Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against Sudo as a timely reference.
This segment is sponsored by Capsule8.
Visit https://securityweekly.com/capsule8 to learn more about them!
To register for Capsule8’s upcoming webcast “Preparing Linux Hosts for Unexpected Threats” visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW. Visit https://www.securityweekly.com/asw for all the latest episodes!Full Episode Show Notes
Brandon Edwards -
Co-Founder and Chief Scientist at Capsule8
John Kinsella -
Chief Architect at Accurics
Mike Shema -
Product Security Lead at Square
Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, and join our Discord Server!
If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand