Profile

Cover photo
32 followers|13,917 views
AboutPostsPhotosVideos

Stream

CISOfy

Shared publicly  - 
 
Missing Packages on Linux? Don’t Trust External Repositories!
http://linux-audit.com/missing-packages-do-not-trust-external-repositories/
Missing packages… If you are in the business of system administration, you know the big dilemma when it comes to installing software: missing packages. Yes, a lot of packages are available in the repositories of your Linux distribution, but not the one you need. Or when it is, it is
1
Add a comment...

CISOfy

Shared publicly  - 
 
Presentation of our founder Michael about secure Docker container deployment on Linux.
http://www.slideshare.net/MichaelBoelen/docker-security-secure-container-deployment-on-linux
How to securely deploy your containers, by the author of rkhunter and auditing tool Lynis. Many introductory talks about Docker and its container technology, have been given. This attention to the subject is not surprising, seeing the amount of people "doing DevOps" now. With container technology being fairly new on the Linux platform, the security aspects of containers are often being overlooked. While Linux containers do still not fully contain...
3
Add a comment...

CISOfy

Shared publicly  - 
 
Security Best Practices for Building Docker Images
http://bit.ly/1N1X1yw #docker #security  
To ensure your Docker images are properly configured, we show some of the best practices. Building secure Docker containers doesn't have to be hard.
1
Add a comment...

CISOfy

Shared publicly  - 
Linux systems are usually managed remotely with SSH. Still many administrators are using passwords. Keys can help you boost security and provide automation.
1
Add a comment...

CISOfy

Shared publicly  - 
 
Everything you need to know about Docker security: Best Practices for your Vessel and Containers - http://bit.ly/1yQ3o4N #docker #linux #security  
In-depth article about Docker security features, best practices and its history. With container technology evolving, Docker security can be challenging..
2
1
Michael Boelen's profile photo
Add a comment...

CISOfy

Shared publicly  - 
 
Linux server security: Three steps to secure each system - http://bit.ly/1qodBej #linux #audit #infosec  
3
Add a comment...
Have them in circles
32 people
Alan Robertson's profile photo
Denver Davido's profile photo
Paul Reiber's profile photo
Dl1mur4tdj dli's profile photo
Víctor Hugo Jiménez's profile photo
Minh Triet Pham Tran's profile photo
Open Source Delivers's profile photo
Roman Mednitzer's profile photo
Rizwan Haider's profile photo

CISOfy

Shared publicly  - 
1
Add a comment...

CISOfy

Shared publicly  - 
 
Lock Down Strategies for Linux Servers: Helping to select what measures to take, when hardening your systems.

http://linux-audit.com/lock-down-strategies-for-linux-servers/
Strategies to properly lock down Linux systems, from networking to file integrity. With tips and techniques to select which strategy for locking down the system.
2
Add a comment...

CISOfy

Shared publicly  - 
 
The way to continuous auditing --> Security Integration: Configuration Management and Auditing
http://linux-audit.com/security-integration-configuration-management-and-auditing/ #linux #audit #automation  
Configuration Management and Auditing Increased strength when combining tools for automation and security of IT environments Tools like Ansible, Chef, and Puppet are used a lot for rapid deployment and keeping systems properly configured. These tools in itself are great for ensuring consistency over your systems. So what is Configuration
2
1
Michael Boelen's profile photo
Add a comment...

CISOfy

Shared publicly  - 
 
Why Linux Security Hardening Scripts Might Backfire - http://bit.ly/1B86GOy #linux #hardening #automation  
We talk about the risks when using Linux security hardening scripts in this article. Hardening Linux with scripts might look like a nice idea, but is it?
3
1
Michael Boelen's profile photo
Add a comment...

CISOfy

Shared publicly  - 
 
Monitoring Linux File access, Changes and Data Modifications http://bit.ly/1wC0uhe #linux #security  
Linux has several methods available to protect your valuable data. With the right tool we can audit file access, changes and data modifications, including meta-data.
2
2
Michael Boelen's profile photoJulián Tete's profile photo
Add a comment...

CISOfy

Shared publicly  - 
 
Lynis 1.6.4 is available for download: http://cisofy.com/downloads/
The Lynis Enterprise Suite is a toolset consisting of an open source security auditing tool named Lynis. It also includes central management, reporting and plugins.
4
10
Brandon Lee's profile photoYusuf Hadiwinata's profile photo
Add a comment...
People
Have them in circles
32 people
Alan Robertson's profile photo
Denver Davido's profile photo
Paul Reiber's profile photo
Dl1mur4tdj dli's profile photo
Víctor Hugo Jiménez's profile photo
Minh Triet Pham Tran's profile photo
Open Source Delivers's profile photo
Roman Mednitzer's profile photo
Rizwan Haider's profile photo
Contact Information
Contact info
Phone
+31637202238
Email
Address
De Klok 28 5251DN, Vlijmen The Netherlands
Story
Tagline
Helping companies to audit their Linux and Unix systems
Introduction
We help companies to audit their Linux and Unix systems with tools like Lynis and the Lynis Enterprise Suite.
Links