YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 67 – No One Else’s Computer

    We’ve all heard the cloud referred to as “Someone Else’s Computer”, but what do you do if you find your data is on No One Else’s Computer? In this example, there was a happy ending (data was restored) but it’s still an important consideration all the same. What do you do if your cloud provider all of a sudden doesn’t have your data? In this episode, Jay and Joao discuss a recent situation in which Azure customers found themselves in a bit of a bad situation.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file size, lower bitrate)
    • Ogg version

    Relevant Articles

    • Azure DevOps Outage in South Brazil
    • This typo sparked a Microsoft Azure outage

    ⇨

    Read more: Enterprise Linux Security Episode 67 – No One Else’s Computer
  • Enterprise Linux Security Episode 66 – Job Security

    In this episode, Jay and Joao discuss another form of security, job security! Throughout the series, we’ve advised and educated on enhancing the security of your enterprise network, but in this episode the focus is on YOU. Specifically, how to safeguard yourself from turnover, raise awareness of your importance to your organization, and how to navigate potential “awkward” conversations that System Administrators may find themselves having with their boss. Don’t miss this episode!

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 66 – Job Security
  • Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)

    Open Source Intelligence is a very interesting topic – it’s all about the things that might get unknowingly leaked, and this leaked information is perfectly legal to know and possess! The IP address that points to a domain, vacation photos on twitter, or even what you had for lunch can be used against you in order to build a profile. In this episode, Jay and Joao discuss OSINT and some tools that are commonly used to find it.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, lower file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)
  • Enterprise Linux Security Episode 63 – Their Cloud

    According to several sources, and confirmed by Western Digital themselves, there’s been a breach regarding the company’s cloud related offerings, such as “My Cloud” and various cloud-enabled storage products. Many of the details have yet to be revealed, but considering that Western Digital filed a 10-K form with the SEC, it’s very possible that it could be serious. In this episode, Jay and Joao discuss this story so far, with more specific details sure to come.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Western Digital confirms digital burglary, calls the cops
    • Hackers claim vast access to Western Digita

    ⇨

    Read more: Enterprise Linux Security Episode 63 – Their Cloud
  • Enterprise Linux Security Episode 62 – Operation: Cookie Monster

    A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was dubbed “Operation: Cookie Monster”, and while that certainly sounds like satire – it’s totally not. Genesis, the marketplace in question, was seized by a law enforcement team consisting of personnel from multiple countries. In this episode, Jay and Joao discuss this story. But not only that, what are some of the ramifications of this? Could this have lasting impacts on the industry in general? Definitely don’t miss this episode!

    YouTube player

    Relevant Articles

    • ‘Operation Cookie Monster’: International police action seizes dark web market

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 62 – Operation: Cookie Monster
  • Enterprise Linux Security Episode 61 – The Principle of Least Privilege

    With the recent takeover of the “Linus Tech Tips” YouTube channel, what can we learn? In this episode, Jay and Joao will discuss some of the ways you can prevent such an event from happening to you (and it’s not just YouTube that’s a target).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 61 – The Principle of Least Privilege
  • Enterprise Linux Security Episode 60 – AI Enhanced Security

    When it comes to Enterprise IT (and especially the security sector) we have our work cut out for us. As the workload increases, we look for tools and utilities to help us keep up with the demand. But what about artificial intelligence? As we discussed in a previous episode, AI is here to stay and will be making waves in security. In this episode, Jay and Joao dive in to just a few of the ways this tech might transform the security field and those that work within it (directly or indirectly).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Cybersecurity Leaders Stressed Over Email Security
    • How to Protect Your Company in a ChatGPT World
    • The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work
    • AI and the Cybersecurity Landscape

    ⇨

    Read more: Enterprise Linux Security Episode 60 – AI Enhanced Security
  • Enterprise Linux Security Episode 59 – AlmaLinux OS

    AlmaLinux OS was created around the time of “that big CentOS” announcement, and has been a worthy solution for enterprises that wish to continue with Enterprise Linux, but without the fear of the distribution being changed into something else entirely. As a drop-in replacement for Red Hat, AlmaLinux OS continues to tackle new ground and builds a strong community. In this video, Jay and Joao are joined by Atalay Kelestemur who works on the project to discuss this distribution – and there may even be some surprises in store.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • ELevate (migration utility for switching between RHEL derivatives)
    • AlmaCare (enterprise support for AlmaLinux OS)

    ⇨

    Read more: Enterprise Linux Security Episode 59 – AlmaLinux OS
  • Enterprise Linux Security Episode 58 – Tales from the Red Team

    Tasks that penetration testers and security analysis perform in order to expose security weaknesses may seem like a mysterious and complicated art. Most of the time, these tasks are considered “secret sauce” and unless you work for a red team, you may not be aware of what it may look like while someone attempts to gain access from the outside. In this episode, Jay and Joao discuss a report released by CISA, that provides a very detailed account at what goes into this type of work. This report is definitely a must-read, and this episode is a must-listen!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks
    • Ticket Granting Tickets (one of the strategies used by CISA)https://learnlinux.link/golden-ticket

    ⇨

    Read more: Enterprise Linux Security Episode 58 – Tales from the Red Team
  • Enterprise Linux Security Episode 57 – Record Breaking DDoS Attacks

    DDoS (Denial of Service) attacks are incredibly common, and apparently, are breaking records. In this episode, Jay and Joao discuss a recent blog post from Cloudflare regarding how popular this attack vector is becoming nowadays, as well as a quick refresher on Denial of Service attacks in general.

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack

    ⇨

    Read more: Enterprise Linux Security Episode 57 – Record Breaking DDoS Attacks
  • Enterprise Linux Security Episode 56 – Undercover Crypto Leaking

    Ransomware is one of the absolute worst things that can happen to your organization, often resulting in weeks of downtime. We discussed Ransomware recently, and now we have an interesting and time-appropriate story – a popular ransomware group apparently had an imposter within their ranks.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • FBI Takes Down Hive Criminal Ransomware Group
    • Dutch police take down Exclu encrypted chat service with 42 arrests, €4 million seized
    • Dutch Cops Bust β€˜Exclu’ Messaging Service, Arrest 42

    ⇨

    Read more: Enterprise Linux Security Episode 56 – Undercover Crypto Leaking
  • Enterprise Linux Security Episode 53 – Digital Twins

    By using clever infrastructure engineering strategies to increase reliability, you can minimize disruption and downtime for your organization. Another technique to consider is the concept of Digital Twin – having a full system clone/mirror you can use to test enhancements, perform a root-cause analysis, or more. In this episode, Jay and Joao discuss Digital Twins and how the concept can potentially help your organization.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Digital Twin (Wikipedia article)
    • More malicious packages posted to online repository. This time it’s PyPI

    ⇨

    Read more: Enterprise Linux Security Episode 53 – Digital Twins
Previous Page
1 2 3 4 5 6 … 8
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.