Press "Enter" to skip to content

Tag: linux security

Enterprise Linux Security Episode 46 – Monitoring

If you’re in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will grow and expand over time, Jay and Joao will give you some tips in this episode to get you started. Check out this episode for some tips on some of the baseline checks you should implement with your monitoring solution of choice.

Download Links

Comments closed

Enterprise Linux Security Episode 44 – Is Linux less of a Target?

In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some news updates as well.

Relevant Articles

Download Links

Comments closed

Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery

Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!

What happens when you open up the Remote Desktop Protocol (RDP) to the public Internet? Definitely some shenanigans, that’s what. In this episode, Jay and Joao discuss some recent news, which includes a company that made the mistake of making RDP available to everyone, multiple crypto-malware infections at the same time, and other news.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains

When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 37 – System Administrator Appreciation Day 2022

System Administrators are the heroes we need, and in today’s episode of Enterprise Linux Security, we celebrate Sysadmin Day 2022 and the many people that work tirelessly to keep our servers running.

Relevant Links

Download Links

Comments closed

Enterprise Linux Security Episode 36 – First Live Episode!

In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.

Download Links

Comments closed

Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses

In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.

Download Links

Relevant Articles

Comments closed

Enterprise Linux Security Episode 34 – How one business lost Everything

What would it be like to suffer a cyberattack event, that literally closes down an entire business? That’s exactly what happened to United Structures of America, a steel manufacturing company. In this episode, Jay and Joao discuss what happened, and some of the lessons learned that should cause other organizations to take a hard look at how insecure their own systems are.

Download Links

Relevant Articles

Comments closed

Enterprise Linux Security Episode 32 – MySQL for Everyone!

Are you a fan of MySQL? What if we told you that there’s an infinite supply of it online, right out in the open?! It’s literally as bad as it sounds! In this episode, Jay and Joao discuss how over 3.6 million MySQL instances are publicly available, as well as other forms of unintended public access.

Download Links

Relevant Articles

Comments closed