Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations

In this episode, Jay and Joao will discuss a report earlier this year that reveals the “top 10 cybersecurity misconfigurations”. These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it’s definitely a list everyone should pay close attention to.

YouTube player

Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

Relevant Article

Download Links

Enterprise Linux Security Episode 78 – Mirai: The Untold Story

The Mirai botnet brought the entirety of the internet to its breaking point back in 2016, taking down many prominent web sites. Now, an article from Wired has emerged that reveals the full story behind the scenes – how the threat actors got started, how the events played out, as well as what they’re up to these days. Join Jay and Joao as they discuss this very interesting story!

YouTube player

Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

Relevant Article

Download Links

Enterprise Linux Security Episode 77 – Security News Sync

In this episode, Jay and Joao catch up on recent stories. Among the topics they’ll discuss another version of CentOS going end of life (and why upgrading isn’t so straight-forward), the recent curl vulnerability, and more!

YouTube player

Thanks to TuxCare for sponsoring this podcast! Check out their Extended Lifecycle Support solution to keep your CentOS 7 installations supported with continued security updates while you plan your migration!

Video-specific links

Download Links

Enterprise Linux Security Episode 75 – RepoJacking

We’ve talked about Supply Chain Attacks on this podcast before, and in this episode Jay and Joao discuss another form of this popular attack vector – RepoJacking! RepoJacking occurs when a repository (such as one hosted on Github) changes information, and due to a link between the old repository info and the new – threat actors can take advantage of this. Join Jay and Joao for a discussion on this attack vector.

YouTube player

Relevant Articles

Thanks to TuxCare for sponsoring this episode! Check them out to see how they can help take your Linux Administration game to the next level.

Download Links

Enterprise Linux Security Episode 74 – Unlucky in Vegas

There’s a multitude of ways you can lose money in Las Vegas, but this time it’s not from gambling. In this episode, Jay and Joao will discuss a recent and still developing story where MGM was the target of what appears to be a ransomware attack.

YouTube player

Thanks to TuxCare for sponsoring this podcast! Check them out and make your life as a SysAdmin much easier!

Relevant Articles

Download Links

Enterprise Linux Security Episode 72 – Surveillance Facepalm

Imagine needing to ask your government permission in order to perform tasks such as installing a security patch, implementing an Intrusion Detection System, updating firmware or upgrading your operating system? If this sounds too ridiculous to be true, then you’re right – it is ridiculous, but unfortunately it’s a real proposal. In the U.K., Investigatory Powers Act 2016 (IPA) has had an adjustment proposed that could potentially make securing your systems more difficult than it’s ever been. In this episode, Jay and Joao discuss how these potential changes will complicate pretty much everything.

YouTube player

Relevant Articles

Download Links

Enterprise Linux Security Episode 71 – Internet DRM

In this episode, Jay and Joao talk about two recent news developments that may have important implications on the overall industry. First, In response to Microsoft’s recent Azure debacle, a US Senator calls for a probe to look into the matter. Second, our main story is yet another facepalm worthy idea from Google that aims to add “integrity” to our browsers, but it’s oddly lacking in said integrity and almost completely devoid of common sense. Google’s “Web Integrity Protection” seems to protect only their ad dollars while making browsing more tedious for the end-user. Will it pass? What is it exactly? Jay and Joao have all the answers in this episode!

YouTube player

Download Links

Relevant Articles

Enterprise Linux Security Episode 70 – The Red Hat Saga Continues

The ongoing saga with Red Hat continues, and now that some time has passed since their controversial announcement, we now have statements from other distributions, including (but not limited to) Oracle and SUSE. In this episode, Jay and Joao talk about the recent developments on this story, and also touch on some trouble that Fortigate has been having nowadays.

YouTube player

Download Links

Relevant Articles