Since I'm a huge fan of the OpenVAS, now called Greenbone Community Edition, network vulnerability scanner, I put some time down to try the latest release 22.4. This guide picks up the docs made for docker-compose and ports them to use with podman-compose on a Fedora 37 system.
Begriffe, die gerne vertauscht werden. Eine subjektive Ordnung und Abgrenzung der Begriffe "Informationssicherheit", "IT-Sicherheit", "Datenschutz" und "Compliance".
E-mail is still used and needs modern security tooling. This article explains how state of the art encryption can be integrated into Thunderbird with the WebAssembly technology: compiling Go to wasm, glueing it with JavaScript and calling from a MailExtension.
Are you deploying distributed applications in a public cloud environment – for example OpenShift or Kubernetes? Did you ever wonder how your network traffic can be better secured in foreign infrastructure? If yes, this post is for you! Summary of my diploma thesis, which continued the work on traffic encryption in the OpenShift cloud container platform.
Connecting nodes with masters is usually secured with TLS. But there's more traffic than just between nodes and masters. This article describes how to set up a WireGuard mesh network between all nodes in a cluster by using Ansible.