July 2019 - TuxCare

KernelCare: The Distribution-Agnostic Approach to Live Kernel Patching

DistribAg No CTA

Once you’ve made the wise decision to switch from regularly rebooting your servers to live patching your Linux kernel, you have some decisions to make. There are a few different providers of live patching. Which is best for your server fleet?

Continue reading “KernelCare: The Distribution-Agnostic Approach to Live Kernel Patching”

Protect Against Vulnerabilities in IoT Devices With Live Patching

pav social post fb-lnkd

The Internet of Things was born the moment that internet connectivity expanded beyond the setup of a computer hooked up to a router. Today, there is an ever-growing abundance of “things” possessing internet capabilities. These can be flashy, like driverless cars, Fitbits, or an Amazon Echo. Or they can be more prosaic, like coffee makers or washing machines. Gartner predicts that, by 2020, there will be 20 -billion Things connected to the Internet.

Continue reading “Protect Against Vulnerabilities in IoT Devices With Live Patching”

How KernelCare Helps You Meet SOC 2’s Privacy Requirements

Soc2B No CTA (1)

SOC 2 is an audit framework that gives organisations a trusted way to verify their controls for protecting, securing and utilizing data. Increasingly, cloud computing companies that want to attract business need to demonstrate SOC 2 certification. (If you’ve never heard of SOC 2 and want the full lowdown, check out our whitepaper here.)

Continue reading “How KernelCare Helps You Meet SOC 2’s Privacy Requirements”

How KernelCare Helps You Meet SOC 2’s Privacy Requirements

Soc2B No CTA (1)

SOC 2 is an audit framework that gives organisations a trusted way to verify their controls for protecting, securing and utilizing data. Increasingly, cloud computing companies that want to attract business need to demonstrate SOC 2 certification. (If you’ve never heard of SOC 2 and want the full lowdown, check out our whitepaper here.)

Continue reading “How KernelCare Helps You Meet SOC 2’s Privacy Requirements”

How KernelCare Helps You Meet SOC 2’s Privacy Requirements

Soc2B No CTA (1)

SOC 2 is an audit framework that gives organisations a trusted way to verify their controls for protecting, securing and utilizing data. Increasingly, cloud computing companies that want to attract business need to demonstrate SOC 2 certification. (If you’ve never heard of SOC 2 and want the full lowdown, check out our whitepaper here.)

Continue reading “How KernelCare Helps You Meet SOC 2’s Privacy Requirements”

RIDL – Another MDS Attack that Live Patching Would Have Saved You From

ridl3-1

Everyone has heard of Zombieload. Recently made known to the public, Zombieload is a Microarchitectural Data Sampling (MDS) attack that can reveal private data by breaking the privacy borders between apps. A lot of people were (rightfully) worried about Zombieload, and in the middle of May it was big news.

Continue reading “RIDL – Another MDS Attack that Live Patching Would Have Saved You From”

Some Under-the-Hood Improvements in KernelCare Package Setup Logic

Under the hood new

One day, we received a report from our client that he faced 403 Forbidden error during KernelCare package setup. We started to investigate the issue and found that we need to improve KernelCare package setup logic.

Continue reading “Some Under-the-Hood Improvements in KernelCare Package Setup Logic”

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching