SECTION 9

SECTION 9

SECTION 9

Description: Cyber Security

Browse Archive

#71 DHCP Failover and Security

Play Download media
Our DHCP failover system is up and running. It’s pretty cool seeing this in action. We talk about what we […]...

#70 DHCP Failover With NTP

Play Download media
In this episode Dorothy and I try to understand the ISC DHCP server fail over configuration. There are two servers, […]...

#69 Setting Up A DHCP Server On Linux

Play Download media
In this episode we talk about setting up a DHCP server on Linux. We go through the process of installing […]...

#68 Security Doesn’t Need to be Rocket Science

Play Download media
A lot of security experts talk about threat hunting, packet analysis and pen testing. Can you do effective threat hunting? […]...

#67 Ubuntu 18.04 & Other Projects

Play Download media
In this episode Dorothy tests Ubuntu 18.04 Bionic Beaver. I go over some of the projects I’m working on. We […]...

#66 IT & The Human Behind it

Play Download media
For this episode, Dorothy decided to ask me how I got into IT. We also talk about why we focus […]...

#65 Disaster Recovery With Backblaze B2

Play Download media
In this episode we talk about Disaster Recovery With Backblaze B2. We talk about backup, recovery, business impact analysis, and business continuity planning. We’ve decided to try Backblaze B2 as our automated backup solution. This gives us client side encryption, file versions, and snapshots...

#64 Information Security As a Business

Play Download media
In this episode Dorothy and I talk about information security as a business. If we wanted to start our own business, what kind of services would we provide?

LINKS



* Black Hills Information Security video on GDPR: https://www.blackhillsinfosec.com/webcast-gdpr-spring-storm-warning/...

#63 The New CIS Critical Security Controls

Play Download media
In this episode we review the new CIS Critical Security Controls. This is a list of 20 security controls that you can use to keep your organization safe. We will be using them to keep our Raspberry Pi data center secure.

LINKS



* Critical Security Controls: https://www.cisecurity.org/controls/...

#62 IT As a Process

Play Download media
In this episode we talk about IT as a process. Setting up a workstation, a printer, or a server can all be done as a process. Dorothy is trying to get the configuration of Raspbian Lite down to a process. We talk about her original change ticket for configuring Raspberry Pi 1. We compare that to her...
viewing 1 - 10 (57 total)

Subscribe & Follow