Sensitive information is everywhere:
- from your user databases
- to your accounting software
- inside your backups
- on your smartphones
Names. Password hashes. Emails.
Financials. Customers. Quotes.
Configurations. Passwords.
Every company has their own threat model.
Yet – everyone should protect their most sensitive data.
Continue reading “The Operator’s LUKS Bible”



