Forwarded from Патчкорд
Никогда не зря пройтись по настройкам SSH и поправить то, до чего ещё не дошли руки.
Free Linux Tutorials
Top 20 Recommended SSH Configuration on Redhat or CentOS Linux - Free Linux Tutorials
Secure Shell or SSH is a cryptographic network protocol used to securely log or access to remote systems. The most popular tool is the OpenSSH which provides a large suite of secure tunneling capabilities and different authentication methods. Installation:…
NIST выпустило целый методический материал по определению термина критическое ПО для исполнения указа Байдена.
https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software
https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software
NIST
Critical Software
Critical Software: Enhancing the Security of the Software Supply Chain
https://www.ncsc.gov.uk/blog-post/what-board-members-should-know-about-ransomware
Ransomware is the subject of this spotlight topic for board members, building on the guidance given in the Cyber Security Toolkit for Boards.
Ransomware is the subject of this spotlight topic for board members, building on the guidance given in the Cyber Security Toolkit for Boards.
www.ncsc.gov.uk
Ransomware: What board members should know and what they should be asking their technical experts
Ransomware is the subject of this spotlight topic for board members, building on the guidance given in the Cyber Security Toolkit for Boards.