree is INSANE! 😱

The

Why I don’t use transparent terminals #security #linux

Why I don’t use transparent terminals #security #linux

Why I don’t use transparent terminals #security #linux

Webinar | Linux Under the Hood(Understanding Linux Security)

Webinar | Linux Under the Hood(Understanding Linux Security)

An amazing evening with Vivek R where we discuss the fundamentals of

Linux Security: Don't Get Hacked in 2025! Beginner Playbook 🛡️

Linux Security: Don't Get Hacked in 2025! Beginner Playbook 🛡️

Welcome to

Security and real-time Linux in a shifting automotive world

Security and real-time Linux in a shifting automotive world

In this first episode of our automotive

Eliminate Credential Theft: 100% SaaS Visibility & Control [Webinar]

Eliminate Credential Theft: 100% SaaS Visibility & Control [Webinar]

Credential theft is the #1 cause of enterprise data breaches today. While traditional SSO (Okta, Entra, Ping) is a great start, ...

Ethical Hacking RoadMap

Ethical Hacking RoadMap

Ethical Hacking Roadmap 2025 Want to start your career in Cybersecurity & Ethical Hacking? Here's the complete step-by-step ...

OMG! Linux's WORST Nightmare: Unstoppable UEFI Bootkit!

OMG! Linux's WORST Nightmare: Unstoppable UEFI Bootkit!

A groundbreaking UEFI bootkit, 'Bootkitty,' targets

LF Live Webinar: Cybersecurity Skills, Simplified: A Framework That Works

LF Live Webinar: Cybersecurity Skills, Simplified: A Framework That Works

Sponsored by LF Education & OpenSSF There is no shortage of reasons why leaders need a better approach to upskilling their IT ...

Revolutionizing Security: AI's Role in Identifying Vulnerabilities

Revolutionizing Security: AI's Role in Identifying Vulnerabilities

Discover how AI is reshaping software

[Webinar recording] You need live patching to achieve SOC2 Compliance

[Webinar recording] You need live patching to achieve SOC2 Compliance

Sharing the best practices and use cases of data protection and vulnerability management from AWS, KernelCare and Efinity ...

Inside the Linux Security Modules (LSM) - Vandana Salve, Prasme Systems

Inside the Linux Security Modules (LSM) - Vandana Salve, Prasme Systems

Inside the