Ben Montour & Rishi Kant , Uptycs Cloud Workload Specialists
About this talk
How to Make Linux More Secure (with less work)
Let's have a candid conversation about getting back to basics.
Linux’s power is its versatility. It can host hundreds of containers across a complex network or run a single desktop. It can power everything from smart TVs, Android phones and most Internet of Things (IoT) devices.
But when it comes to locking down Linux, its adaptability can also be it’s Achilles’ heel.
Here’s the truth: There are myriad solutions promising to help secure your Linux environment but none of them are worth a damn if you don’t have the basics down.
We have a candid conversation about the importance of laying a firm foundation for an effective security program for your Linux environment and explore what we consider the 4 Golden Rules of Linux Security:
- Reduce attack surface area with Secure Shell (SSH) best practices
- Scan for odd user activity
- Streamline routine Linux security tasks
- Improve your threat detection
Security professionals of all stripes will come away with actionable recommendations to prioritize and execute on these four foundational tenets and get their most pressing Linux security questions answered by an expert.