Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014

Providing companies a software solution to audit their systems (Linux, macOS, UNIX) at CISOfy
May. 16, 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
1 of 17

More Related Content

What's hot

Kali linuxKali linux
Kali linuxafraalfalasii
Linux SecurityLinux Security
Linux Securitynayakslideshare
Linux and windowsLinux and windows
Linux and windowsDevMix
Kali linux Kali linux
Kali linux Fa6ma_
Group project 2 week45Group project 2 week45
Group project 2 week45Armandas Rokas
Kali LinuxKali Linux
Kali LinuxJack Gidding

Viewers also liked

Presentation media Presentation media
Presentation media University of Winchester
ExmarkoExmarko
Exmarkostjosnelson
How effective is the combination of your product and ancillary textsHow effective is the combination of your product and ancillary texts
How effective is the combination of your product and ancillary textsMarkusforrest96
Principios de Diseño de Realidad VirtualPrincipios de Diseño de Realidad Virtual
Principios de Diseño de Realidad VirtualUX Nights
Balancing Salaries and Incentive PayBalancing Salaries and Incentive Pay
Balancing Salaries and Incentive PayThe VisionLink Advisory Group
Manual de usuario_de_gimp_Manual de usuario_de_gimp_
Manual de usuario_de_gimp_Informática Liceo

Similar to Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014

Afganistan Culture ShockAfganistan Culture Shock
Afganistan Culture ShockMatthew Levandowski
Lean Software DevelopmentLean Software Development
Lean Software DevelopmentVashira Ravipanich
14 Habits of Great SQL Developers14 Habits of Great SQL Developers
14 Habits of Great SQL DevelopersIke Ellis
Why Limit WIP?  Why Limit WIP?
Why Limit WIP? LeanKit
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...
DevOps Best Practices: Managing and Scaling Release Automation Using Visual a...XebiaLabs
CD Roadmap Series Part 1 - From Firefighting to Faster Feature DeliveryCD Roadmap Series Part 1 - From Firefighting to Faster Feature Delivery
CD Roadmap Series Part 1 - From Firefighting to Faster Feature DeliveryXebiaLabs

Similar to Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014(20)

More from Michael Boelen

Lets make better scriptsLets make better scripts
Lets make better scriptsMichael Boelen
Getting Traction for (your) Open Source ProjectsGetting Traction for (your) Open Source Projects
Getting Traction for (your) Open Source ProjectsMichael Boelen
Linux Security for DevelopersLinux Security for Developers
Linux Security for DevelopersMichael Boelen
Commercieel gaan met je open source projectCommercieel gaan met je open source project
Commercieel gaan met je open source projectMichael Boelen
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxMichael Boelen
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen

Recently uploaded

ZestfulZestful
ZestfulTeam2080
Jens Happe - Write tests you love, not hate.pdfJens Happe - Write tests you love, not hate.pdf
Jens Happe - Write tests you love, not hate.pdfJens Happe
advanced java.pdfadvanced java.pdf
advanced java.pdfAli Bozkurt
Transpiling Pharo Classes to JS ECMAScript 5 versus ECMAScript 6Transpiling Pharo Classes to JS ECMAScript 5 versus ECMAScript 6
Transpiling Pharo Classes to JS ECMAScript 5 versus ECMAScript 6ESUG
WORTAL CRM - Profile.pdfWORTAL CRM - Profile.pdf
WORTAL CRM - Profile.pdfMarketingWortal
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...Raffi Khatchadourian

Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014