Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 6 March 2023

Join us at Everything Open 2023 in Melbourne to Learn about Open Source Technologies and Best Practices for Linux Security


Are you interested in the latest trends in open source technologies? Look no further than Everything Open 2023 in Melbourne, Australia!

Event info: https://2023.everythingopen.au/

From 14-16 March 2023, the brightest minds in open source technologies will come together to share their expertise, insights, and experiences. If you’re passionate about this field, this is an event you won’t want to miss.

Our team will be there to provide talks and discussions about the latest developments in open source technologies. On 15 March Wednesday, we’ll be sharing some exciting new ideas and concepts that are sure to change the game.

To better understand the technologies we’ll be discussing, we encourage attendees to read our whitepaper on Linux security patches: best practices for risk-mitigation and uptime. This paper offers valuable insights into the best strategies for ensuring the security and reliability of your Linux systems. You can access the whitepaper at this link.

We invite everyone who is interested in open source technologies to come and see us at Everything Open 2023. This event is a unique opportunity to meet with other professionals in the field and to learn about the latest trends and developments.

If you want to stay ahead of the curve in this rapidly evolving field, Everything Open 2023 is the place to be. We look forward to seeing you there!

Related posts


ebarretto
18 June 2025

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability (CVE-2025-6018) was found in the PAM configuration. This CVE does not impact default Ubuntu installations because of how the pam_systemd.so and pam_env.so modules are invoked. The second vulnerab ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...