Operations | Monitoring | ITSM | DevOps | Cloud

February 2025

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.

Canonical achieves ISO 21434 certification, strengthening automotive cybersecurity standards

Canonical is proud to announce it has achieved the ISO 21434 certification for its Security Management System, following an extensive assessment by TÜV SÜD, a globally respected certification provider. This milestone highlights Canonical’s leadership in providing trusted and reliable open source solutions for the automotive sector.

Ubuntu available in Microsoft's new WSL distribution format

We are happy to announce that Ubuntu on Windows Subsystem for Linux (WSL) is now available in Microsoft’s new tar-based distribution architecture. Ubuntu has been a widely used Linux distribution on WSL, offering a familiar development environment for many users. This new distribution architecture for WSL will make adoption easier in enterprise environments by enabling image customization and deployments at scale.

The role of FIPS 140-3 in the latest FedRAMP guidance

There’s good news in the US federal compliance space. The latest FedRAMP policy on the use of cryptographic modules relaxes some of the past restrictions that prevented organizations from applying critical security updates. There has long been a tension between the requirements for strictly certified FIPS crypto modules and the need to keep software patched and up to date with the latest security vulnerability fixes.

How to reduce data storage costs by up to 50% with Ceph

In our last blog post we talked about how you can use Intel QAT with Canonical Ceph, today we’ll cover why this technology is important from a business perspective – in other words, we’re talking data storage costs. Retaining and protecting data has an inherent cost based on the underlying architecture of the system used to store it.