Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we speak with industry-leading Linux endpoint encryption provider WinMagic about the challenges of securing today’s Linux endpoints, the  importance of defense-in-depth and full disk encryption to support a Zero Trust strategy, and what is required to fortify a modern Linux infosec architecture with a robust endpoint security strategy.

We also examine how you can redirect all traffic of your Arch Linux or Kali Linux OS through the Tor Network to strengthen your privacy online with two free and open-source shell scripts we love: archtorify and kalitorify.

Finally, we invite you to share your knowledge with a community of fellow Linux security enthusiasts and make an impact by contributing an article for our site. Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Strengthen Your Linux Endpoint Security & Zero Trust Strategy with Defense-in-Depth & Endpoint Encryption

To understand what is required to fortify the a modern Linux infosec architecture with a robust endpoint security strategy, we spoke with34.Key AbstractDigital industry-leading Linux endpoint encryption provider WinMagic about the challenges of securing today’s Linux endpoints, the  importance of defense-in-depth and full disk encryption to support a Zero Trust strategy, and more! Here's what we learned.

Learn more about winmagic securedoc for linux fortify your infosec architecture zero trust strategy with defense in depth endpoint encryption

How To Create a Transparent Proxy through the Tor Network to Protect Your Privacy Online with archtorify & kalitorify

If you are an Arch Linux or Kali Linux user looking to improve your privacy online with Tor, this article will explain how you can create a Transparent Proxy through the Tor Network to redirect all traffic of your OS through the Tor Network with two two free and open-source shell scripts we love: archtorify and kalitorify.13.Lock StylizedMotherboard

Learn more about how to create a transparent proxy through the tor network to protect your privacy online with archtorify kalitorify

 

Call for Contributors with Knowledge of Linux Firewalls!

We’re looking for contributors with an understanding of Linux firewalls who can help provide insight into how firewalls can be implemented and configured to improve the security of a Linux system. Sound like something you could do? Learn how to get started!2.Motherboard

Learn more about call for contributors with knowledge of linux firewalls