Understanding Linux v. Windows Attack Vectors In the world of information technology there are many threats to end users, organizations, and customers. Malicious actors tailor their attacks to fit the vulnerabilities of the target, objective of the attack, and...
ZeroLock & SELinux Comparison and Compatibility ZeroLock® is 100% compatible with SELinux. You do not need to disable SELinux protections to use ZeroLock. Overall, SELinux provides powerful, effective MAC for Linux systems. However, SELinux requires detailed...
Securing Linux Infrastructure Linux is the most critical component underlying systems in public clouds, private datacenters, and embedded/ IoT devices—yet there has been a lack of availability of effective tools to secure them. Most offerings are derived from products...
Fileless Attacks vs. Traditional Attacks The following document describes fileless attacks and how they differ from other types of cyber attacks. Additionally, this document examines ways to help prevent fileless attacks as well as the best detection methods for...
Protecting Containers with ZeroLock® The following document describes how the ZeroLock® agent interacts with containers running on Linux® systems. This document addresses a deployment model where ZeroLock agents are deployed on a baremetal Linux OS or Linux VM that...
Securing WordPress with ZeroLock® for Linux® WordPress is one of the most popular content management systems in the world, enabling non-technical users to create beautiful, effective websites. Powering millions of websites, it’s a frequent target of hackers. While...