Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Device Trust Policy | JumpCloud University Tutorial (2024)

In this tutorial, we'll go over how to use conditional access policies to enforce device trust for your fleet of devices. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content. For more information, check out our Help Center article(s).

OpenSSH regreSSHion Vulnerability - The 443 Podcast - Episode 296

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the U.S., a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile.

SSH Snake - Tanium Tech Talks #95

In January of 2024 the #Linux / Unix world was rocked by a script that worms its way through insecure SSH connections to map your environment. A team of two Tanium SMEs built content that you need to find and map your exposure, giving you the information necessary to remediate your environment. But #Windows and #MacOS are not off the hook. SSH services on other platforms have the same exposure. Use this Tanium content to find the issue everywhere it is applicable.