Archives
8 posts
Extra Factor Authentication: how to create zero trust IAM with third-party IdPs
By Stephanie Domas, 29 April 2025
In this article, I’ll explore an original and robust method for using third-party IdPs that allows you to maintain a zero trust security posture, thanks to...
Imagining the future of Cybersecurity
By Luci Stanescu, 28 October 2024
October 2024 marks the 20th anniversary of Ubuntu. The cybersecurity landscape has significantly shifted since 2004. If you have been following the Ubuntu...
What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)
By Luci Stanescu, 3 July 2024
Details about the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, and the Ubuntu fix released on the CRD.
Ubuntu Security Notices now available in OSV format
By Canonical, 11 June 2024
Canonical is now issuing Ubuntu Security Notices (USNs) in the open source OSV format. Using the information provided, developers can identify known...
Empowering Australian government innovation: a secure path to open source excellence
By Canonical, 5 September 2023
The Australian Federal Government is not alone in dealing with challenges like natural disasters, global pandemics and economic uncertainty. Like many...
Closing the Gap: Ubuntu Pro in the AWS Shared Responsibility Model
By Carlos Bravo, 29 August 2023
Explore Ubuntu Pro’s role in the AWS Shared Responsibility Model plus walk through a real-world example to install your own Mastodon server on Ubuntu Pro...
Is Linux secure?
By ijlal-loutfi, 17 June 2023
Operating system security is the upper bound of your application security Meet Pal. Pal is a senior developer working at PalBank. For the next 6 months, Pal...
Manage Debian, Ubuntu, and derivative Linux distributions with Landscape Scripts
By Rajan Patel, 21 December 2022
The fastest path towards Linux server management at scale is to leverage technology system administrators know. It is now possible to manage your Debian...