Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations

Play

In this episode, Jay and Joao will discuss a report earlier this year that reveals the “top 10 cybersecurity misconfigurations”. These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it’s definitely a list everyone should pay close attention to.

Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

Relevant Article

Download Links

Episode 8 – Trojan Source, & CISA’s Directive

Play

Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

Episode downloads

Episode-specific links