About us

On the off chance that you are occupied with Linux security, this is the place for you. The web has numerous assets to offer, yet the high-quality substance is difficult to find. The focal point of this blog is Linux and UNIX security. Most articles will be tied in with auditing, system hardening, and consistency. Objectives we will probably compose a fantastic substance and make it openly accessible. Along these lines, you can utilize it to anchor your frameworks.

Missing a specific subject on the blog or discovered something that is important? Tell us! Who is composing? A large number of the articles are composed by security master Genna Fludd. Michael is a security designer and organizer of CISOfy. He covers themes inside Linux security, from framework solidifying to consistency and controls. About CISOfy This blog is supported byCISOfy. Assets are put into this blog to make Linux security available to a more extensive gathering of people, from framework executives to auditors and designers.

Updates We refresh this blog relatively consistently. In the event that you need to remain in front of your associates, tune in with a feed peruser! Get every single most recent post through an RSS channel per user. On the off chance that you are on Twitter, at that point take after @linuxaudit. Visitor bloggers We are open for entries from different bloggers. Offer your insight with the assistance of our developing system.

Advantages for you Your name will be utilized as writer name Get more energy about your work by imparting it to the network More perusers because of our engaged aptitude field (Linux security) Have others perceive your work, which can help your vocation Get adjusted into the RSS channel of numerous perusers Rules for visitor presents We like on keeping things straight, yet have a couple of principles to guarantee quality for our perusers:

Minimal 1200 words Focus on Linux/Unix, with at any rate some security-related subject

No advancement for business administrations or items Submissions are restrictive and might be altered before distribution Outgoing connections are just permitted to pertinent assets You can incorporate a little memoir

Ready to begin? Send an email to blog with your thought. Input Your remarks, thoughts, and criticism are welcome! In the event that there is a specific subject, you need to see canvassed in an article, at that point get in touch with us. If it’s not too much trouble send us an email About CISOfy Software arrangements Lynis is a fight tested technical security audit instrument. It is open source, unreservedly accessible, and utilized by framework executives everywhere throughout the world.

Different clients incorporate IT auditors, security experts like pentesters. Lynis can likewise be utilized as a customer part in the Lynis Enterprise arrangement. Lynis Enterprise Suite For the individuals who keep up in excess of 10 frameworks, there is the Lynis Enterprise Suite. It is significantly more than just Lynis. It incorporates a focal administration interface, extra modules for Lynis, announcing abilities, a custom usage guide and more supportive data. For instance, it contains broadened data in regards to every security control. Other than that, it will demonstrate to you generally accepted methods to explain a finding, physically or with prepared to-utilize solidifying pieces.

Scroll to top