In the news: Open source software dominates the enterprise; Linux systems vulnerable to attack; Nine-year-old bug found and fixed in sudo; and systemd-homed is coming to a Linux distribution near you.
Eric Herman, Chairman of the MariaDB Foundation board, sheds light on the evolving focus of the custodians of one of the most popular and widely used databases.
DNS encryption offers WiFi users good protection in public spaces; however, in the enterprise, it prevents the evaluation and filtering of name resolution.
DevOps Orchestration Platform open source framework was developed in Golang and can be used to bootstrap an IT infrastructure dynamically or import details of an existing IT infrastructure locally on VirtualBox or in the Cloud.
Windows Admin Center consolidates Windows Server admin tools into a browser-based remote management app for physical, virtual, and on-premises servers, although it does not yet fully replace Server Manager.
The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances.
Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Windows Defender Application Control protects systems against threats that traditional virus scanners and signature-based mechanisms cannot detect by restricting applications in the user context and reducing the code allowed in the system kernel.
The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.