• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
Saturday, September 13, 2025
newsaiworld
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us
No Result
View All Result
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us
No Result
View All Result
Morning News
No Result
View All Result
Home Data Science

CIQ Delivers Technical Preview of Safety-Hardened Enterprise Linux

Admin by Admin
March 13, 2025
in Data Science
0
Ciq Logo 2 1 10 23.png
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the supply of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced risk detection and premier assist, all whereas sustaining API and software binary interface (ABI) compatibility with the Enterprise Linux commonplace.

Because the velocity, sophistication and quantity of assaults on company methods speed up, CISOs and IT safety groups wrestle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured appropriately, is updated and protects their apps and providers from malicious threats. Additional, they’ve entry to the assist and providers from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

“The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations wrestle to constantly thwart safety assaults throughout their Linux environments the place even a single exploit poses a serious danger. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into vital software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux commonplace.”

The CIQ staff has researched frequent safety risk vectors and have actively addressed limiting these on this model. The product delivers:

  • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating most of the potential assault surfaces and customary exploit vectors.

  • Accelerated Threat Mitigation: Addresses safety threats forward of ordinary updates, considerably lowering publicity time.

  • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

  • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

  • Easy Deployment: Delivers pre-hardened methods, saving time and assets on safety configurations.

  • Enterprise Linux: Suitable with the Enterprise Linux requirements.

A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and making certain constant protection throughout all methods is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ staff supplies assist to assist mitigate points or troubleshoot issues.

“I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux undertaking for twenty years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one by one, Rocky Linux from CIQ – Hardened will repair CVEs and likewise study and introduce adjustments so it will possibly proactively mitigate whole courses of comparable bugs that aren’t but found or patched.”

This hardened Linux distribution delivers a steady and safe platform, minimizing downtime and simplifying safety administration. It’s ideally suited for delicate infrastructure and permits organizations to concentrate on their core mission, not working system upkeep.

As all the time, all the CIQ open supply work is finished within the open and will be discovered within the following public Git repositories for others to leverage and contribute again to. customers can enroll to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview will probably be out there on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge will probably be aired on March 19, 2025.

RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the supply of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced risk detection and premier assist, all whereas sustaining API and software binary interface (ABI) compatibility with the Enterprise Linux commonplace.

Because the velocity, sophistication and quantity of assaults on company methods speed up, CISOs and IT safety groups wrestle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured appropriately, is updated and protects their apps and providers from malicious threats. Additional, they’ve entry to the assist and providers from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

“The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations wrestle to constantly thwart safety assaults throughout their Linux environments the place even a single exploit poses a serious danger. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into vital software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux commonplace.”

The CIQ staff has researched frequent safety risk vectors and have actively addressed limiting these on this model. The product delivers:

  • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating most of the potential assault surfaces and customary exploit vectors.

  • Accelerated Threat Mitigation: Addresses safety threats forward of ordinary updates, considerably lowering publicity time.

  • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

  • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

  • Easy Deployment: Delivers pre-hardened methods, saving time and assets on safety configurations.

  • Enterprise Linux: Suitable with the Enterprise Linux requirements.

A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and making certain constant protection throughout all methods is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ staff supplies assist to assist mitigate points or troubleshoot issues.

“I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux undertaking for twenty years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one by one, Rocky Linux from CIQ – Hardened will repair CVEs and likewise study and introduce adjustments so it will possibly proactively mitigate whole courses of comparable bugs that aren’t but found or patched.”

This hardened Linux distribution delivers a steady and safe platform, minimizing downtime and simplifying safety administration. It’s ideally suited for delicate infrastructure and permits organizations to concentrate on their core mission, not working system upkeep.

As all the time, all the CIQ open supply work is finished within the open and will be discovered within the following public Git repositories for others to leverage and contribute again to. customers can enroll to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview will probably be out there on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge will probably be aired on March 19, 2025.



READ ALSO

Unusual Makes use of of Frequent Python Commonplace Library Capabilities

A Newbie’s Information to CompTIA Cloud Necessities+ Certification (CLO-002)

Tags: CIQDeliversEnterpriseLinuxPreviewSecurityHardenedTechnical

Related Posts

Bala python stdlib funcs.jpeg
Data Science

Unusual Makes use of of Frequent Python Commonplace Library Capabilities

September 13, 2025
Cloud essentials.jpg
Data Science

A Newbie’s Information to CompTIA Cloud Necessities+ Certification (CLO-002)

September 12, 2025
Awan 12 essential lessons building ai agents 1.png
Data Science

12 Important Classes for Constructing AI Brokers

September 11, 2025
Data modernization services.png
Data Science

How do knowledge modernization companies scale back threat in legacy IT environments?

September 10, 2025
Bala docker for python devs.jpeg
Data Science

A Light Introduction to Docker for Python Builders

September 10, 2025
How better data management services can take your analytics from messy to meaningful.png
Data Science

How Higher Knowledge Administration Companies Can Take Your Analytics from Messy to Significant

September 9, 2025
Next Post
Screenshot 2025 03 11 At 11.33.18 am.png

The way to Develop Complicated DAX Expressions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

0 3.png

College endowments be a part of crypto rush, boosting meme cash like Meme Index

February 10, 2025
Gemini 2.0 Fash Vs Gpt 4o.webp.webp

Gemini 2.0 Flash vs GPT 4o: Which is Higher?

January 19, 2025
1da3lz S3h Cujupuolbtvw.png

Scaling Statistics: Incremental Customary Deviation in SQL with dbt | by Yuval Gorchover | Jan, 2025

January 2, 2025
0khns0 Djocjfzxyr.jpeg

Constructing Data Graphs with LLM Graph Transformer | by Tomaz Bratanic | Nov, 2024

November 5, 2024
How To Maintain Data Quality In The Supply Chain Feature.jpg

Find out how to Preserve Knowledge High quality within the Provide Chain

September 8, 2024

EDITOR'S PICK

Screenshot 2025 02 13 At 11.30.43 am 1024x667.png

Publish Interactive Knowledge Visualizations for Free with Python and Marimo

February 14, 2025
Bitcoin ethereum forest.jpg

Analysts consider Bitcoin, Ethereum could face additional draw back within the brief time period

August 9, 2024
Big Data .jpg

The Influence of AI on the Way forward for Work

September 3, 2024
1ufliw9dimri66botc9sdkg.png

Galactic Distances. How Far Are We from Alien… | by James Gearheart | Sep, 2024

September 22, 2024

About Us

Welcome to News AI World, your go-to source for the latest in artificial intelligence news and developments. Our mission is to deliver comprehensive and insightful coverage of the rapidly evolving AI landscape, keeping you informed about breakthroughs, trends, and the transformative impact of AI technologies across industries.

Categories

  • Artificial Intelligence
  • ChatGPT
  • Crypto Coins
  • Data Science
  • Machine Learning

Recent Posts

  • Generalists Can Additionally Dig Deep
  • If we use AI to do our work – what’s our job, then?
  • ‘Sturdy Likelihood’ Of US Forming Strategic Bitcoin Reserve In 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy

© 2024 Newsaiworld.com. All rights reserved.

No Result
View All Result
  • Home
  • Artificial Intelligence
  • ChatGPT
  • Data Science
  • Machine Learning
  • Crypto Coins
  • Contact Us

© 2024 Newsaiworld.com. All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?