Paul asked our Twitter followers about their favorite open-source alternatives to Nagios for monitoring system and service availability, and we listened, of course! Hear Paul’s essential enterprise network monitoring tools in this segment.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode59
Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode58
Visit http://securityweekly.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network and Threat Intelligence. Check out the discussion in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode57
Visit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode55
Visit http://securityweekly.com/esw for all the latest episodes!
Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment!
Full Show Notes: https://wiki.securityweekly.com/ES_Episode54
Visit http://securityweekly.com/esw for all the latest episodes!
If you are a security professional who has not taken the plunge into Docker, this segment is for you. Paul highlights some of the configuration options available for Docket containers and how you can apply them to both your operating system and application hardening strategies.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode53 (Including sample Docker files discussed in this segment)
Visit http://securityweekly.com/esw for all the latest episodes!