
Sign up to save your podcasts
Or


A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment.
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
or become a patron https://www.patreon.com/SecurityInFive
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Binary Blogger Website
Security In Five Podcast Page - Podcast RSS
Twitter @binaryblogger
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]
By Drew KoenigA recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment.
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
or become a patron https://www.patreon.com/SecurityInFive
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Binary Blogger Website
Security In Five Podcast Page - Podcast RSS
Twitter @binaryblogger
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]