Cybersecurity Asset Management, Container security, DevOps, Cloud Security, Configuration management

How to Defend Linux from Attacks

February 25, 2021
  • Cloud computing infrastructure,
  • Containerization of applications, and
  • Microsoft’s support for a Linux kernel
  • The Linux Attack Surface, including the recent sudo vulnerability, distributions, binary dependencies, and other kernel vulnerabilities
  • Linux Exploitation Attacks, including kernel fuzzing and privilege escalation
  • Defending Linux, including static analysis of binaries/libraries, creating custom distributions, and continuous monitoring of Linux in runtime
prestitial ad