Media Summary: 2021 is now in the past, but there's some very interesting details in the year-end vulnerability report produced by RBS. How does perception vs reality tie into protecting our infrastructure from threat actors? In this Implementing an effective automation system can be an overwhelming task, one that can often fail - causing some organizations ...
Enterprise Linux Security Episode 19 - Detailed Analysis & Overview
2021 is now in the past, but there's some very interesting details in the year-end vulnerability report produced by RBS. How does perception vs reality tie into protecting our infrastructure from threat actors? In this Implementing an effective automation system can be an overwhelming task, one that can often fail - causing some organizations ... We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ... Cloud Computing is all the rage these days - but what happens when a company moves to the cloud to quickly? While cloud ... There are many tools and utilities around
System Administrators are the heroes we need, and in today's A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ... We've talked about Supply Chain Attacks on this podcast before, and in this According to several sources, and confirmed by Western Digital themselves, there's been a breach regarding the company's cloud ... Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good ... Earlier this year, Ubiquiti allegedly suffered a breach, which seemed to reinforce the hesitation some customers have with using ...