Summary
Thanks for driving onward with me on this amazing journey into what is available in the Linux world for cybersecurity resources and reference materials. As I mentioned earlier, please check the book’s GitHub repository often for updates and new information, especially newly updated resources in the cheat sheet.
I trust you have enjoyed this chapter’s departure from making you type and test new technologies. I know that the landscape changes from day to day. This is why I implore you to seek out as many trustworthy resources as possible.
We’ve touched briefly on a great many companies and resources in this chapter. You should now have a firm grasp on some of the most influential public and private resources (beyond your own vendors). Since you already know how to determine what comprises your solution as a whole, you are also now empowered on how to search for risks in those components. In closing, and most importantly, you now know that there’...