Posts Tagged ‘security’

What is the right choice for my company: containers or virtual machines?

Wednesday, April 26th, 2017

The use of containers is growing rapidly since they provide organisations with lots of benefits and competitive advantages, but it’s important to make sure you have done your research before making the decision between virtual machines and containers. In this blog post we will try to answer the question ‘How to choose between containers and virtual machines?’ by providing you some real life business cases and examples. Hopefully, we will give you a good idea of how containers can help you keep up with evolving market and business needs.

More...

Kumina sponsoring CloudABI: practical sandboxing for UNIX

Friday, October 14th, 2016

Kumina is sponsoring CloudABI: CloudABI is a UNIX-like programming environment for Linux and the BSDs that allows you to easily design sandboxed applications. It accomplishes this by making strong use of capability-based security, inspired by the University of Cambridge’s Capsicum. Compared to traditional UNIX applications, CloudABI applications are better resistent against security vulnerabilities, easier to test and easier to maintain. CloudABI is available as Open Source Software, free of charge.

More...

Buckler: Authentication and authorization for Kibana, for free!

Thursday, September 29th, 2016

Today we’re glad to announce that we’re releasing Buckler as open source software. Buckler is free alternative to Shield, a light-weight proxy for Kibana, written in Python (Django). It allows you to restrict access in Kibana by adding password authentication. When logged in, a user is only allowed to access indices specified for that user in Buckler’s configuration file.

More...

The Collectd encrypted packet format

Friday, March 21st, 2014

Yesterday, Logstash 1.4.0 was released containing many improvements, one of which was contributed by us. We’ve implemented signature verification and packet decryption in the collectd input plugin. This blogpost will give an overview of how encryption and signing is used in the collectd binary protocol. If you want to implement your own collectd receiver, this is pretty interesting.

More...

Check and detect Linux/CDorked.A infections

Wednesday, May 8th, 2013

We’ve created a simple check to detect Linux/CDorked.A infections on webservers.

More...

Checking for rogue Apache modules

Wednesday, April 3rd, 2013

An Icinga check to detect rogue Apache modules.

More...

Two-factor LUKS using Ubuntu

Tuesday, October 19th, 2010

How to secure your data with LUKS and OpenPGP smartcards using Ubuntu 10.10.

More...

Two-factor LUKS using Ubuntu

Thursday, July 29th, 2010

How to secure your data with LUKS and OpenPGP smartcards using Ubuntu.

More...