YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 71 – Internet DRM

    In this episode, Jay and Joao talk about two recent news developments that may have important implications on the overall industry. First, In response to Microsoft’s recent Azure debacle, a US Senator calls for a probe to look into the matter. Second, our main story is yet another facepalm worthy idea from Google that aims to add “integrity” to our browsers, but it’s oddly lacking in said integrity and almost completely devoid of common sense. Google’s “Web Integrity Protection” seems to protect only their ad dollars while making browsing more tedious for the end-user. Will it pass? What is it exactly? Jay and Joao have all the answers in this episode!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email
    • Senator calls for probe in Microsoft breach
    • Vivaldi’s Take on Google’s “Web Integrity Protection”
    • Ars Technica article on Web Integrity Protection
    • Web Integrity Protection Github page

    ⇨

    Read more: Enterprise Linux Security Episode 71 – Internet DRM
  • Enterprise Linux Security Episode 70 – The Red Hat Saga Continues

    The ongoing saga with Red Hat continues, and now that some time has passed since their controversial announcement, we now have statements from other distributions, including (but not limited to) Oracle and SUSE. In this episode, Jay and Joao talk about the recent developments on this story, and also touch on some trouble that Fortigate has been having nowadays.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Oracle’s Statement
    • SUSE’s Statement
    • Fortigate Breach
    • FortiNAC CentOS Documentation (PDF)

    ⇨

    Read more: Enterprise Linux Security Episode 70 – The Red Hat Saga Continues
  • Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT

    When it comes to Linux in the Enterprise, we have quite a few challenges we have to overcome on a day to day basis to ensure we can depend on our technology. We never thought Red Hat themselves would some day become our opponent, but here we are. In this episode, Jay and Joao will discuss discuss the latest impulsive and irresponsible decision Red Hat has made – as well as how that decision results in the company undermining their own customer base, while alienating the Linux Community at the same time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Red Hat’s Announcement
    • Response from Jeff Geerling (frequent contributor to open-source)
    • Red Hat strikes a crushing blow against RHEL downstreams
    • Response from Mike McGrath (Red Hat) regarding these changes
    • Response from Learn Linux TV

    ⇨

    Read more: Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT
  • Enterprise Linux Security Episode 67 – No One Else’s Computer

    We’ve all heard the cloud referred to as “Someone Else’s Computer”, but what do you do if you find your data is on No One Else’s Computer? In this example, there was a happy ending (data was restored) but it’s still an important consideration all the same. What do you do if your cloud provider all of a sudden doesn’t have your data? In this episode, Jay and Joao discuss a recent situation in which Azure customers found themselves in a bit of a bad situation.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file size, lower bitrate)
    • Ogg version

    Relevant Articles

    • Azure DevOps Outage in South Brazil
    • This typo sparked a Microsoft Azure outage

    ⇨

    Read more: Enterprise Linux Security Episode 67 – No One Else’s Computer
  • Enterprise Linux Security Episode 66 – Job Security

    In this episode, Jay and Joao discuss another form of security, job security! Throughout the series, we’ve advised and educated on enhancing the security of your enterprise network, but in this episode the focus is on YOU. Specifically, how to safeguard yourself from turnover, raise awareness of your importance to your organization, and how to navigate potential “awkward” conversations that System Administrators may find themselves having with their boss. Don’t miss this episode!

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 66 – Job Security
  • Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)

    Open Source Intelligence is a very interesting topic – it’s all about the things that might get unknowingly leaked, and this leaked information is perfectly legal to know and possess! The IP address that points to a domain, vacation photos on twitter, or even what you had for lunch can be used against you in order to build a profile. In this episode, Jay and Joao discuss OSINT and some tools that are commonly used to find it.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, lower file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 65 – Open Source Intelligence Tools (OSINT)
  • Enterprise Linux Security Episode 63 – Their Cloud

    According to several sources, and confirmed by Western Digital themselves, there’s been a breach regarding the company’s cloud related offerings, such as “My Cloud” and various cloud-enabled storage products. Many of the details have yet to be revealed, but considering that Western Digital filed a 10-K form with the SEC, it’s very possible that it could be serious. In this episode, Jay and Joao discuss this story so far, with more specific details sure to come.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Western Digital confirms digital burglary, calls the cops
    • Hackers claim vast access to Western Digita

    ⇨

    Read more: Enterprise Linux Security Episode 63 – Their Cloud
  • Enterprise Linux Security Episode 62 – Operation: Cookie Monster

    A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was dubbed “Operation: Cookie Monster”, and while that certainly sounds like satire – it’s totally not. Genesis, the marketplace in question, was seized by a law enforcement team consisting of personnel from multiple countries. In this episode, Jay and Joao discuss this story. But not only that, what are some of the ramifications of this? Could this have lasting impacts on the industry in general? Definitely don’t miss this episode!

    YouTube player

    Relevant Articles

    • ‘Operation Cookie Monster’: International police action seizes dark web market

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 62 – Operation: Cookie Monster
  • Enterprise Linux Security Episode 61 – The Principle of Least Privilege

    With the recent takeover of the “Linus Tech Tips” YouTube channel, what can we learn? In this episode, Jay and Joao will discuss some of the ways you can prevent such an event from happening to you (and it’s not just YouTube that’s a target).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 61 – The Principle of Least Privilege
  • Enterprise Linux Security Episode 60 – AI Enhanced Security

    When it comes to Enterprise IT (and especially the security sector) we have our work cut out for us. As the workload increases, we look for tools and utilities to help us keep up with the demand. But what about artificial intelligence? As we discussed in a previous episode, AI is here to stay and will be making waves in security. In this episode, Jay and Joao dive in to just a few of the ways this tech might transform the security field and those that work within it (directly or indirectly).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Cybersecurity Leaders Stressed Over Email Security
    • How to Protect Your Company in a ChatGPT World
    • The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work
    • AI and the Cybersecurity Landscape

    ⇨

    Read more: Enterprise Linux Security Episode 60 – AI Enhanced Security
  • Enterprise Linux Security Episode 59 – AlmaLinux OS

    AlmaLinux OS was created around the time of “that big CentOS” announcement, and has been a worthy solution for enterprises that wish to continue with Enterprise Linux, but without the fear of the distribution being changed into something else entirely. As a drop-in replacement for Red Hat, AlmaLinux OS continues to tackle new ground and builds a strong community. In this video, Jay and Joao are joined by Atalay Kelestemur who works on the project to discuss this distribution – and there may even be some surprises in store.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • ELevate (migration utility for switching between RHEL derivatives)
    • AlmaCare (enterprise support for AlmaLinux OS)

    ⇨

    Read more: Enterprise Linux Security Episode 59 – AlmaLinux OS
  • Enterprise Linux Security Episode 58 – Tales from the Red Team

    Tasks that penetration testers and security analysis perform in order to expose security weaknesses may seem like a mysterious and complicated art. Most of the time, these tasks are considered “secret sauce” and unless you work for a red team, you may not be aware of what it may look like while someone attempts to gain access from the outside. In this episode, Jay and Joao discuss a report released by CISA, that provides a very detailed account at what goes into this type of work. This report is definitely a must-read, and this episode is a must-listen!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks
    • Ticket Granting Tickets (one of the strategies used by CISA)https://learnlinux.link/golden-ticket

    ⇨

    Read more: Enterprise Linux Security Episode 58 – Tales from the Red Team
Previous Page
1 2 3 4 5 6 … 9
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.