Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

emerging technology in cybersecurity

Top 15 Emerging Technology in Cybersecurity

Top 15 Emerging Technology in Cybersecurity

The need for cybersecurity is at an all-time high as the global corporate environment moves to cloud data storage and online management. With greater internet

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

Install and Run MariaDB as a Docker Container

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Install and Use Docker on Debian 10 Buster

Working Guide: Deploy AWX on Kubernetes Cluster with AWX Operator

Kubernetes Architecture: A High-level Overview of Kubernetes Cluster Components

Security

How to Perform System Security Auditing with Lynis on Ubuntu 18.04

Install Kismet on Ubuntu 18.04

Configure strongSwan VPN Client on Ubuntu 18.04/CentOS 8

Setup Squid Proxy Authentication on Ubuntu 18.04/Fedora 29/28/CentOS 7

Install WireGuard VPN Client Ubuntu 24.04

Install and Setup Suricata on Rocky Linux

Monitoring

Install Osquery on Debian 10 Buster

Install and Setup OSSEC agent on Ubuntu 18.04/CentOS 7

Integrate Wazuh Manager with ELK Stack

Install GoAccess on Ubuntu 18.04/Debian 10 Buster

Install ntopng on Rocky Linux 8

Monitor System Metrics with TICK Stack on Ubuntu 20.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy