Artwork

Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Tenable Network Security Podcast - Episode 196

 
Share
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on February 22, 2018 14:37 (6y ago). Last successful fetch was on August 28, 2017 12:42 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 49839994 series 51047
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Endpoint Protection - New vulnerabilities have been remediated in the Symantec Endpoint Protection product. What many may not know is that this product does whitelisting. What are your thoughts on Whitelisting, how can it help and is it feasible in some or many environments?

Sonos, Smart TV, Playstations - Many will state that these such devices "are not on my network". But how do you know unless you look? How common are home and SOHO products on enterprise networks? What risks do they pose?

Defining Critical - Last week we talked about critical vulnerabilities, this week I want to turn the focus to critical log events. SANS publishes the "SANS 6 Categories of Critical Log Information", is this applicable to most organizations? Is one person's log data going to have different forms of "Critical"? Or are there categories that we can all share in common, and how many custom categories should you create?

  continue reading

210 episodes

Artwork
iconShare
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on February 22, 2018 14:37 (6y ago). Last successful fetch was on August 28, 2017 12:42 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 49839994 series 51047
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Endpoint Protection - New vulnerabilities have been remediated in the Symantec Endpoint Protection product. What many may not know is that this product does whitelisting. What are your thoughts on Whitelisting, how can it help and is it feasible in some or many environments?

Sonos, Smart TV, Playstations - Many will state that these such devices "are not on my network". But how do you know unless you look? How common are home and SOHO products on enterprise networks? What risks do they pose?

Defining Critical - Last week we talked about critical vulnerabilities, this week I want to turn the focus to critical log events. SANS publishes the "SANS 6 Categories of Critical Log Information", is this applicable to most organizations? Is one person's log data going to have different forms of "Critical"? Or are there categories that we can all share in common, and how many custom categories should you create?

  continue reading

210 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide