Couverture de Episode 14 – K8 misconfiguration exposes Fortune 500s’ data, The Reluctant Sysadmin’s Guide to Securing a Linux Server, John maddog Hall’s take on RHELs license changes

Episode 14 – K8 misconfiguration exposes Fortune 500s’ data, The Reluctant Sysadmin’s Guide to Securing a Linux Server, John maddog Hall’s take on RHELs license changes

Episode 14 – K8 misconfiguration exposes Fortune 500s’ data, The Reluctant Sysadmin’s Guide to Securing a Linux Server, John maddog Hall’s take on RHELs license changes

Écouter gratuitement

Voir les détails

À propos de ce contenu audio

K8 misconfig exposes Fortune 500s’ data Professionally, I work in the security space, and because of that, I’m always interested in hearing about security issues, risks, attacks, or anything really going on in that space. So right now my Infosec exchange feed is full of people traveling to Vegas, of course and a lot of activities directed towards finding and reporting on security issues. One of the most forward companies in the K8 security space is Aqua Security. The Reluctant Sysadmin’s Guide to Securing a Linux Server Since we’re talking about security already, why not cover the basics in case you’re someone using a Linux server or workstation somewhere in your network. I am a huge fan of revisiting basics over and over again, just to make sure everyone is getting the same message, consistently and frequently. It deepens and freshens knowledge of any topic. Some call it wax on,…
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Aucun commentaire pour le moment