Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses

Play

In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.

Download Links

Relevant Articles

Enterprise Linux Security Episode 34 – How one business lost Everything

Play

What would it be like to suffer a cyberattack event, that literally closes down an entire business? That’s exactly what happened to United Structures of America, a steel manufacturing company. In this episode, Jay and Joao discuss what happened, and some of the lessons learned that should cause other organizations to take a hard look at how insecure their own systems are.

Download Links

Relevant Articles

Enterprise Linux Security Episode 31 – How NOT to Research Security

Play

A “researcher” with a screen name of “Sockpuppets” decides to demonstrate how insecure some specific online resources are, in the worst way possible. You can’t make this stuff up! In this episode, Jay and Joao discuss what this individual wanted to accomplish (and what happened instead).

Download Links

Relevant Articles

Enterprise Linux Security Episode 30 – Tools & Utilities

Play

There are many tools and utilities around security and network management, and in this episode of Enterprise Linux Security, Jay and Joao discuss some of their favorites.

Downloads

Enterprise Linux Security Episode 29 – High Level Threats

Play

In this episode, Jay and Joao unpack some recent news around the BVP47 vulnerability, and some very interesting details around it and how it came to be. This is one of those “spy thriller” type episodes, so don’t miss it!

Downloads

Relevant Links

Enterprise Linux Security Episode 28 – Second Factor Authentication

Play

Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends. In this episode, second factor authentication is discussed. This foundational episode will go over what it is, why you should use it, and also some of the things that can potentially weaken its benefit.

Downloads

Enterprise Linux Security Episode 27 – People Problems

Play

In the industry, we spend a great deal of time hardening our security, doing our due diligence when it comes to patching, implementing firewalls, avoiding EOL software, as well as many other aspects of our security focus. But unfortunately, even a well thought out implementation of common security controls can be rendered useless if we miss the low hanging fruit – such as training our employees and making sure they understand how serious security is, and how they can help. In this episode, Jay and Joao will discuss that and more.

Downloads

Enterprise Linux Security Episode 23 – Busting 5 IT Security Myths

Play

Cyber security is a huge topic, and through the years the industry changes rapidly to keep up with current threats and related challenges. As a result, some of the beliefs and mindsets we’ve adopted in the industry have changed as well. In this episode, Jay and Joao discuss 5 myths in the security industry that either need to be adjusted, or downright debunked.

Download:

Relevant links:

Enterprise Linux Security Episode 21 – Dirty Pipe & Nvidia’s Breach

Play

In the 21st episode of Enterprise Linux Security, Jay and Joao discuss the recent “Dirty Pipe” vulnerability, as well as Nvidia’s recent breach.

Download

Relevant links:

Enterprise Linux Security Episode 20 – Cloud Governance

Play

Cloud Computing is all the rage these days – but what happens when a company moves to the cloud to quickly? While cloud computing can be a very rewarding technology, it can also get out of hand quite quickly. In this video, Joao and Jay discuss the concept of Cloud Governance, something that any organization that utilizes the cloud can (and should) take advantage of.

Download links

Relevant links