Latest Endpointprotection Podcast Episodes

Complification artwork

Cloud Security in three acts: from fundamentals to automation

Complification - December 08, 2021 13:00 - 20 minutes
Lightstream’s V.P. of Security Strategy, Rafal Los, talks about security in three acts based on the movie “The Prestige.” Listen to this entertaining and informative podcast that walks through understanding, managing, and automating cloud security at your organization and how Lightstream and Pri...

Complification artwork

SOC 2 is the answer – but whose problem is it?

Complification - September 16, 2021 13:55 - 6 minutes
SOC 2 is, with increasing regularity, becoming the go-to certification requirement for companies who handle their customers’ data. SOC 2 is the first step to sales discussions, contracts, and revenue – yet it’s completely misunderstood. Lightstream V.P. of Security Strategy Rafal Los and JustPro...

Complification artwork

3 Things You Didn't Know About AWS CloudFront Content Delivery Network (CDN)

Complification - August 31, 2021 05:00 - 13 minutes
Are you using a CDN on your public-facing website? If you're not, you should. Learn three ways CDNs bring best practices to your business, and why AWS CloudFront is the right choice, especially if you're on the AWS cloud.

Complification artwork

Ditch the Duct Tape – The Evolution of SECaaS: Security as a Service

Complification - August 10, 2021 14:39 - 13 minutes
It’s no mystery that mid-market companies struggle to manage cybersecurity well. While ransomware still remains the prominent threat, it’s just one thing companies need to be concerned about. Whether you’re a target of opportunity, or not, security competency has never been more important.   ...

Complification artwork

MSSPs have failed us, now what?

Complification - June 15, 2021 14:19 - 18 minutes
Managed Security Service Providers (MSSPs) have been around for over twenty years. That’s long enough for Lightstream’s V.P. of Security Strategy Raf Los to explain (with conviction) why the model isn’t working anymore. Raf makes a case for “Security as a Service,” what this really means and why...

Complification artwork

SOC 2 isn’t your problem. It’s your network.

Complification - May 10, 2021 19:00 - 15 minutes
Information security is a reason for concern for all organizations, including those that outsource key business operations to third-party vendors like SaaS and cloud providers. But beware! Don’t let your network be an afterthought when it comes to achieving SOC 2 compliance. Lightstream’s Chief...

Complification artwork

Cloud FinOps – Saving money or making money?

Complification - April 12, 2021 05:00 - 15 minutes
Cloud technology has speed go-to-markets in ways not imaginable in the past. But with these advances have also come setbacks, including runaway costs and a breakdown in operational processes. As a result, the Cloud FinOps movement has emerged to bring financial accountability to the variable spe...

Complification artwork

Matching Your Value to a Carrier-Support Model

Complification - March 02, 2021 06:00 - 22 minutes
Network complexity, industry consolidation and cost compression have affected carrier customer-care levels over the last decade. Lightstream’s Mark Feil decrypts the reasons behind this shifting landscape and outlines concrete steps businesses can take to find the right balance between connectiv...

Complification artwork

Got SD-WAN? Great! Now Let's Talk About How to Secure It.

Complification - December 08, 2020 20:00 - 23 minutes
SD-WAN is fueling the customer experience and transforming modern networking. It is also bringing the internet to all of your locations, which can introduce security vulnerabilities if not addressed properly. Lightstream's Kurt Richter and Rafal Los combine their deep networking and security ex...

Complification artwork

So Many Tools, So Little Time

Complification - December 03, 2020 10:00 - 18 minutes
More than ever, IT departments are being burdened by securing and retaining talent, procuring and maintaining toolsets and overcoming budgetary constraints. Lightstream's Mark Feil discusses why IT leaders should be rethinking deployment of best-of-breed management tools and pushing back on Mana...

Complification artwork

The Top 3 Security Mistakes You're Making in Microsoft Azure

Complification - December 03, 2020 10:00 - 9 minutes
With its scalable structure, pay-as-you-go pricing and 99.95% SLAs, it’s no wonder Microsoft Azure is a long-time leader in the IaaS space. With all of this flexibility and reliability comes responsibility, especially around security. Lightstream's Ty Annen shares 3 common Azure security mistake...

Complification artwork

Bringing Cloud Security and Application Modernization Together

Complification - December 03, 2020 10:00 - 9 minutes
Modernizing your applications has many roadblocks, not least of which is the simple mental roadblock of getting the job done. Lightstream's Ty Annen explains in clear language how to break down the task while ensuring that cloud security remains an essential piece of the puzzle. Hint: there’s no...


Linux Security Podcast artwork

What are Red Teams and Why They Exist - Linux Security Podcast Ep 13

Linux Security Podcast - July 06, 2018 12:16 - 14 minutes ★★★★★ - 1 rating
Red Teams have become a common tool for testing enterprise security. They attempt to penetrate security defenses as if they were hackers with nefarious intent. Atomicorp's Mike Shinn comments that bad security is almost always the result of limited imagination. Red teams are motivated to be crea...

Linux Security Podcast artwork

Why Hackers Hack. It's Not Why You Think - Linux Security Podcast Ep 12

Linux Security Podcast - June 28, 2018 11:00 - 14 minutes ★★★★★ - 1 rating
Why do hackers hack into your networks and devices? Many people think it's for credit card data, other PII or to steal intellectual property. This is sometimes true, but there are many other reasons as well. What you value about your enterprise assets is often different from what hackers value. ...

Linux Security Podcast artwork

What is Virtual Patching and How Can it Enhance Security - Linux Security Podcast Ep 11

Linux Security Podcast - June 25, 2018 02:13 - 13 minutes ★★★★★ - 1 rating
Virtual patching is a way of implementing a security policy to eliminate or mitigate a security vulnerability. It is not actually patching, thus the name virtual. It is a way to do something very quick and external to the application and it is not used nearly enough in cybersecurity defense. Why...

Linux Security Podcast artwork

SQL Injection Attacks, How They Work and the Problem with Defending Against Them - Linux Security Podcast Ep 10

Linux Security Podcast - June 14, 2018 11:00 - 10 minutes ★★★★★ - 1 rating
SQL Injection Attacks are a method for taking advantage of flaws in the way an application is written. In particular, they exploit vulnerabilities that offer direct access to databases. Mike Shinn, CEO of Atomicorp, has employed SQL injections in Red Team exercises and built countermeasures that...

Linux Security Podcast artwork

CVEs Explained. What They Are and How They're Used - Linux Security Podcast Ep 9

Linux Security Podcast - June 07, 2018 11:00 - 11 minutes ★★★★★ - 1 rating
The Common Vulnerabilities and Exposures (CVE) system is a critical tool for the cybersecurity industry. CVEs provide consistency in naming and clarity on the nature and impact of various vulnerabilities. In this week's Linux Security Podcast, Atomicorp CEO Mike Shinn discusses the origin and ma...

Linux Security Podcast artwork

Efail Vulnerability and its Impact on Encrypted Email - Linux Security Podcast Ep 8

Linux Security Podcast - May 31, 2018 21:31 - 12 minutes ★★★★★ - 1 rating
The Efail vulnerability has been in the news lately and has many people rushing to remove encryption from their email clients. The vulnerability does impact S/MIME and PGP users, but only a subset of them. That means a lot of people are removing encryption from their email unnecessarily and putt...

Linux Security Podcast artwork

What is OSSEC and Why People Use It - Linux Security Podcast Ep 7

Linux Security Podcast - May 24, 2018 05:26 - 21 minutes ★★★★★ - 1 rating
OSSEC was founded in 2004 and received its most recent update to 3.0 in April 2018. It is an open source project for cybersecurity and delivers the most robust endpoint detection and response capabilities available to enterprises today. OSSEC PM Scott Shinn discusses the history of of the projec...

Linux Security Podcast artwork

What the Equifax Hack Tells Us About Cybersecurity Today - Linux Security Podcast Ep. 6

Linux Security Podcast - May 17, 2018 11:00 - 24 minutes ★★★★★ - 1 rating
Equifax was the victim of one of the highest profile hacks in history. More than 147 million people's financial data was exposed. Surprisingly, the Equifax CEO blamed the entire incident on a single engineer failing to patch a known vulnerability in Apache Struts. Anyone versed in security knows...

Linux Security Podcast artwork

What is a WAF and How Are They Different from Traditional Firewalls - Linux Security Podcast Ep. 5

Linux Security Podcast - May 10, 2018 11:00 - 10 minutes ★★★★★ - 1 rating
Web application firewalls (WAF) are a specialized form of firewall designed to protect applications from internet-based attacks. Firewalls must be lightweight to ensure people can quickly get onto the internet and data can be returned, but WAFs are much more sophisticated. They need to interact ...

Linux Security Podcast artwork

OSSEC, SIEM and Logging - Linux Security Podcast Ep. 4

Linux Security Podcast - May 04, 2018 18:57 - 13 minutes ★★★★★ - 1 rating
Logging is important for at least two reasons. Engineers need to know what is going on so they can figure out if something bad is happening and fix it. Bigger companies also have the need to capture logs to comply with a variety of regulations and business compliance requirements. SIEM has becom...

Linux Security Podcast artwork

Meltdown and Spectre Vulnerabilities, the issue and countermeasures - Linux Security Podcast Ep. 3

Linux Security Podcast - April 26, 2018 02:42 - 21 minutes ★★★★★ - 1 rating
The Meltdown and Spectre vulnerabilities took the security industry and the chip market by surprise. Many people are characterizing these vulnerabilities as flaws in microprocessor design, but the choice was intentional to increase data processing speed. It just wasn't contemplated as an attack ...

Linux Security Podcast artwork

File Integrity Monitoring history, features, limitations and recent advances - Linux Security Podcast Ep. 2

Linux Security Podcast - April 26, 2018 02:30 - 15 minutes ★★★★★ - 1 rating
File Integrity Monitoring is designed to notify you when files have changed on a system. It was one of the very first security detection capabilities in existence and is almost as old as passwords. FIM has also been incorporated into many regulatory and security protocols. Mike Shinn breaks down...

Linux Security Podcast artwork

What is a Brute Force Attack? Linux Security Podcast Ep. 1

Linux Security Podcast - April 25, 2018 20:09 - 9 minutes ★★★★★ - 1 rating
A Brute Force Attack is one of the oldest cyber attacks. It was even featured in the 1980's thriller, War Games. In this episode, Mike Shinn walks through how a Brute Force Attack works, reviews some different flavors of attacks and how to defend against them. 

Related Endpointprotection Topics