Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)

Play

Open Source Intelligence is a very interesting topic – it’s all about the things that might get unknowingly leaked, and this leaked information is perfectly legal to know and possess! The IP address that points to a domain, vacation photos on twitter, or even what you had for lunch can be used against you in order to build a profile. In this episode, Jay and Joao discuss OSINT and some tools that are commonly used to find it.

Download links

Enterprise Linux Security Episode 64 – FIPS

Play

There are many security certifications that an organization can utilize to prove compliance with one or more standards, and being in compliance can bring additional benefits and opportunities. Federal Information Processing Standard (FIPS) is one of these certifications, and in this episode, Jay and Joao are joined by Nikos from Tuxcare to discuss FIPS and why your organization might consider it.

Download Links

Enterprise Linux Security Episode 63 – Their Cloud

Play

According to several sources, and confirmed by Western Digital themselves, there’s been a breach regarding the company’s cloud related offerings, such as “My Cloud” and various cloud-enabled storage products. Many of the details have yet to be revealed, but considering that Western Digital filed a 10-K form with the SEC, it’s very possible that it could be serious. In this episode, Jay and Joao discuss this story so far, with more specific details sure to come.

Download Links

Relevant Articles

Enterprise Linux Security Episode 62 – Operation: Cookie Monster

Play

A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was dubbed “Operation: Cookie Monster”, and while that certainly sounds like satire – it’s totally not. Genesis, the marketplace in question, was seized by a law enforcement team consisting of personnel from multiple countries. In this episode, Jay and Joao discuss this story. But not only that, what are some of the ramifications of this? Could this have lasting impacts on the industry in general? Definitely don’t miss this episode!

Relevant Articles

Download Links

Enterprise Linux Security Episode 61 – The Principle of Least Privilege

Play

With the recent takeover of the “Linus Tech Tips” YouTube channel, what can we learn? In this episode, Jay and Joao will discuss some of the ways you can prevent such an event from happening to you (and it’s not just YouTube that’s a target).

Download Links

    Enterprise Linux Security Episode 60 – AI Enhanced Security

    Play

    When it comes to Enterprise IT (and especially the security sector) we have our work cut out for us. As the workload increases, we look for tools and utilities to help us keep up with the demand. But what about artificial intelligence? As we discussed in a previous episode, AI is here to stay and will be making waves in security. In this episode, Jay and Joao dive in to just a few of the ways this tech might transform the security field and those that work within it (directly or indirectly).

    Download Links

    Relevant Articles

    Enterprise Linux Security Episode 59 – AlmaLinux OS

    Play

    AlmaLinux OS was created around the time of “that big CentOS” announcement, and has been a worthy solution for enterprises that wish to continue with Enterprise Linux, but without the fear of the distribution being changed into something else entirely. As a drop-in replacement for Red Hat, AlmaLinux OS continues to tackle new ground and builds a strong community. In this video, Jay and Joao are joined by Atalay Kelestemur who works on the project to discuss this distribution – and there may even be some surprises in store.

    Download Links

    Relevant Articles

    Enterprise Linux Security Episode 58 – Tales from the Red Team

    Play

    Tasks that penetration testers and security analysis perform in order to expose security weaknesses may seem like a mysterious and complicated art. Most of the time, these tasks are considered “secret sauce” and unless you work for a red team, you may not be aware of what it may look like while someone attempts to gain access from the outside. In this episode, Jay and Joao discuss a report released by CISA, that provides a very detailed account at what goes into this type of work. This report is definitely a must-read, and this episode is a must-listen!

    Download Links

    Relevant Articles

    Enterprise Linux Security Episode 57 – Record Breaking DDoS Attacks

    Play

    DDoS (Denial of Service) attacks are incredibly common, and apparently, are breaking records. In this episode, Jay and Joao discuss a recent blog post from Cloudflare regarding how popular this attack vector is becoming nowadays, as well as a quick refresher on Denial of Service attacks in general.

    Download Links

    Relevant Articles

    Enterprise Linux Security Episode 56 – Undercover Crypto Leaking

    Play

    Ransomware is one of the absolute worst things that can happen to your organization, often resulting in weeks of downtime. We discussed Ransomware recently, and now we have an interesting and time-appropriate story – a popular ransomware group apparently had an imposter within their ranks.

    Download links

    Relevant Articles