TCS logo TimburyDotOrg is owned and operated by Timbury Computer Services. For over ten years, Timbury Computer Services has shown home, small business and corporate clients how to use Linux and Open Source software to maximize efficiency and lower costs.

Updates: The TimburyDotNet web hosting site redesign is complete. Linux-only hosting!More...

iStorage diskAshur Storage Drives

Author: James Gray | Files under syndicated

With software-free setup and operation, the new iStorage diskAshur group of
ultra-secure storage drives works across all operating systems, including Linux,
macOS, Android, Chrome, thin and zero clients, MS Windows and embedded systems.


Key Considerations for Software Updates for Embedded Linux and IoT

Author: Eystein Stenberg | Files under syndicated

The Mirai botnet attack that enslaved poorly secured connected embedded
devices is yet another tangible example of the importance of security
before bringing your embedded devices online. A new strain of Mirai has
caused network outages to about a million Deutsche Telekom customers due
to poorly secured routers. more>>


Caldwell Partners’ Cyber Advisory Board Service

Author: James Gray | Files under syndicated

For many enterprises, cyber risk is the top business risk. Meanwhile,
there is simply not a sufficiently large talent pool of cyber-risk
professionals to satisfy the ever-growing demand. more>>


Postmortem: What to Do After a Security Incident

Author: Susan Sons | Files under syndicated

Incidents happen. Vulnerabilities happen. The quality of your response
can make the difference between a bad day and a disaster. What happens
after the response can make the difference between endless firefighting
and becoming stronger with every battle. A quality postmortem analysis
is free ammunition. more>>


All Your Accounts Are Belong to Us

Author: Shawn Powers | Files under syndicated

Last weekend my work phone suddenly stopped working. Not the phone
itself, but rather all service stopped. I first noticed (of course) due
to an inability to load any web pages. Then I tried calling someone and
realized my phone was disconnected. In fact, when someone tried to call
me, it said the line was no longer in service. more>>


Never Trust Yellow Fruit

Author: Shawn Powers | Files under syndicated

You’ve probably heard about the WiFi Pineapple from Hak5. It’s a
fascinating device that allows you to do some creepy pen testing. It’s
the sort of tool that could be used for evil, but it’s also incredibly
useful for securing networks.


BlueCat DNS Edge

Author: James Gray | Files under syndicated

Migration to the cloud, the flexibility of network virtualization and the promise
of IoT involve IT transformations that have placed incredible strain on enterprise
security. more>>


Jetico’s BestCrypt Container Encryption for Linux

Author: James Gray | Files under syndicated

Cyber-attacks are now constant, threats to privacy are increasing, and more rigid
regulations are looming worldwide. To help IT folks relax in the face of these
challenges, Jetico updated its BestCrypt Container Encryption solution to include
Container Guard.


Improving Linux Security with DevSecOps

Author: John S. Tonello | Files under syndicated

Ask people who run IT departments these days what keeps them up at
night, and they’ll probably tell you it’s security—or the lack of
it. With the explosive growth of malicious attacks on everything from hospitals
to Fortune 500s, security—not hardware, software and even staff—is
what currently makes life miserable.


Wibu-Systems CmASIC

Author: James Gray | Files under syndicated

Wibu-Systems describes the new generation of its CmASIC module as “the
answer to the security-by-design needs of modern embedded computing
technology leaders:. CmASIC is a module that Intelligent Device
Manufacturers (IDMs) can directly embed into their boards to provide
out-of-the box security and entitlement management.