Press "Enter" to skip to content

Month: September 2022

Enterprise Linux Security Episode 44 – Is Linux less of a Target?

In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some news updates as well.

Relevant Articles

Download Links

Comments closed

Enterprise Linux Security Episode 43 – Grand Theft Data

In this episode, Jay and Joao discuss a handful of cybersecurity events in the news. While none of these stories are super exciting from a technical standpoint, there’s definitely some lessons to be learned. As part of this discussion, Jay and Joao will talk about topics related to the recent Grand Theft Auto leak, as breaches that targeted Uber, 2k games, and more.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!

Recent news of Patreon firing their security team is making the rounds online, and in this episode, Jay and Joao will talk about this very strange story and some takeaways from it.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 41 – Important CISO Focus Areas

What are some of the important areas that a Chief Information Security Officer should focus on? In this episode, Jay and Joao discuss a recent article where Aman Sood (a CISO for Jimdo) discusses important aspects of the job to pay attention to. This information from the perspective of an actual CISO offers a unique lens through which to look at these critical focus areas.

Relevant links

Download links

Comments closed

Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery

Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.

Relevant Links

Download Links

Comments closed