Re-designing Linux Security:Do No Harm Report

As businesses become more savvy to the benefits of Linux, we see accelerated adoption of the operating system in the form of both migrations of existing applications and greenfield application deployments. Linux is here, we best secure it.

The goals of this whitepaper are to bring light to the flaws with porting Windows security approaches to Linux, identify unique challenges with securing Linux infrastructure, introduce a list of questions one can use to better evaluate a Linux security offering, and propose a core set of design principles on which strong Linux security offerings can be built.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Carbon Black logo
Provided by:
Carbon Black
Topic:
Security
Format:
PDF