Podcast: Play in new window | Download (Duration: 40:25 — 74.3MB)
Subscribe: Apple Podcasts | Spotify | RSS
In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.
Podcast: Play in new window | Download (Duration: 40:25 — 74.3MB)
Subscribe: Apple Podcasts | Spotify | RSS
In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.
Podcast: Play in new window | Download (Duration: 57:37 — 105.8MB)
Subscribe: Apple Podcasts | Spotify | RSS
In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.
Podcast: Play in new window | Download (Duration: 47:36 — 87.5MB)
Subscribe: Apple Podcasts | Spotify | RSS
What would it be like to suffer a cyberattack event, that literally closes down an entire business? That’s exactly what happened to United Structures of America, a steel manufacturing company. In this episode, Jay and Joao discuss what happened, and some of the lessons learned that should cause other organizations to take a hard look at how insecure their own systems are.
Podcast: Play in new window | Download (Duration: 53:12 — 97.7MB)
Subscribe: Apple Podcasts | Spotify | RSS
A “researcher” with a screen name of “Sockpuppets” decides to demonstrate how insecure some specific online resources are, in the worst way possible. You can’t make this stuff up! In this episode, Jay and Joao discuss what this individual wanted to accomplish (and what happened instead).
Podcast: Play in new window | Download (Duration: 53:02 — 97.4MB)
Subscribe: Apple Podcasts | Spotify | RSS
There are many tools and utilities around security and network management, and in this episode of Enterprise Linux Security, Jay and Joao discuss some of their favorites.
Podcast: Play in new window | Download (Duration: 36:31 — 67.2MB)
Subscribe: Apple Podcasts | Spotify | RSS
In this episode, Jay and Joao unpack some recent news around the BVP47 vulnerability, and some very interesting details around it and how it came to be. This is one of those “spy thriller” type episodes, so don’t miss it!
Podcast: Play in new window | Download (Duration: 47:51 — 88.0MB)
Subscribe: Apple Podcasts | Spotify | RSS
Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends. In this episode, second factor authentication is discussed. This foundational episode will go over what it is, why you should use it, and also some of the things that can potentially weaken its benefit.
Podcast: Play in new window | Download (Duration: 45:20 — 83.3MB)
Subscribe: Apple Podcasts | Spotify | RSS
In the industry, we spend a great deal of time hardening our security, doing our due diligence when it comes to patching, implementing firewalls, avoiding EOL software, as well as many other aspects of our security focus. But unfortunately, even a well thought out implementation of common security controls can be rendered useless if we miss the low hanging fruit – such as training our employees and making sure they understand how serious security is, and how they can help. In this episode, Jay and Joao will discuss that and more.
Podcast: Play in new window | Download (Duration: 45:48 — 84.2MB)
Subscribe: Apple Podcasts | Spotify | RSS
Cyber security is a huge topic, and through the years the industry changes rapidly to keep up with current threats and related challenges. As a result, some of the beliefs and mindsets we’ve adopted in the industry have changed as well. In this episode, Jay and Joao discuss 5 myths in the security industry that either need to be adjusted, or downright debunked.
Podcast: Play in new window | Download (Duration: 46:46 — 86.0MB)
Subscribe: Apple Podcasts | Spotify | RSS
In the 21st episode of Enterprise Linux Security, Jay and Joao discuss the recent “Dirty Pipe” vulnerability, as well as Nvidia’s recent breach.