When it comes to patching, were you aware that there’s more than one type of patch? In this episode of Enterprise Linux Security, Jay and Joao discuss the various types of patching that’s performed today.
-
Enterprise Linux Security Episode 50 – The Many Faces of Patching
-
Enterprise Linux Security Episode 49 – The Code is Open, But Who’s Looking at It?
Open-Source is great – with code being open, everyone has access to it. That means that the code can be audited – and that makes it more secure, right? Well, possibly. In the recent talk “The Code is Open, But Who’s Looking at it?” Joao discusses the concept in detail. This talk was recorded at OSAD 2022. New episodes of Enterprise Linux Security will resume after the holidays. But for now, enjoy the talk!
Download Links
- MP3 version
- MP3 version (lower bitrate, smaller file)
- Ogg versio
-
Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?
Download Links
- MP3 version
- MP3 version (lower bitrate, smaller file)
- Ogg version
Relevant Articles
-
Enterprise Linux Security Episode 46 – Monitoring
If you’re in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will grow and expand over time, Jay and Joao will give you some tips in this episode to get you started. Check out this episode for some tips on some of the baseline checks you should implement with your monitoring solution of choice.
Download Links
-
Enterprise Linux Security Episode 44 – Is Linux less of a Target?
In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some news updates as well.
Relevant Articles
Download Links
-
Enterprise Linux Security Episode 43 – Grand Theft Data
In this episode, Jay and Joao discuss a handful of cybersecurity events in the news. While none of these stories are super exciting from a technical standpoint, there’s definitely some lessons to be learned. As part of this discussion, Jay and Joao will talk about topics related to the recent Grand Theft Auto leak, as breaches that targeted Uber, 2k games, and more.
Relevant Links
- GTA 6 source code and videos leaked after Rockstar Games hack
- Uber suffers computer system breach, alerts authorities
- 2K Games says hacked help desk targeted players with malware
- Hackers accessed data on some American Airlines customers
- Ransomware Gang Claims Customer Data Stolen in TAP Air Portugal Hack
Download Links
-
Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!
Recent news of Patreon firing their security team is making the rounds online, and in this episode, Jay and Joao will talk about this very strange story and some takeaways from it.
Relevant Links
- Patreon confirms security team layoffs
- 7 Patreon Alternatives to Keep Your Crowdfunding Income Secure
- Patreon Lays Off 17% of Employees
Download Links
-
Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery
Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.
Relevant links
Download Links
-
Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains
When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.
Relevant Links
Download links
-
Enterprise Linux Security Episode 36 – First Live Episode!
In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.
Download Links
-
Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses
In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.
Download Links
Relevant Articles
-
Enterprise Linux Security Episode 32 – MySQL for Everyone!
Are you a fan of MySQL? What if we told you that there’s an infinite supply of it online, right out in the open?! It’s literally as bad as it sounds! In this episode, Jay and Joao discuss how over 3.6 million MySQL instances are publicly available, as well as other forms of unintended public access.
Download Links
Relevant Articles