YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 102 – The Cybersecurity Resilience Act

    In this episode, Jay and Joao discuss recent government policy that will have far reaching effects – and this time it isn’t coming from the USA. Also, is C and C++ too “unsafe” to use? Those stories and more during this episode!

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • EU Policy Information
    • The US government wants developers to stop using C and C++
    • Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies
    • TuxCare Survey

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 102 – The Cybersecurity Resilience Act
  • Enterprise Linux Security Episode 101 – Ransomware Health Risks

    In this episode, Jay and Joao discuss a recent decision made by VMWare, CISA security requirements, and more about how ransomware can be especially problematic in health care.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Related Articles

    • Ransomware Attacks on Healthcare Sector β€˜Pose a Direct and Systemic Risk to Global Public Health and Security’
    • VMware Fusion and Workstation are Now Free for All Users
    • VMware Workstation Shifting From Proprietary Code To Using Upstream KVM
    • CISA proposes new security requirements to protect govt, personal data

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 101 – Ransomware Health Risks
  • Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations

    In this episode, Jay and Joao will discuss a report earlier this year that reveals the “top 10 cybersecurity misconfigurations”. These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it’s definitely a list everyone should pay close attention to.

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

    Relevant Article

    • NSA and CISA reveal top 10 cybersecurity misconfigurations

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations
  • Enterprise Linux Security Episode 58 – Tales from the Red Team

    Tasks that penetration testers and security analysis perform in order to expose security weaknesses may seem like a mysterious and complicated art. Most of the time, these tasks are considered “secret sauce” and unless you work for a red team, you may not be aware of what it may look like while someone attempts to gain access from the outside. In this episode, Jay and Joao discuss a report released by CISA, that provides a very detailed account at what goes into this type of work. This report is definitely a must-read, and this episode is a must-listen!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks
    • Ticket Granting Tickets (one of the strategies used by CISA)https://learnlinux.link/golden-ticket

    ⇨

    Read more: Enterprise Linux Security Episode 58 – Tales from the Red Team
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.