Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.
Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.
Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.
Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
With the need for home offices during the pandemic lockdown, provisional solutions instituted on the fly during the transition from office to home require more permanent solutions, especially for securing TLS connections on the Internet.
We compare three popular packages that are designed to simplify teamwork: EGroupware, Group Office, and Kopano.