Media Summary: There are many tools and utilities around A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ... Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends.

Enterprise Linux Security Episode 29 - Detailed Analysis & Overview

There are many tools and utilities around A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ... Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends. We've talked about Supply Chain Attacks on this podcast before, and in this We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ... Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good ...

We talk a lot about patching on this podcast, and the reason for that is because a lot of organizations don't seem to handle this ... The Log4Shell vulnerability is making its rounds all over Are you a fan of MySQL? What if we told you that there's an infinite supply of it online, right out in the open?! It's literally as bad as ... There's a multitude of ways you can lose money in Las Vegas, but this time it's not from gambling. In this Don't you just love e-mail? It's the gift that keeps on giving, and this time managing e-mail is even more annoying for Barracuda's ... It's frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept ...

Photo Gallery

Enterprise Linux Security Episode 29 - High Level Threats
Enterprise Linux Security Episode 30 - Tools & Utilities
Enterprise Linux Security Episode 31 - How NOT to Research Security
Enterprise Linux Security Episode 28 - Second Factor Authentication
Enterprise Linux Security Episode 35 - Top 25 Dangerous Software Weaknesses
Enterprise Linux Security Episode 75 - RepoJacking
Enterprise Linux Security Episode 16 - Library Poisoning
Enterprise Linux Security Episode 40 - Continuous Integration / Continuous Delivery
Enterprise Linux Security Episode 64 - FIPS
Enterprise Linux Security Episode 26 - The State of Enterprise Linux Security management
Enterprise Linux Security Episode 13 - Log4Shell
Enterprise Linux Security Episode 32 - MySQL for Everyone!
View Detailed Profile
Enterprise Linux Security Episode 29 - High Level Threats

Enterprise Linux Security Episode 29 - High Level Threats

In this

Enterprise Linux Security Episode 30 - Tools & Utilities

Enterprise Linux Security Episode 30 - Tools & Utilities

There are many tools and utilities around

Enterprise Linux Security Episode 31 - How NOT to Research Security

Enterprise Linux Security Episode 31 - How NOT to Research Security

A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ...

Enterprise Linux Security Episode 28 - Second Factor Authentication

Enterprise Linux Security Episode 28 - Second Factor Authentication

Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends.

Enterprise Linux Security Episode 35 - Top 25 Dangerous Software Weaknesses

Enterprise Linux Security Episode 35 - Top 25 Dangerous Software Weaknesses

In this

Enterprise Linux Security Episode 75 - RepoJacking

Enterprise Linux Security Episode 75 - RepoJacking

We've talked about Supply Chain Attacks on this podcast before, and in this

Enterprise Linux Security Episode 16 - Library Poisoning

Enterprise Linux Security Episode 16 - Library Poisoning

We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ...

Enterprise Linux Security Episode 40 - Continuous Integration / Continuous Delivery

Enterprise Linux Security Episode 40 - Continuous Integration / Continuous Delivery

Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good ...

Enterprise Linux Security Episode 64 - FIPS

Enterprise Linux Security Episode 64 - FIPS

There are many

Enterprise Linux Security Episode 26 - The State of Enterprise Linux Security management

Enterprise Linux Security Episode 26 - The State of Enterprise Linux Security management

We talk a lot about patching on this podcast, and the reason for that is because a lot of organizations don't seem to handle this ...

Enterprise Linux Security Episode 13 - Log4Shell

Enterprise Linux Security Episode 13 - Log4Shell

The Log4Shell vulnerability is making its rounds all over

Enterprise Linux Security Episode 32 - MySQL for Everyone!

Enterprise Linux Security Episode 32 - MySQL for Everyone!

Are you a fan of MySQL? What if we told you that there's an infinite supply of it online, right out in the open?! It's literally as bad as ...

Enterprise Linux Security Episode 74 - Unlucky in Vegas

Enterprise Linux Security Episode 74 - Unlucky in Vegas

There's a multitude of ways you can lose money in Las Vegas, but this time it's not from gambling. In this

Enterprise Linux Security Episode 68 - Barracuda's Vulnerability

Enterprise Linux Security Episode 68 - Barracuda's Vulnerability

Don't you just love e-mail? It's the gift that keeps on giving, and this time managing e-mail is even more annoying for Barracuda's ...

Enterprise Linux Security Episode 15 - High Availability

Enterprise Linux Security Episode 15 - High Availability

It's frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept ...

Enterprise Linux Security Episode 69 - Red Hat vs Enterprise IT

Enterprise Linux Security Episode 69 - Red Hat vs Enterprise IT

When it comes to

Enterprise Linux Security Episode 93 - Ticketmaster's Weakest Link

Enterprise Linux Security Episode 93 - Ticketmaster's Weakest Link

In this

Enterprise Linux Security Episode 54 - Recovering from Ransomware

Enterprise Linux Security Episode 54 - Recovering from Ransomware

Ransomware - an extremely frustrating