Close Menu
    Trending
    • STOP Building Useless ML Projects – What Actually Works
    • Credit Risk Scoring for BNPL Customers at Bati Bank | by Sumeya sirmula | Jul, 2025
    • The New Career Crisis: AI Is Breaking the Entry-Level Path for Gen Z
    • Musk’s X appoints ‘king of virality’ in bid to boost growth
    • Why Entrepreneurs Should Stop Obsessing Over Growth
    • Implementing IBCS rules in Power BI
    • What comes next for AI copyright lawsuits?
    • Why PDF Extraction Still Feels LikeHack
    AIBS News
    • Home
    • Artificial Intelligence
    • Machine Learning
    • AI Technology
    • Data Science
    • More
      • Technology
      • Business
    AIBS News
    Home»Data Science»CIQ Delivers Technical Preview of Security-Hardened Enterprise Linux
    Data Science

    CIQ Delivers Technical Preview of Security-Hardened Enterprise Linux

    Team_AIBS NewsBy Team_AIBS NewsMarch 12, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the provision of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

    The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced menace detection and premier help, all whereas sustaining API and utility binary interface (ABI) compatibility with the Enterprise Linux customary.

    Because the pace, sophistication and quantity of assaults on company techniques speed up, CISOs and IT safety groups battle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured accurately, is updated and protects their apps and companies from malicious threats. Additional, they’ve entry to the help and companies from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

    “The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations battle to persistently thwart safety assaults throughout their Linux environments the place even a single exploit poses a significant threat. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into important software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux customary.”

    The CIQ workforce has researched widespread safety menace vectors and have actively addressed limiting these on this model. The product delivers:

    • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating lots of the potential assault surfaces and customary exploit vectors.

    • Accelerated Threat Mitigation: Addresses safety threats forward of normal updates, considerably decreasing publicity time.

    • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

    • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

    • Easy Deployment: Delivers pre-hardened techniques, saving time and assets on safety configurations.

    • Enterprise Linux: Appropriate with the Enterprise Linux requirements.

    A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and guaranteeing constant protection throughout all techniques is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ workforce offers help to assist mitigate points or troubleshoot issues.

    “I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux challenge for 20 years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one after the other, Rocky Linux from CIQ – Hardened will repair CVEs and likewise be taught and introduce modifications so it could actually proactively mitigate total courses of comparable bugs that aren’t but found or patched.”

    This hardened Linux distribution delivers a secure and safe platform, minimizing downtime and simplifying safety administration. It’s ultimate for delicate infrastructure and permits organizations to give attention to their core mission, not working system upkeep.

    As all the time, all the CIQ open supply work is completed within the open and could be discovered within the following public Git repositories for others to leverage and contribute again to. customers can sign up to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview shall be accessible on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge shall be aired on March 19, 2025.

    RENO, Nev—March 11, 2025— Software program infrastructure firm CIQ introduced the provision of a preview of Rocky Linux from CIQ – Hardened, a model of Enterprise Linux that’s optimized for environments with stringent safety necessities, reminiscent of stronger password insurance policies, reminiscence corruption detection, kernel integrity checking and SSH restrictions.

    The product delivers Rocky Linux by way of safe provide chain and packages, pre-configured safety, code stage hardening that blocks generally used exploit paths, automated safety updates, enhanced menace detection and premier help, all whereas sustaining API and utility binary interface (ABI) compatibility with the Enterprise Linux customary.

    Because the pace, sophistication and quantity of assaults on company techniques speed up, CISOs and IT safety groups battle to use an efficient and constant Linux safety coverage throughout all their servers. With Rocky Linux from CIQ – Hardened, they’ll deploy a trusted model of Enterprise Linux and be assured that it’s delivered securely, configured accurately, is updated and protects their apps and companies from malicious threats. Additional, they’ve entry to the help and companies from Linux consultants that may not solely troubleshoot points, however proactively assist them with their distinctive safety necessities.

    “The creation of Rocky Linux from CIQ – Hardened was a direct results of the numerous conversations I’ve had with security-concerned IT executives,” stated Gregory Kurtzer, CEO of CIQ. “Organizations battle to persistently thwart safety assaults throughout their Linux environments the place even a single exploit poses a significant threat. Rocky Linux from CIQ – Hardened makes it more durable for malicious attackers to interrupt into important software program infrastructure by offering a safer basis and protection in depth whereas sustaining compatibility with the Enterprise Linux customary.”

    The CIQ workforce has researched widespread safety menace vectors and have actively addressed limiting these on this model. The product delivers:

    • System Degree Hardening: Minimizes zero-day and CVE dangers by eliminating lots of the potential assault surfaces and customary exploit vectors.

    • Accelerated Threat Mitigation: Addresses safety threats forward of normal updates, considerably decreasing publicity time.

    • Robust Entry Controls: Implements superior password hashing, strict authentication insurance policies and hardened entry controls.

    • Superior Menace Detection: Detects refined intrusions that evade conventional safety with Linux Kernel Runtime Guard (LKRG).

    • Easy Deployment: Delivers pre-hardened techniques, saving time and assets on safety configurations.

    • Enterprise Linux: Appropriate with the Enterprise Linux requirements.

    A hardened working system is often the baseline of an general technique. Nonetheless, assault vectors consistently change and guaranteeing constant protection throughout all techniques is a problem. Rocky Linux from CIQ – Hardened is constructed on the usual Rocky Linux from CIQ base and is delivered and validated by way of safe provide chain, with all safety patches and updates utilized promptly. And within the case of any points, the CIQ workforce offers help to assist mitigate points or troubleshoot issues.

    “I’m  excited to see the discharge of a safety enhanced Linux distribution,” stated Alexander Peslyak (aka Photo voltaic Designer), lead for the Openwall GNU/*/Linux challenge for 20 years and now an worker of CIQ. “Whereas most distributions nonetheless repair particular person CVEs one after the other, Rocky Linux from CIQ – Hardened will repair CVEs and likewise be taught and introduce modifications so it could actually proactively mitigate total courses of comparable bugs that aren’t but found or patched.”

    This hardened Linux distribution delivers a secure and safe platform, minimizing downtime and simplifying safety administration. It’s ultimate for delicate infrastructure and permits organizations to give attention to their core mission, not working system upkeep.

    As all the time, all the CIQ open supply work is completed within the open and could be discovered within the following public Git repositories for others to leverage and contribute again to. customers can sign up to entry and validate the technical preview of Rocky Linux from CIQ – Hardened. The preview shall be accessible on March 20 from the CIQ buyer portal and the cloud marketplaces. Moreover, a webinar outlining the small print of the discharge shall be aired on March 19, 2025.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow AI is booming in China
    Next Article The Hard Truth About AI Search Tools | by John Mathew | Mar, 2025
    Team_AIBS News
    • Website

    Related Posts

    Data Science

    The New Career Crisis: AI Is Breaking the Entry-Level Path for Gen Z

    July 1, 2025
    Data Science

    GenAI Will Fuel People’s Jobs, Not Replace Them. Here’s Why

    July 1, 2025
    Data Science

    Futurwise: Unlock 25% Off Futurwise Today

    July 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    STOP Building Useless ML Projects – What Actually Works

    July 1, 2025

    I Tried Buying a Car Through Amazon: Here Are the Pros, Cons

    December 10, 2024

    Amazon and eBay to pay ‘fair share’ for e-waste recycling

    December 10, 2024

    Artificial Intelligence Concerns & Predictions For 2025

    December 10, 2024

    Barbara Corcoran: Entrepreneurs Must ‘Embrace Change’

    December 10, 2024
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    Most Popular

    Save $90 on the Microsoft Office Apps Your Business Needs

    May 13, 2025

    Ridiculousness Theme Song Makes Writer $1 Million Per Year

    January 24, 2025

    Ai Education. Artificial intelligence is changing… | by Nisar Arsal | Jan, 2025

    January 6, 2025
    Our Picks

    STOP Building Useless ML Projects – What Actually Works

    July 1, 2025

    Credit Risk Scoring for BNPL Customers at Bati Bank | by Sumeya sirmula | Jul, 2025

    July 1, 2025

    The New Career Crisis: AI Is Breaking the Entry-Level Path for Gen Z

    July 1, 2025
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Aibsnews.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.