The Linux.com Technology Feature is a series of articles on a topic of specific urgency for enterprise managers and systems administrators. Linux.com partners with other industry experts to bring Linux users important content on topics such as virtualization, cloud computing, security, storage, high performance computing, systems management and mobile/embedded development. The Technology Feature aims to provide both industry perspective as well as technical information that mangers and admins can use in their day-to-day work.
If you are interested in working with Linux.com on a Technology Feature and sponsorship, please email
This e-mail address is being protected from spambots. You need JavaScript enabled to view it
.
|
Thursday, 03 February 2011 00:00
Linux.com Editorial Staff
You've heard of the Darwin Awards, which are given out for the rather grim achievement of doing something particularly dumb and usually fatal. We've heard of a few security mishaps that may have been career suicide, but thankfully none that have actually proven fatal. Still, we don't advocate security Seppuku either. Here's some should-be-obvious mistakes to avoid.
Read more...
Comment (0)
Thursday, 27 January 2011 00:00
Linux.com Editorial Staff
Looking for a Linux system administration job? Many employers are looking for admins with Linux skills, but plenty of people are vying for those jobs. If you want to stand out from the crowd, you'll need to make sure you have the security skills that employers are looking for above and beyond Linux administration experience.
Read more...
Comment (0)
|
Thursday, 20 January 2011 00:00
Linux.com Editorial Staff
When it comes to PCI compliance, there's no such thing as "too careful." One of the keys to being careful enough? Isolating and protecting servers that handle cardholder data from the rest of your network.
Read more...
Comment (0)
Thursday, 13 January 2011 07:14
Linux.com Editorial Staff
When most people think of computer security, they think of malware, viruses, and malicious outsiders trying to break into networks. Unfortunately, there's just as much danger on the inside of the company firewall as from outside. Unconvinced? We have five examples of damaging and embarrassing insider attacks from the past decade that should change your mind.
Read more...
Comment (0)
Tuesday, 07 December 2010 09:02
Linux.com Editorial Staff
Linux deployments still carry high expectations. Before pushing the button on that Linux deployment, make sure you have all the bases covered, and we have a few tips to help save the day.
Read more...
Comment (0)
Tuesday, 30 November 2010 00:00
Linux.com Editorial Staff
The so-called Cyber Monday is behind us, but the online sales keep ramping up. The Wall Street Journal shows that online shoppers have spent more $1.1 billion over a two-day period, and traffic to shopping sites has been steadily up. Good for business, but also a very attractive target for attackers from inside and outside companies that deal with credit card data.
Read more...
Comment (0)
|
|
|
|
Page 1 of 2 |