|
You are here |
dymaxion.org | ||
| | | | |
sergioprado.blog
|
|
| | | | | This article is going to be an introduction to embedded Linux security. | |
| | | | |
www.legitsecurity.com
|
|
| | | | | Learn the industry terms & standards for supply chain security, while answering questions like what's software supply chain security & the threats we're facing. | |
| | | | |
www.linuxjournal.com
|
|
| | | | | [AI summary] The article provides a comprehensive guide on securing a Linux system using UEFI secure boot, full disk encryption, and GRUB configuration. It covers steps to create and manage custom secure boot keys, set up a standalone GRUB bootloader with password protection, and implement full disk encryption to protect data and kernel images. The guide also discusses the implications of using GPL-licensed software with secure boot and emphasizes the importance of protecting the system against unauthorized access and malicious software. | |
| | | | |
www.blackduck.com
|
|
| | | Understand the importance of a Software Bill of Materials (SBOM) and how it helps manage security, license, and operational risks in open source usage. | ||