YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management

    We talk a lot about patching on this podcast, and the reason for that is because a lot of organizations don’t seem to handle this important aspect of security very well. A recent patching report from the Ponemon institute seems to reflect this, and the stats regarding patching definitely don’t look good. In this episode of Enterprise Linux Security, Jay and Joao discuss some of the findings within this report.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Related Links

    • The state of enterprise Linux security management (report)

    ⇨

    Read more: Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management
  • Enterprise Linux Security Episode 25 – News Roundup

    In the 25th episode of Enterprise Linux Security, Jay and Joao catch up on a few things in the news, including the results of a recent Internet Crime Report, and more!

    YouTube player

    Downloads

    • MP3 version
    • Ogg version
    • MP3 version (low)

    Related Links

    • Internet Crime Report
    • Example of an unfortunate account take from a while back

    ⇨

    Read more: Enterprise Linux Security Episode 25 – News Roundup
  • Enterprise Linux Security Episode 24 – The Latest on Lapsus$

    The situation surrounding Lapsus$ is becoming more and more interesting, and in this episode of Enterprise Linux Security Jay and Joao discuss the latest developments regarding the group that has caused quite a ruckus recently.

    YouTube player

    Download

    • MP3 version
    • Ogg version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 24 – The Latest on Lapsus$
  • Enterprise Linux Security Episode 23 – Busting 5 IT Security Myths

    Cyber security is a huge topic, and through the years the industry changes rapidly to keep up with current threats and related challenges. As a result, some of the beliefs and mindsets we’ve adopted in the industry have changed as well. In this episode, Jay and Joao discuss 5 myths in the security industry that either need to be adjusted, or downright debunked.

    YouTube player

    Download:

    • MP3 version
    • Ogg version
    • MP3 version (low)

    Relevant links:

    • Time for password expiration to die (SANS)
    • Death of the Password? (Wired)

    ⇨

    Read more: Enterprise Linux Security Episode 23 – Busting 5 IT Security Myths
  • Enterprise Linux Security Episode 22 – Certificates

    Encryption is a great benefit to take advantage of, especially when it comes to hosting web sites. But how exactly do TLS certificates work? In this episode, Jay and Joao discuss foundational concepts surrounding certificates, as well as some advice and recommended practices.

    YouTube player

    Download:

    • MP3 version
    • Ogg version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 22 – Certificates
  • Enterprise Linux Security Episode 21 – Dirty Pipe & Nvidia’s Breach

    In the 21st episode of Enterprise Linux Security, Jay and Joao discuss the recent “Dirty Pipe” vulnerability, as well as Nvidia’s recent breach.

    YouTube player

    Download

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links:

    • Dirty pipe (CVE-2022-0847) article
    • ZDNet article for CVE-2022-0847
    • TechCrunch article regarding Nvidia’s recent breach

    ⇨

    Read more: Enterprise Linux Security Episode 21 – Dirty Pipe & Nvidia’s Breach
  • Enterprise Linux Security Episode 20 – Cloud Governance

    Cloud Computing is all the rage these days – but what happens when a company moves to the cloud to quickly? While cloud computing can be a very rewarding technology, it can also get out of hand quite quickly. In this video, Joao and Jay discuss the concept of Cloud Governance, something that any organization that utilizes the cloud can (and should) take advantage of.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links

    • Cloud governance article

    ⇨

    Read more: Enterprise Linux Security Episode 20 – Cloud Governance
  • Enterprise Linux Security Episode 19 – The 2021 RBS Year-End Vulnerability Report

    2021 is now in the past, but there’s some very interesting details in the year-end vulnerability report produced by RBS. These details give us a look at some of the trends that will impact 2022 and beyond. In this episode, Joao and Jay discuss the report and some of its findings.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links

    • The RBS 2021 Year-End Vulnerability Report

    ⇨

    Read more: Enterprise Linux Security Episode 19 – The 2021 RBS Year-End Vulnerability Report
  • Enterprise Linux Security Episode 18 – Zero Trust Security

    Trust is a very important aspect of security, but who/what exactly should you trust? How about no one? Join Jay and Joao for episode 18 of the Enterprise Linux Security show, as they discuss Zero Trust Security.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 18 – Zero Trust Security
  • Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s

    The New Year is just beginning, and we already have a few important CVE’s to discuss, this time around Polkit and LUKS. The CVE numbers for these vulnerabilities are CVE-2021-4034 and CVE-2021-4122 respectively. In this episode, Jay and Joao discuss these vulnerabilities.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Relevant links

    • Polkit CVE-2021-4034
    • LUKS CVE-2021-4122

    ⇨

    Read more: Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s
  • Enterprise Linux Security Episode 16 – Library Poisoning

    We’ve discussed supply-chain attacks in the past, and now it’s time to see an actual example that happened recently. However, this particular incident is especially unique as the libraries in question were allegedly poisoned by the actual developer. In this episode, Joao and Jay discuss the recent sabotage regarding two very popular NPM libraries.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 16 – Library Poisoning
  • Enterprise Linux Security Episode 15 – High Availability

    It’s frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept that aims to help alleviate (or hopefully eliminate) such downtime, and is a very attractive goal for system administrators. In this episode, Jay and Joao discuss high availability, as well as its pros and cons.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Related articles

    • Log4Shell evolution of evasion patterns
    • Log4Shell Variants and updates

    ⇨

    Read more: Enterprise Linux Security Episode 15 – High Availability
Previous Page
1 … 4 5 6 7
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.