Denial-of-ServiceDuration: 8:38
In this episode, Mike discusses attacks that prevent servers from providing their essential services.
Host ThreatsDuration: 9:06
In this episode, Mike looks at some of the things that threaten computers and users.
Man-in-the-MiddleDuration: 22:12
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
System ResiliencyDuration: 11:22
In this episode, Mike shares how resiliency is integrated into security plans, and how to deal with scaling, elasticity and other system design considerations to ensure availability of systems.
RAIDDuration: 11:24
In this episode, Mike explores using multiple disks to improve reliability and performance.
NAS and SANDuration: 15:57
In this episode, Mike discusses secure methods to save and access data on a network device.
Physical HardeningDuration: 7:31
In this episode, Mike explores how to protect a system and the components used with various controls and policies.
RFI, EMI and ESDDuration: 3:17
In this episode, Mike discusses the interference that can affect the functionality of equipment.
Host HardeningDuration: 16:22
In this episode, Mike talks about techniques to protect a host computer from threats.
Data and System SecurityDuration: 4:27
In this episode, Mike explains how to ensure that stored data is safe from physical loss.
Disk EncryptionDuration: 6:47
In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
Hardware/Firmware SecurityDuration: 9:16
In this episode, Mike discusses methods that can be used to protect hardware-based authentication, disks, and firmware.
Secure OS TypesDuration: 7:48
In this episode, Mike discusses the OS types, characteristics, and usages.
Securing PeripheralsDuration: 11:08
In this episode, Mike discusses how to work with different types of connections for peripheral and security considerations.
MalwareDuration: 10:11
In this episode, Mike talks about types of malware and what they do.
Analyzing OutputDuration: 14:59
In this episode, Mike explores how to review utility outputs to discern the validity and make an action plan.
IDS and IPSDuration: 4:34
In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.
Automation StrategiesDuration: 5:02
In this episode, Mike examines some of the automation strategies used and their best practices.
Data DestructionDuration: 4:57
In this episode, Mike discusses data destruction and media sanitization, and what these methods do to the media.