Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

3,596 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More


Avatar photo
By: Michael Tabron

July 6, 2021 10:30 am

3,484 views

Technical Webinar: How apiphani delivers a superior end-user experience for SAP applications

Many businesses and government agencies depend on Managed Service Providers (MSPs) to provide reliable and secure SAP services. For MSPs to meet customer expectations for rapid time-to-market and around-the-clock service availability, they need to build and maintain a flexible and resilient infrastructure where the OS, database and applications are well-integrated. They also need the tools […]

Read More


Avatar photo
By: Marcus Meissner

May 13, 2019 3:08 pm

8,106 views

SUSE addresses Microarchitectural Data Sampling Vulnerabilities

Researchers have identified new CPU side channel information leak attacks against various microarchitectural buffers used in Intel CPUs. These attacks allows local attackers to execute code to read out portions of recently read or written data by using speculative execution. Local attackers can be on the same OS or running code on the same thread […]

Read More