• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
Tuesday, June 3, 2025
newsaiworld
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us
No Result
View All Result
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us
No Result
View All Result
Morning News
No Result
View All Result
Home Data Science

CIQ Delivers Technical Preview of Safety-Hardened Enterprise Linux

Admin by Admin
March 13, 2025
in Data Science
0
Ciq Logo 2 1 10 23.png
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the supply of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced risk detection and premier assist, all whereas sustaining API and software binary interface (ABI) compatibility with the Enterprise Linux commonplace.

Because the velocity, sophistication and quantity of assaults on company methods speed up, CISOs and IT safety groups wrestle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured appropriately, is updated and protects their apps and providers from malicious threats. Additional, they’ve entry to the assist and providers from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

“The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations wrestle to constantly thwart safety assaults throughout their Linux environments the place even a single exploit poses a serious danger. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into vital software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux commonplace.”

The CIQ staff has researched frequent safety risk vectors and have actively addressed limiting these on this model. The product delivers:

  • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating most of the potential assault surfaces and customary exploit vectors.

  • Accelerated Threat Mitigation: Addresses safety threats forward of ordinary updates, considerably lowering publicity time.

  • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

  • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

  • Easy Deployment: Delivers pre-hardened methods, saving time and assets on safety configurations.

  • Enterprise Linux: Suitable with the Enterprise Linux requirements.

A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and making certain constant protection throughout all methods is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ staff supplies assist to assist mitigate points or troubleshoot issues.

“I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux undertaking for twenty years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one by one, Rocky Linux from CIQ – Hardened will repair CVEs and likewise study and introduce adjustments so it will possibly proactively mitigate whole courses of comparable bugs that aren’t but found or patched.”

This hardened Linux distribution delivers a steady and safe platform, minimizing downtime and simplifying safety administration. It’s ideally suited for delicate infrastructure and permits organizations to concentrate on their core mission, not working system upkeep.

As all the time, all the CIQ open supply work is finished within the open and will be discovered within the following public Git repositories for others to leverage and contribute again to. customers can enroll to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview will probably be out there on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge will probably be aired on March 19, 2025.

RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the supply of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced risk detection and premier assist, all whereas sustaining API and software binary interface (ABI) compatibility with the Enterprise Linux commonplace.

Because the velocity, sophistication and quantity of assaults on company methods speed up, CISOs and IT safety groups wrestle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured appropriately, is updated and protects their apps and providers from malicious threats. Additional, they’ve entry to the assist and providers from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

“The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations wrestle to constantly thwart safety assaults throughout their Linux environments the place even a single exploit poses a serious danger. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into vital software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux commonplace.”

The CIQ staff has researched frequent safety risk vectors and have actively addressed limiting these on this model. The product delivers:

  • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating most of the potential assault surfaces and customary exploit vectors.

  • Accelerated Threat Mitigation: Addresses safety threats forward of ordinary updates, considerably lowering publicity time.

  • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

  • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

  • Easy Deployment: Delivers pre-hardened methods, saving time and assets on safety configurations.

  • Enterprise Linux: Suitable with the Enterprise Linux requirements.

A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and making certain constant protection throughout all methods is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ staff supplies assist to assist mitigate points or troubleshoot issues.

“I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux undertaking for twenty years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one by one, Rocky Linux from CIQ – Hardened will repair CVEs and likewise study and introduce adjustments so it will possibly proactively mitigate whole courses of comparable bugs that aren’t but found or patched.”

This hardened Linux distribution delivers a steady and safe platform, minimizing downtime and simplifying safety administration. It’s ideally suited for delicate infrastructure and permits organizations to concentrate on their core mission, not working system upkeep.

As all the time, all the CIQ open supply work is finished within the open and will be discovered within the following public Git repositories for others to leverage and contribute again to. customers can enroll to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview will probably be out there on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge will probably be aired on March 19, 2025.



READ ALSO

Enhancing LinkedIn Advert Methods with Information Analytics

MiTAC Computing Unveils AI and Cloud Infrastructure Partnership with AMD at COMPUTEX

Tags: CIQDeliversEnterpriseLinuxPreviewSecurityHardenedTechnical

Related Posts

Image fx 67.png
Data Science

Enhancing LinkedIn Advert Methods with Information Analytics

June 3, 2025
Mitac and amd logos 2 1 0525.png
Data Science

MiTAC Computing Unveils AI and Cloud Infrastructure Partnership with AMD at COMPUTEX

June 2, 2025
Generic bits bytes data 2 1 shutterstock 1013661232.jpg
Data Science

Information Bytes 20250526: Largest AI Coaching Middle?, Massive AI Pursues AGI and Past, NVIDIA’s Quantum Strikes, RISC-V Turns 15

June 1, 2025
Data lakes in cloud.jpg
Data Science

The Evolution of Knowledge Lakes within the Cloud: From Storage to Intelligence

June 1, 2025
Groq logo 2 1 0824.jpg
Data Science

Groq Named Inference Supplier for Bell Canada’s Sovereign AI Community

May 31, 2025
21501656071 2.jpg
Data Science

From Screening to Onboarding: How AI is Reshaping the Complete Recruitment Lifecycle

May 30, 2025
Next Post
Screenshot 2025 03 11 At 11.33.18 am.png

The way to Develop Complicated DAX Expressions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

0 3.png

College endowments be a part of crypto rush, boosting meme cash like Meme Index

February 10, 2025
Gemini 2.0 Fash Vs Gpt 4o.webp.webp

Gemini 2.0 Flash vs GPT 4o: Which is Higher?

January 19, 2025
1da3lz S3h Cujupuolbtvw.png

Scaling Statistics: Incremental Customary Deviation in SQL with dbt | by Yuval Gorchover | Jan, 2025

January 2, 2025
0khns0 Djocjfzxyr.jpeg

Constructing Data Graphs with LLM Graph Transformer | by Tomaz Bratanic | Nov, 2024

November 5, 2024
How To Maintain Data Quality In The Supply Chain Feature.jpg

Find out how to Preserve Knowledge High quality within the Provide Chain

September 8, 2024

EDITOR'S PICK

Nansen.jpg

Nansen acquires StakeWithUs, permits direct staking on platform

September 10, 2024
1rzxwxa8tte24ch7cjwugbq.png

Grasp Bots Earlier than Beginning with AI Brokers: Easy Steps to Create a Mastodon Bot with Python | by Sarah Lea | Dec, 2024

December 27, 2024
11h8rhygs2sjufsyvc9 Hbw.png

Learn how to Use Pre-Educated Language Fashions for Regression | by Aden Haussmann | Jan, 2025

January 18, 2025
Depositphotos 71682675 Xl Scaled.jpg

Six Indicators It is Time to Grasp Massive Knowledge Administration

August 20, 2024

About Us

Welcome to News AI World, your go-to source for the latest in artificial intelligence news and developments. Our mission is to deliver comprehensive and insightful coverage of the rapidly evolving AI landscape, keeping you informed about breakthroughs, trends, and the transformative impact of AI technologies across industries.

Categories

  • Artificial Intelligence
  • ChatGPT
  • Crypto Coins
  • Data Science
  • Machine Learning

Recent Posts

  • LLMs + Pandas: How I Use Generative AI to Generate Pandas DataFrame Summaries
  • Enhancing LinkedIn Advert Methods with Information Analytics
  • Robinhood Seals Bitstamp Acquisition, Marks Entry into Crypto Buying and selling
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy

© 2024 Newsaiworld.com. All rights reserved.

No Result
View All Result
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us

© 2024 Newsaiworld.com. All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?