Media Summary: As if Wi-Fi couldn't get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the You may have heard of "technical debt", but have you heard of " While it's certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the ...

Enterprise Linux Security Episode 44 - Detailed Analysis & Overview

As if Wi-Fi couldn't get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the You may have heard of "technical debt", but have you heard of " While it's certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the ... We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ... If you're in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will ... By using clever infrastructure engineering strategies to increase reliability, you can minimize disruption and downtime for your ...

When you write software, there's no reason to reinvent the wheel - shared libraries and other resources exist to enable you to ... A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ... We've talked about Supply Chain Attacks on this podcast before, and in this How does perception vs reality tie into protecting our infrastructure from threat actors? In this System Administrators are the heroes we need, and in today's A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was ...

Photo Gallery

Enterprise Linux Security Episode 44 - Is Linux less of a Target?
Enterprise Linux Security Episode 45 - More Wi-Fi, More Problems
Enterprise Linux Security Episode 84 - Security Debt
Enterprise Linux Security Episode 48 - New Malware, Old Vulnerabilities
Enterprise Linux Security Episode 43 - Grand Theft Data
Enterprise Linux Security Episode 16 - Library Poisoning
Enterprise Linux Security Episode 46 - Monitoring
Enterprise Linux Security Episode 53 - Digital Twins
Enterprise Linux Security Episode 04 - Supply Chain Attacks
Enterprise Linux Security Episode 31 - How NOT to Research Security
Enterprise Linux Security Episode 42 - Do NOT Fire Your Security Team!
Enterprise Linux Security Episode 104 - Artificial Insanity
View Detailed Profile
Enterprise Linux Security Episode 44 - Is Linux less of a Target?

Enterprise Linux Security Episode 44 - Is Linux less of a Target?

In this

Enterprise Linux Security Episode 45 - More Wi-Fi, More Problems

Enterprise Linux Security Episode 45 - More Wi-Fi, More Problems

As if Wi-Fi couldn't get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the

Enterprise Linux Security Episode 84 - Security Debt

Enterprise Linux Security Episode 84 - Security Debt

You may have heard of "technical debt", but have you heard of "

Enterprise Linux Security Episode 48 - New Malware, Old Vulnerabilities

Enterprise Linux Security Episode 48 - New Malware, Old Vulnerabilities

While it's certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the ...

Enterprise Linux Security Episode 43 - Grand Theft Data

Enterprise Linux Security Episode 43 - Grand Theft Data

In this

Enterprise Linux Security Episode 16 - Library Poisoning

Enterprise Linux Security Episode 16 - Library Poisoning

We've discussed supply-chain attacks in the past, and now it's time to see an actual example that happened recently. However ...

Enterprise Linux Security Episode 46 - Monitoring

Enterprise Linux Security Episode 46 - Monitoring

If you're in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will ...

Enterprise Linux Security Episode 53 - Digital Twins

Enterprise Linux Security Episode 53 - Digital Twins

By using clever infrastructure engineering strategies to increase reliability, you can minimize disruption and downtime for your ...

Enterprise Linux Security Episode 04 - Supply Chain Attacks

Enterprise Linux Security Episode 04 - Supply Chain Attacks

When you write software, there's no reason to reinvent the wheel - shared libraries and other resources exist to enable you to ...

Enterprise Linux Security Episode 31 - How NOT to Research Security

Enterprise Linux Security Episode 31 - How NOT to Research Security

A "researcher" with a screen name of "Sockpuppets" decides to demonstrate how insecure some specific online resources are, ...

Enterprise Linux Security Episode 42 - Do NOT Fire Your Security Team!

Enterprise Linux Security Episode 42 - Do NOT Fire Your Security Team!

Recent news of Patreon firing their

Enterprise Linux Security Episode 104 - Artificial Insanity

Enterprise Linux Security Episode 104 - Artificial Insanity

In this

Enterprise Linux Security Episode 75 - RepoJacking

Enterprise Linux Security Episode 75 - RepoJacking

We've talked about Supply Chain Attacks on this podcast before, and in this

Enterprise Linux Security Episode 60 - AI Enhanced Security

Enterprise Linux Security Episode 60 - AI Enhanced Security

When it comes to

Enterprise Linux Security Episode 110: AI Wars

Enterprise Linux Security Episode 110: AI Wars

In this

Enterprise Linux Security Episode 107 - The Plan is there is no Plan

Enterprise Linux Security Episode 107 - The Plan is there is no Plan

How does perception vs reality tie into protecting our infrastructure from threat actors? In this

Enterprise Linux Security Episode 37 - System Administrator Appreciation Day 2022

Enterprise Linux Security Episode 37 - System Administrator Appreciation Day 2022

System Administrators are the heroes we need, and in today's

Enterprise Linux Security Episode 62 - Operation: Cookie Monster

Enterprise Linux Security Episode 62 - Operation: Cookie Monster

A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was ...