Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

What is the Cyber Resilience Act?

The Cyber Resilience Act is an upcoming European Union legislation that aims to implement more rigorous cybersecurity commitments, documentation, and vulnerability reporting requirements for the IT industry. The legislation would apply to developers, distributors, manufacturers and retailers of hardware, devices, software, applications, and other “products with digitally connected elements” sold within the EU. The requirements you need to meet depend on the CRA classification of products.

Upgrade your desktop: Ubuntu 24.04.1 LTS is now available

Whether you’re a first time Linux user, experienced developer, academic researcher or enterprise administrator, Ubuntu 24.04 LTS Noble Numbat is the best way to benefit from the latest advancements in the Linux ecosystem — just in time for Ubuntu’s 20 year mark. The release of Ubuntu 24.04.1 LTS represents the consolidation of fixes and improvements identified during the initial launch of Ubuntu 24.04 LTS.

STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide

In this webinar, Henry Coggill will showcase USG (the Ubuntu Security Guide) and demonstrate how it can automate compliance requirements. We will discuss the hardening profiles that are available, including DISA-STIG and CIS benchmarks, then cover setting up and configuring the tool and demonstrate the configuration options that you can make for maximum security and coverage of the STIG rules.

A data lake on your cloud with Spark, Kubernetes and OpenStack

Data lake is a very large scale data processing paradigm that disrupts the conventional data warehousing model. Data lakes can offer greater flexibility whilst retaining the benefits and efficiency of centralised data governance. With Canonical OpenStack private cloud platform, Kubernetes and Charmed Spark solutions, your data lake architecture can also benefit from extended flexibility and scalability whilst remaining cost effective to operate.

How Ubuntu keeps you secure with KEV prioritisation

The Known Exploited Vulnerabilities Catalog (KEV) is a database published by the US Cybersecurity and Infrastructure Security Agency (CISA) that serves as a reference to help organisations better manage vulnerabilities and keep pace with threat activity. Since its first publication in 2021, it has gone beyond its US federal agency scope and has been adopted by various organisations across the globe as guidance for their vulnerability management prioritisation frameworks.

Optimise your ML workloads on Kubernetes

Kubernetes has proven to be a vital tool for developing and running ML models. It enhances experimentation, workflow management, and ensures high availability while handling the resource-intensive nature of AI workloads. With optimizations, Kubernetes can further improve resource utilization, making AI/ML projects more efficient.

Exploring Ubuntu Confidential VMs with Intel TDX on Google Cloud

Confidential computing is a revolutionary technology that disrupts the conventional threat model of public clouds. In the past, vulnerabilities within the extensive codebase of the cloud’s privileged system software, including the operating system and hypervisor, posed a constant risk to the confidentiality and integrity of code and data in operation. Likewise, unauthorized access by a cloud administrator could compromise the security of your virtual machine (VM).