<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/audiopodcast/tag/Cloud Security"/>
        <atom:link rel="next" href="https://video.algosec.com/audiopodcast/tag/Cloud Security?tag=Cloud+Security&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/audio/podcast/96812221-12-audio.mp3" type="audio/mp3" length="24705297"/>
            <title>CSPM &amp; Beyond - AlgoSec live demo</title>
            <link>http://video.algosec.com/cspm-beyond-algosec-live-demo</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cspm-beyond-algosec-live-demo"&gt;&lt;img src="http://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/96812221</guid>
            <pubDate>Mon, 30 Dec 2024 20:50:21 GMT</pubDate>
            <media:title>CSPM &amp; Beyond - AlgoSec live demo</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cspm-beyond-algosec-live-demo"&gt;&lt;img src="http://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2b1b8888aed18bf333a1281c0f26be29&amp;source=podcast&amp;photo%5fid=96812221" width="625" height="352" type="text/html" medium="video" duration="2059" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <category>cloud</category>
            <category>cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/audio/podcast/101460958-9-audio.mp3" type="audio/mp3" length="19751217"/>
            <title>Double down on cloud security webinar</title>
            <link>http://video.algosec.com/double-down-on-cloud-security</link>
            <description>&lt;p&gt;The cloud offers fantastic benefits, but it also comes with new security challenges.&lt;br&gt;
Join our Double Down on Cloud Visibility: See Threats, Eliminate Risks &amp;amp; Secure Your Network webinar and empower yourself to confidently secure your cloud environment.&lt;br&gt;
In this session, you'll gain valuable insights on:&lt;br&gt;
Gain a unified view of your entire multi-cloud environment, including accounts, assets, and network security controls (e.g., AWS, Azure firewalls).  No more switching between dashboards!&lt;br&gt;
Identify and eliminate network security risks by confidently removing risky network configurations.&lt;br&gt;
Effortlessly identify and address compliance gaps across your multi-cloud network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/double-down-on-cloud-security"&gt;&lt;img src="http://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/101460958</guid>
            <pubDate>Thu, 30 May 2024 09:10:24 GMT</pubDate>
            <media:title>Double down on cloud security webinar</media:title>
            <media:description type="html">&lt;p&gt;The cloud offers fantastic benefits, but it also comes with new security challenges.&lt;br&gt;
Join our Double Down on Cloud Visibility: See Threats, Eliminate Risks &amp;amp; Secure Your Network webinar and empower yourself to confidently secure your cloud environment.&lt;br&gt;
In this session, you'll gain valuable insights on:&lt;br&gt;
Gain a unified view of your entire multi-cloud environment, including accounts, assets, and network security controls (e.g., AWS, Azure firewalls).  No more switching between dashboards!&lt;br&gt;
Identify and eliminate network security risks by confidently removing risky network configurations.&lt;br&gt;
Effortlessly identify and address compliance gaps across your multi-cloud network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/double-down-on-cloud-security"&gt;&lt;img src="http://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=25e86e6b59e633c6502eb7d391572518&amp;source=podcast&amp;photo%5fid=101460958" width="625" height="352" type="text/html" medium="video" duration="1646" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>webinar</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/audio/podcast/100476488-19-audio.mp3" type="audio/mp3" length="3818518"/>
            <title>AlgoSec cloud product demo</title>
            <link>http://video.algosec.com/algosec-cloud-product-demo</link>
            <description>&lt;p&gt;Watch AlgoSec cloud in action and learn how you can:&lt;/p&gt;
&lt;p&gt;• Enhance visibility across the hybrid multi-cloud estate with central management&lt;br /&gt;&lt;br /&gt;
• Prioritize risks according to business applications and severity&lt;br /&gt;&lt;br /&gt;
• Reduce manual labor, errors, and their associated risks and costs&lt;br /&gt;&lt;br /&gt;
• Cleanup unused network security rules to reduce attack vector and better utilize resources&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-product-demo"&gt;&lt;img src="http://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/100476488</guid>
            <pubDate>Mon, 13 May 2024 10:24:41 GMT</pubDate>
            <media:title>AlgoSec cloud product demo</media:title>
            <media:description type="html">&lt;p&gt;Watch AlgoSec cloud in action and learn how you can:&lt;/p&gt;
&lt;p&gt;• Enhance visibility across the hybrid multi-cloud estate with central management&lt;br /&gt;&lt;br /&gt;
• Prioritize risks according to business applications and severity&lt;br /&gt;&lt;br /&gt;
• Reduce manual labor, errors, and their associated risks and costs&lt;br /&gt;&lt;br /&gt;
• Cleanup unused network security rules to reduce attack vector and better utilize resources&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-product-demo"&gt;&lt;img src="http://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=19dd19703434b0b7ee454f9b2d6d3ad8&amp;source=podcast&amp;photo%5fid=100476488" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/standard/download-19-thumbnail.jpg" width="75" height=""/>
            <category>cloud</category>
            <category>cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/audio/podcast/92122151-8-audio.mp3" type="audio/mp3" length="34220974"/>
            <title>SANS and AlgoSec: Addressing network and configuration risks</title>
            <link>http://video.algosec.com/sans-and-algosec-addressing-network</link>
            <description>&lt;p&gt;Discover the latest in cloud security in our upcoming webinar. We'll tackle the challenges of configuration and network security in cloud environments, analyze real-world breach cases, and highlight overlooked risks. Learn about essential tools and practices to fortify your cloud infrastructure. Join us for insights into keeping your organization secure against evolving threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sans-and-algosec-addressing-network"&gt;&lt;img src="http://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/92122151</guid>
            <pubDate>Thu, 18 Jan 2024 11:27:30 GMT</pubDate>
            <media:title>SANS and AlgoSec: Addressing network and configuration risks</media:title>
            <media:description type="html">&lt;p&gt;Discover the latest in cloud security in our upcoming webinar. We'll tackle the challenges of configuration and network security in cloud environments, analyze real-world breach cases, and highlight overlooked risks. Learn about essential tools and practices to fortify your cloud infrastructure. Join us for insights into keeping your organization secure against evolving threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sans-and-algosec-addressing-network"&gt;&lt;img src="http://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=90ffc50248b5b87c95185b443244f0cb&amp;source=podcast&amp;photo%5fid=92122151" width="625" height="352" type="text/html" medium="video" duration="2852" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cloud configuration risks</category>
            <category>cloud network security</category>
            <category>cloud security</category>
            <category>CNAPP</category>
            <category>cspm</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/audio/podcast/91305878-7-audio.mp3" type="audio/mp3" length="15253556"/>
            <title>5 Pillars for advanced cloud security</title>
            <link>http://video.algosec.com/5-pillars-for-advanced-cloud</link>
            <description>&lt;p&gt;&lt;span&gt;Secure
your cloud environment with just 5 Pillars. Learn how Prevasio CNAPP’s innovative
features and robust architecture, offers a comprehensive defense mechanism that
goes beyond traditional security&amp;nbsp;&lt;/span&gt;measures.&lt;br&gt;&lt;a href="https://www.prevasio.io/demo-request"&gt;Try Prevasio free here&amp;nbsp;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-pillars-for-advanced-cloud"&gt;&lt;img src="http://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/91305878</guid>
            <pubDate>Tue, 19 Dec 2023 10:16:11 GMT</pubDate>
            <media:title>5 Pillars for advanced cloud security</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Secure
your cloud environment with just 5 Pillars. Learn how Prevasio CNAPP’s innovative
features and robust architecture, offers a comprehensive defense mechanism that
goes beyond traditional security&amp;nbsp;&lt;/span&gt;measures.&lt;br&gt;&lt;a href="https://www.prevasio.io/demo-request"&gt;Try Prevasio free here&amp;nbsp;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-pillars-for-advanced-cloud"&gt;&lt;img src="http://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=91d48e5b07e1ccd606ddfa39473789b0&amp;source=podcast&amp;photo%5fid=91305878" width="625" height="352" type="text/html" medium="video" duration="1271" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>cloud</category>
            <category>cloud security</category>
            <category>cloud security management</category>
            <category>cloud strategy</category>
            <category>cnapp</category>
            <category>CSPM</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/audio/podcast/89956906-8-audio.mp3" type="audio/mp3" length="26232032"/>
            <title>Hybrid Cloud Security with Google and AlgoSec- Webinar</title>
            <link>http://video.algosec.com/hybrid-cloud-security-with-google</link>
            <description>&lt;p&gt;In this short webinar we will discuss the challenges in these hybrid networks and how Google Cloud and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/hybrid-cloud-security-with-google"&gt;&lt;img src="http://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/89956906</guid>
            <pubDate>Thu, 16 Nov 2023 06:00:00 GMT</pubDate>
            <media:title>Hybrid Cloud Security with Google and AlgoSec- Webinar</media:title>
            <media:description type="html">&lt;p&gt;In this short webinar we will discuss the challenges in these hybrid networks and how Google Cloud and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/hybrid-cloud-security-with-google"&gt;&lt;img src="http://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b93c9ade09e162d128d0a32a3d3e537e&amp;source=podcast&amp;photo%5fid=89956906" width="625" height="352" type="text/html" medium="video" duration="2186" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>google</category>
            <category>Google cloud</category>
            <category>hybrid cloud</category>
            <category>hybrid cloud security</category>
            <category>prevasio</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/audio/podcast/90438117-6-audio.mp3" type="audio/mp3" length="11340216"/>
            <title>Securing cloud DevOps with Avishai Wool</title>
            <link>http://video.algosec.com/securing-cloud-devops-with-avishai</link>
            <description>&lt;p&gt;&lt;span&gt;The cloud has revolutionized the way we develop and deploy software, but with great power comes great responsibility.  In this exclusive video, Avishai Wool, a seasoned professional in the field, takes you on a comprehensive journey through the crucial aspects of securing your DevOps practices in the cloud.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securing-cloud-devops-with-avishai"&gt;&lt;img src="http://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/90438117</guid>
            <pubDate>Wed, 08 Nov 2023 11:57:54 GMT</pubDate>
            <media:title>Securing cloud DevOps with Avishai Wool</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;The cloud has revolutionized the way we develop and deploy software, but with great power comes great responsibility.  In this exclusive video, Avishai Wool, a seasoned professional in the field, takes you on a comprehensive journey through the crucial aspects of securing your DevOps practices in the cloud.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securing-cloud-devops-with-avishai"&gt;&lt;img src="http://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fee020b5f92e35683e6377582f710382&amp;source=podcast&amp;photo%5fid=90438117" width="625" height="352" type="text/html" medium="video" duration="945" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>devops</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/audio/podcast/90136216-16-audio.mp3" type="audio/mp3" length="1857444"/>
            <title>Introducing Prevasio CNAPP</title>
            <link>http://video.algosec.com/introducing-prevasio-cnapp</link>
            <description>&lt;p&gt;Prevasio CNAPP gives you an extensive view of your east-west and north-south traffic. It empowers you to detect both configuration and IaaS network risks, identify drift from safe setups, and spot risky behavior in container apps—all without agents.&lt;br&gt;
Request a demo today to experience how Prevasio CNAPP can revolutionize your cloud security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introducing-prevasio-cnapp"&gt;&lt;img src="http://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/90136216</guid>
            <pubDate>Tue, 31 Oct 2023 11:46:49 GMT</pubDate>
            <media:title>Introducing Prevasio CNAPP</media:title>
            <media:description type="html">&lt;p&gt;Prevasio CNAPP gives you an extensive view of your east-west and north-south traffic. It empowers you to detect both configuration and IaaS network risks, identify drift from safe setups, and spot risky behavior in container apps—all without agents.&lt;br&gt;
Request a demo today to experience how Prevasio CNAPP can revolutionize your cloud security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introducing-prevasio-cnapp"&gt;&lt;img src="http://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5c4690e4a126c43f9e6a9e2e92fb3069&amp;source=podcast&amp;photo%5fid=90136216" width="625" height="352" type="text/html" medium="video" duration="155" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>CNAPP</category>
            <category>CNAPP network</category>
            <category>container security</category>
            <category>prevasio</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/audio/podcast/88145624-10-audio.mp3" type="audio/mp3" length="21624032"/>
            <title>Joint webinar with Microsoft Azure- Understanding Hybrid Network Security</title>
            <link>http://video.algosec.com/joint-webinar-with-microsoft-azure</link>
            <description>&lt;p&gt;In this joint webinar with Microsoft, we discuss the challenges in these hybrid networks and how Microsoft Azure and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;br&gt;&lt;br&gt;During the webinar you will hear Yuval
Pery, the&amp;nbsp;Product Manager for Azure Network
Security at Microsoft, review and&amp;nbsp;discuss the security features and options available with Microsoft Azure.&amp;nbsp; We also have Yoav Yam-Karnibad, the Product
Manager for Cloud Network Security at AlgoSec, show the&amp;nbsp;integrations that exist today between AlgoSec and Microsoft Azure that help improve visibility and identify and prioritize risk in today's hybrid environments.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/joint-webinar-with-microsoft-azure"&gt;&lt;img src="http://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/88145624</guid>
            <pubDate>Fri, 15 Sep 2023 06:30:00 GMT</pubDate>
            <media:title>Joint webinar with Microsoft Azure- Understanding Hybrid Network Security</media:title>
            <media:description type="html">&lt;p&gt;In this joint webinar with Microsoft, we discuss the challenges in these hybrid networks and how Microsoft Azure and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;br&gt;&lt;br&gt;During the webinar you will hear Yuval
Pery, the&amp;nbsp;Product Manager for Azure Network
Security at Microsoft, review and&amp;nbsp;discuss the security features and options available with Microsoft Azure.&amp;nbsp; We also have Yoav Yam-Karnibad, the Product
Manager for Cloud Network Security at AlgoSec, show the&amp;nbsp;integrations that exist today between AlgoSec and Microsoft Azure that help improve visibility and identify and prioritize risk in today's hybrid environments.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/joint-webinar-with-microsoft-azure"&gt;&lt;img src="http://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bc3c41a552d81a4343c3623389e4a89e&amp;source=podcast&amp;photo%5fid=88145624" width="625" height="352" type="text/html" medium="video" duration="1805" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/standard/download-10-thumbnail.jpg" width="75" height=""/>
            <category>azure</category>
            <category>azure firewall</category>
            <category>azure security</category>
            <category>cloud security</category>
            <category>hybrid</category>
            <category>hybrid cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/audio/podcast/87006980-7-audio.mp3" type="audio/mp3" length="15895240"/>
            <title>What's new in AlgoSec cloud</title>
            <link>http://video.algosec.com/whats-new-in-algosec-cloud</link>
            <description>&lt;p&gt;Dive into the latest innovations and advancements in AlgoSec Cloud, revolutionizing cloud security management. Simplify and streamline your approach, gain visibility and control, and stay ahead in the dynamic digital landscape. Don't miss out on this game-changing opportunity to strengthen your security posture in the cloud.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/whats-new-in-algosec-cloud"&gt;&lt;img src="http://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/87006980</guid>
            <pubDate>Thu, 13 Jul 2023 14:04:12 GMT</pubDate>
            <media:title>What's new in AlgoSec cloud</media:title>
            <media:description type="html">&lt;p&gt;Dive into the latest innovations and advancements in AlgoSec Cloud, revolutionizing cloud security management. Simplify and streamline your approach, gain visibility and control, and stay ahead in the dynamic digital landscape. Don't miss out on this game-changing opportunity to strengthen your security posture in the cloud.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/whats-new-in-algosec-cloud"&gt;&lt;img src="http://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7b284015dcf717bf79db0fdc0904eda7&amp;source=podcast&amp;photo%5fid=87006980" width="625" height="352" type="text/html" medium="video" duration="1325" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>cloud security management</category>
            <category>Saas Q release</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/audio/podcast/86484231-7-audio.mp3" type="audio/mp3" length="6835800"/>
            <title>Zscaler and AlgoSec demo</title>
            <link>http://video.algosec.com/zscaler-and-algosec-demo</link>
            <description>&lt;p&gt;This short demo highlights the integration between Zscaler and AlgoSec.&lt;br /&gt;
This includes capabilities such as policy visibility, risk analysis, change history, compliance reports, policy optimization, and traffic simulation query.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zscaler-and-algosec-demo"&gt;&lt;img src="http://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/86484231</guid>
            <pubDate>Fri, 23 Jun 2023 00:14:20 GMT</pubDate>
            <media:title>Zscaler and AlgoSec demo</media:title>
            <media:description type="html">&lt;p&gt;This short demo highlights the integration between Zscaler and AlgoSec.&lt;br /&gt;
This includes capabilities such as policy visibility, risk analysis, change history, compliance reports, policy optimization, and traffic simulation query.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zscaler-and-algosec-demo"&gt;&lt;img src="http://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a1ef57e24e4a24cd6b81f39af493b5f6&amp;source=podcast&amp;photo%5fid=86484231" width="625" height="352" type="text/html" medium="video" duration="570" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>hybrid cloud</category>
            <category>zero trust</category>
            <category>Zscaler</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/audio/podcast/85364994-7-audio.mp3" type="audio/mp3" length="27164917"/>
            <title>Moving to zero trust- Hybrid cloud security with Zscaler and AlgoSec.mp4</title>
            <link>http://video.algosec.com/moving-to-zero-trust-hybrid-cloud</link>
            <description>&lt;p&gt;As more organizations adopt hybrid cloud environments, securing data and applications has become increasingly complex. The traditional perimeter-based approach to security is no longer enough to protect against advanced threats and targeted attacks. In this webinar, experts from Algosec and Zscaler will discuss how to move toward a Zero Trust security architecture in hybrid cloud environments.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
• Why organizations are moving toward zero trust&lt;br&gt;
• How to manage legacy and new network technologies together&lt;br&gt;
• A demo showing how these solutions are integrated&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/moving-to-zero-trust-hybrid-cloud"&gt;&lt;img src="http://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/85364994</guid>
            <pubDate>Wed, 26 Apr 2023 17:37:45 GMT</pubDate>
            <media:title>Moving to zero trust- Hybrid cloud security with Zscaler and AlgoSec.mp4</media:title>
            <media:description type="html">&lt;p&gt;As more organizations adopt hybrid cloud environments, securing data and applications has become increasingly complex. The traditional perimeter-based approach to security is no longer enough to protect against advanced threats and targeted attacks. In this webinar, experts from Algosec and Zscaler will discuss how to move toward a Zero Trust security architecture in hybrid cloud environments.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
• Why organizations are moving toward zero trust&lt;br&gt;
• How to manage legacy and new network technologies together&lt;br&gt;
• A demo showing how these solutions are integrated&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/moving-to-zero-trust-hybrid-cloud"&gt;&lt;img src="http://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=aabdf2c370ed189a01bf93a5ce7d0bd9&amp;source=podcast&amp;photo%5fid=85364994" width="625" height="352" type="text/html" medium="video" duration="2264" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>hybrid cloud</category>
            <category>zero trust</category>
            <category>Zscaler</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/audio/podcast/85158393-7-audio.mp3" type="audio/mp3" length="25503065"/>
            <title>Intersection of cloud and application security - CSA survey results</title>
            <link>http://video.algosec.com/intersection-of-cloud-and</link>
            <description>&lt;p&gt;Watch an exciting joint webinar between AlgoSec and the Cloud Security Association, where we will explore the latest trends and challenges in cloud security and container adoption.&lt;/p&gt;
&lt;p&gt;Our experts will cover the following topics:&lt;br /&gt;
•	The current state of cloud security and emerging threats&lt;br /&gt;
•	Best practices for securing cloud environments&lt;br /&gt;
•	Strategies for integrating container security into your overall security posture&lt;br /&gt;
•	The role of automation in managing security policies in containerized environments&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/intersection-of-cloud-and"&gt;&lt;img src="http://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/85158393</guid>
            <pubDate>Tue, 04 Apr 2023 09:10:43 GMT</pubDate>
            <media:title>Intersection of cloud and application security - CSA survey results</media:title>
            <media:description type="html">&lt;p&gt;Watch an exciting joint webinar between AlgoSec and the Cloud Security Association, where we will explore the latest trends and challenges in cloud security and container adoption.&lt;/p&gt;
&lt;p&gt;Our experts will cover the following topics:&lt;br /&gt;
•	The current state of cloud security and emerging threats&lt;br /&gt;
•	Best practices for securing cloud environments&lt;br /&gt;
•	Strategies for integrating container security into your overall security posture&lt;br /&gt;
•	The role of automation in managing security policies in containerized environments&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/intersection-of-cloud-and"&gt;&lt;img src="http://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7ce5282cf636ec1c4e08df2a030cba08&amp;source=podcast&amp;photo%5fid=85158393" width="625" height="352" type="text/html" medium="video" duration="2125" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>cloud</category>
            <category>cloudsecurity</category>
            <category>cloud security</category>
            <category>cyber security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/audio/podcast/83739963-8-audio.mp3" type="audio/mp3" length="18864247"/>
            <title>AWS and Hybrid Cloud Security.mp4</title>
            <link>http://video.algosec.com/aws-and-hybrid-cloud-securitymp4</link>
            <description>&lt;p&gt;&lt;div&gt;With all the advantage that cloud technologies bring, how can companies embrace and maintain a healthy security posture across hybrid cloud environments.&amp;nbsp; In this short webinar we discuss how AWS and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;/div&gt;&lt;div&gt;&lt;br&gt;Watch now to&amp;nbsp;learn&amp;nbsp;about: security of the cloud/security in the cloud, security challenges in hybrid environments, and the latest capabilities to help catch security policy and connectivity issues before code is deployed.&lt;br&gt;&lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/aws-and-hybrid-cloud-securitymp4"&gt;&lt;img src="http://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83739963</guid>
            <pubDate>Mon, 03 Apr 2023 18:21:44 GMT</pubDate>
            <media:title>AWS and Hybrid Cloud Security.mp4</media:title>
            <media:description type="html">&lt;p&gt;&lt;div&gt;With all the advantage that cloud technologies bring, how can companies embrace and maintain a healthy security posture across hybrid cloud environments.&amp;nbsp; In this short webinar we discuss how AWS and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;/div&gt;&lt;div&gt;&lt;br&gt;Watch now to&amp;nbsp;learn&amp;nbsp;about: security of the cloud/security in the cloud, security challenges in hybrid environments, and the latest capabilities to help catch security policy and connectivity issues before code is deployed.&lt;br&gt;&lt;/div&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/aws-and-hybrid-cloud-securitymp4"&gt;&lt;img src="http://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=43cfb6c1559b1efb9f93b7cdc5e130b1&amp;source=podcast&amp;photo%5fid=83739963" width="625" height="352" type="text/html" medium="video" duration="1572" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud</category>
            <category>cloud computing</category>
            <category>cloud firewalls</category>
            <category>cloud migration</category>
            <category>cloud migrations</category>
            <category>cloudsecurity</category>
            <category>cloud security</category>
            <category>cloud strategy</category>
            <category>devsecops</category>
            <category>hybrid cloud</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/audio/podcast/79855568-14-audio.mp3" type="audio/mp3" length="3136399"/>
            <title>What's new in AlgoSec SaaS -Q3 2022</title>
            <link>http://video.algosec.com/whats-new-in-algosec-saas-q3-2022</link>
            <description>&lt;p&gt;A short update on our new SaaS features released in Q3 2022&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/whats-new-in-algosec-saas-q3-2022"&gt;&lt;img src="http://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/79855568</guid>
            <pubDate>Tue, 18 Oct 2022 19:22:59 GMT</pubDate>
            <media:title>What's new in AlgoSec SaaS -Q3 2022</media:title>
            <media:description type="html">&lt;p&gt;A short update on our new SaaS features released in Q3 2022&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/whats-new-in-algosec-saas-q3-2022"&gt;&lt;img src="http://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=af614d73d7e820c9783a52cbc426c09e&amp;source=podcast&amp;photo%5fid=79855568" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>objectflow</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/audio/podcast/75568163-29-audio.mp3" type="audio/mp3" length="1696947"/>
            <title>IaC Connectivity Risk Analysis: Identify risks from your pull requests</title>
            <link>http://video.algosec.com/iac-connectivity-risk-analysis</link>
            <description>&lt;p&gt;The AlgoSec cloud Infrastructure-as-Code (IaC) Connectivity Risk Analysis seamlessly integrates into your CI/CD pipeline, scanning code for vulnerabilities in GitHub or GitLab before cloud deployment. It offers developers instant risk assessments and remediation steps directly within their workflow, enhancing security without slowing down development. Learn how this feature streamlines secure code deployment in your cloud infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/iac-connectivity-risk-analysis"&gt;&lt;img src="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/75568163</guid>
            <pubDate>Thu, 15 Sep 2022 19:04:40 GMT</pubDate>
            <media:title>IaC Connectivity Risk Analysis: Identify risks from your pull requests</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec cloud Infrastructure-as-Code (IaC) Connectivity Risk Analysis seamlessly integrates into your CI/CD pipeline, scanning code for vulnerabilities in GitHub or GitLab before cloud deployment. It offers developers instant risk assessments and remediation steps directly within their workflow, enhancing security without slowing down development. Learn how this feature streamlines secure code deployment in your cloud infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/iac-connectivity-risk-analysis"&gt;&lt;img src="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f166fe59d12a6678a5a4ae58b36d3e16&amp;source=podcast&amp;photo%5fid=75568163" width="625" height="352" type="text/html" medium="video" duration="141" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>demo</category>
            <category>devops</category>
            <category>DevSecOps</category>
            <category>IaC</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/audio/podcast/76535873-6-audio.mp3" type="audio/mp3" length="35377049"/>
            <title>Journey to the Cloud.mp4</title>
            <link>http://video.algosec.com/journey-to-the-cloudmp4</link>
            <description>&lt;p&gt;Efficient cloud management helps simplify today’s complex network environment, allowing you to secure application connectivity anywhere. But it can be hard to achieve sufficient visibility when your data is dispersed across numerous public clouds, private clouds, and on-premises devices.&lt;/p&gt;
&lt;p&gt;Today it is easier than ever to speed up application delivery across a hybrid cloud environment while maintaining a high level of security. In this webinar, we’ll discuss:&lt;/p&gt;
&lt;p&gt;- The basics of managing multiple workloads in the cloud&lt;br /&gt;
- How to create a successful enterprise-level security management program&lt;br /&gt;
- The structure of effective hybrid cloud management&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/journey-to-the-cloudmp4"&gt;&lt;img src="http://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/76535873</guid>
            <pubDate>Sun, 10 Jul 2022 10:28:15 GMT</pubDate>
            <media:title>Journey to the Cloud.mp4</media:title>
            <media:description type="html">&lt;p&gt;Efficient cloud management helps simplify today’s complex network environment, allowing you to secure application connectivity anywhere. But it can be hard to achieve sufficient visibility when your data is dispersed across numerous public clouds, private clouds, and on-premises devices.&lt;/p&gt;
&lt;p&gt;Today it is easier than ever to speed up application delivery across a hybrid cloud environment while maintaining a high level of security. In this webinar, we’ll discuss:&lt;/p&gt;
&lt;p&gt;- The basics of managing multiple workloads in the cloud&lt;br /&gt;
- How to create a successful enterprise-level security management program&lt;br /&gt;
- The structure of effective hybrid cloud management&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/journey-to-the-cloudmp4"&gt;&lt;img src="http://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f2d8a16c3ad5ccc4c583b1c34bde1a3f&amp;source=podcast&amp;photo%5fid=76535873" width="625" height="352" type="text/html" medium="video" duration="2948" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <category>cloud migration</category>
            <category>cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/audio/podcast/74774099-16-audio.mp3" type="audio/mp3" length="27786378"/>
            <title>Skills Acceleration Workshops: Hybrid Cloud</title>
            <link>http://video.algosec.com/skills-acceleration-workshops-1</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/skills-acceleration-workshops-1"&gt;&lt;img src="http://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/74774099</guid>
            <pubDate>Sun, 27 Mar 2022 14:55:49 GMT</pubDate>
            <media:title>Skills Acceleration Workshops: Hybrid Cloud</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/skills-acceleration-workshops-1"&gt;&lt;img src="http://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3d453a7ced5c183215031263920512fa&amp;source=podcast&amp;photo%5fid=74774099" width="625" height="391" type="text/html" medium="video" duration="2315" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>hybrid cloud</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/audio/podcast/72839921-9-audio.mp3" type="audio/mp3" length="6034433"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/audio/podcast/69441880-19-audio.mp3" type="audio/mp3" length="37559109"/>
            <title>How to Modernise Your Infrastructure Without Neglecting Your Security</title>
            <link>http://video.algosec.com/how-to-modernise-your</link>
            <description>&lt;p&gt;Alex Hilton Chief Executive, CIF | Kyle Wickert Worldwide Strategic Architect, AlgoSec | Michael Meyer CRP, MRSBPO&lt;/p&gt;
&lt;p&gt;Episode 2 of Keeping Up-to-Date with Your Network Security&lt;/p&gt;
&lt;p&gt;There is a lot of value in moving enterprise applications onto the cloud. These benefits range from security and data protection and business agility, to financial benefits and faster time to markets. However, efforts can sometimes be misplaced, which causes disruption to the network and leaves you with inadequate security and compliance measures. Cloud network security is made up of multiple layered security, and before making the decision to use enterprise applications in the cloud, you must thoughtfully consider the variety of security controls you will use to secure your data.&lt;/p&gt;
&lt;p&gt;So, how can you elevate digital transformation and cloud migration efforts, without neglecting your security? Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority?&lt;/p&gt;
&lt;p&gt;Join us in this session to learn more about:&lt;br /&gt;&lt;br /&gt;
- What is required to move the security portion of your application&lt;br /&gt;&lt;br /&gt;
- Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br /&gt;&lt;br /&gt;
- How to enhance visibility, and why this is so important when modernising your infrastructure&lt;br /&gt;&lt;br /&gt;
- How to unify your network security management across a hybrid and multi-cloud environment&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernise-your"&gt;&lt;img src="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69441880</guid>
            <pubDate>Mon, 14 Jun 2021 13:40:34 GMT</pubDate>
            <media:title>How to Modernise Your Infrastructure Without Neglecting Your Security</media:title>
            <media:description type="html">&lt;p&gt;Alex Hilton Chief Executive, CIF | Kyle Wickert Worldwide Strategic Architect, AlgoSec | Michael Meyer CRP, MRSBPO&lt;/p&gt;
&lt;p&gt;Episode 2 of Keeping Up-to-Date with Your Network Security&lt;/p&gt;
&lt;p&gt;There is a lot of value in moving enterprise applications onto the cloud. These benefits range from security and data protection and business agility, to financial benefits and faster time to markets. However, efforts can sometimes be misplaced, which causes disruption to the network and leaves you with inadequate security and compliance measures. Cloud network security is made up of multiple layered security, and before making the decision to use enterprise applications in the cloud, you must thoughtfully consider the variety of security controls you will use to secure your data.&lt;/p&gt;
&lt;p&gt;So, how can you elevate digital transformation and cloud migration efforts, without neglecting your security? Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority?&lt;/p&gt;
&lt;p&gt;Join us in this session to learn more about:&lt;br /&gt;&lt;br /&gt;
- What is required to move the security portion of your application&lt;br /&gt;&lt;br /&gt;
- Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br /&gt;&lt;br /&gt;
- How to enhance visibility, and why this is so important when modernising your infrastructure&lt;br /&gt;&lt;br /&gt;
- How to unify your network security management across a hybrid and multi-cloud environment&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernise-your"&gt;&lt;img src="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=63cfca3766992764f7124280f27d813a&amp;source=podcast&amp;photo%5fid=69441880" width="625" height="352" type="text/html" medium="video" duration="3130" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/audio/podcast/69009144-8-audio.mp3" type="audio/mp3" length="4021960"/>
            <title>Gaps between CloudOps, NetOps &amp; SecOps teams</title>
            <link>http://video.algosec.com/gaps-between-cloudops-netops</link>
            <description>&lt;p&gt;Hear from network security experts as they discuss the gaps faced by CloudOps, NetOps, and SecOps teams.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gaps-between-cloudops-netops"&gt;&lt;img src="http://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/standard/download-8-thumbnail.jpg" width="569" height="480"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69009144</guid>
            <pubDate>Tue, 01 Jun 2021 16:08:00 GMT</pubDate>
            <media:title>Gaps between CloudOps, NetOps &amp; SecOps teams</media:title>
            <media:description type="html">&lt;p&gt;Hear from network security experts as they discuss the gaps faced by CloudOps, NetOps, and SecOps teams.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gaps-between-cloudops-netops"&gt;&lt;img src="http://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/standard/download-8-thumbnail.jpg" width="569" height="480"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=89f87cd01ca444635af7f32973771a86&amp;source=podcast&amp;photo%5fid=69009144" width="625" height="527" type="text/html" medium="video" duration="335" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/standard/download-8-thumbnail.jpg" width="569" height="480"/>
            <category>cisco</category>
            <category>cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/audio/podcast/68673625-2-audio.mp3" type="audio/mp3" length="36435321"/>
            <title>How to manage your cloud journey</title>
            <link>http://video.algosec.com/how-to-manage-your-cloud-journey</link>
            <description>&lt;p&gt;&lt;h2&gt;Episode 1 of Keeping Up-to-Date with Your Network Security&amp;nbsp;&lt;/h2&gt;&lt;u&gt;Speakers:&lt;/u&gt;&lt;br&gt;Alex Hilton Chief Executive, CIF&amp;nbsp;&lt;div&gt;&lt;p&gt;Oren&amp;nbsp;Amiram&amp;nbsp;Director, Product Management, AlgoSec&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Stephen Owen CISO&amp;nbsp;&lt;/p&gt;&lt;/div&gt;Securing your data was once much&amp;nbsp;simpler. It’s&amp;nbsp;grown more complex in recent years.&amp;nbsp;As the workforce becomes more distributed, so does your data. Spreading your data across multiple public and private clouds complicates your&amp;nbsp;network. Today’s&amp;nbsp;data sits in multiple locations and geographies, and is made up of multiple public clouds, private clouds and other on-premises network devices.&amp;nbsp;Therefore,&amp;nbsp;managing your cloud journey can be tiresome and complicated.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;Enter cloud management.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;In this episode we’ll discuss:&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to manage multiple workloads on the cloud&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- What successful security management looks like for today’s enterprises&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to achieve simple, effective security management for your hybrid network&amp;nbsp;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-manage-your-cloud-journey"&gt;&lt;img src="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68673625</guid>
            <pubDate>Wed, 12 May 2021 12:07:03 GMT</pubDate>
            <media:title>How to manage your cloud journey</media:title>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Episode 1 of Keeping Up-to-Date with Your Network Security&amp;nbsp;&lt;/h2&gt;&lt;u&gt;Speakers:&lt;/u&gt;&lt;br&gt;Alex Hilton Chief Executive, CIF&amp;nbsp;&lt;div&gt;&lt;p&gt;Oren&amp;nbsp;Amiram&amp;nbsp;Director, Product Management, AlgoSec&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Stephen Owen CISO&amp;nbsp;&lt;/p&gt;&lt;/div&gt;Securing your data was once much&amp;nbsp;simpler. It’s&amp;nbsp;grown more complex in recent years.&amp;nbsp;As the workforce becomes more distributed, so does your data. Spreading your data across multiple public and private clouds complicates your&amp;nbsp;network. Today’s&amp;nbsp;data sits in multiple locations and geographies, and is made up of multiple public clouds, private clouds and other on-premises network devices.&amp;nbsp;Therefore,&amp;nbsp;managing your cloud journey can be tiresome and complicated.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;Enter cloud management.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;In this episode we’ll discuss:&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to manage multiple workloads on the cloud&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- What successful security management looks like for today’s enterprises&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to achieve simple, effective security management for your hybrid network&amp;nbsp;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-manage-your-cloud-journey"&gt;&lt;img src="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ffd88edfe1c19862adf322229253fc69&amp;source=podcast&amp;photo%5fid=68673625" width="625" height="352" type="text/html" medium="video" duration="3036" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/audio/podcast/68518614-2-audio.mp3" type="audio/mp3" length="25201206"/>
            <title>The 6 best practices to stay secure in the hybrid cloud</title>
            <link>http://video.algosec.com/the-6-best-practices-to-stay-secure</link>
            <description>&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68518614</guid>
            <pubDate>Sun, 02 May 2021 16:13:13 GMT</pubDate>
            <media:title>The 6 best practices to stay secure in the hybrid cloud</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=629c798b0006a3bc66c9e695b31bf6bc&amp;source=podcast&amp;photo%5fid=68518614" width="625" height="352" type="text/html" medium="video" duration="2100" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>cyber security</category>
            <category>firewall management</category>
            <category>security management</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/audio/podcast/67413841-6-audio.mp3" type="audio/mp3" length="1231799"/>
            <title>AlgoSec cloud Integration | Hybrid Network Connectivity Check</title>
            <link>http://video.algosec.com/algosec-cloud-integration-hybrid</link>
            <description>&lt;p&gt;Running a connectivity check in AlgoSec cloud allows you to observe how traffic is routed across your entire hybrid network. You can use this information to troubleshoot, reduce risk across the whole hybrid network, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-integration-hybrid"&gt;&lt;img src="http://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67413841</guid>
            <pubDate>Mon, 01 Mar 2021 16:24:09 GMT</pubDate>
            <media:title>AlgoSec cloud Integration | Hybrid Network Connectivity Check</media:title>
            <media:description type="html">&lt;p&gt;Running a connectivity check in AlgoSec cloud allows you to observe how traffic is routed across your entire hybrid network. You can use this information to troubleshoot, reduce risk across the whole hybrid network, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-integration-hybrid"&gt;&lt;img src="http://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=762e84fb8a5b02b974fbacfd5a44e5ee&amp;source=podcast&amp;photo%5fid=67413841" width="625" height="352" type="text/html" medium="video" duration="103" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>connectivity</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/audio/podcast/64889600-5-audio.mp3" type="audio/mp3" length="12907771"/>
            <title>Cloud migrations made simpler: Safe, Secure and Successful Migrations Webinar</title>
            <link>http://video.algosec.com/cloud-migrations-made-simpler-safe</link>
            <description>&lt;p&gt;Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you on how to simplify and accelerate large-scale complex application migration projects.&lt;/p&gt;
&lt;p&gt;The webinar will cover:&lt;br&gt;
   •	Why organizations choose to migrate their applications to the cloud&lt;br&gt;
   •	What is required in order to move the security portion of your application and how long it may take&lt;br&gt;
   •	Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br&gt;
   •	How to deliver unified security policy management across the hybrid cloud environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cloud-migrations-made-simpler-safe"&gt;&lt;img src="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64889600</guid>
            <pubDate>Wed, 28 Oct 2020 18:45:32 GMT</pubDate>
            <media:title>Cloud migrations made simpler: Safe, Secure and Successful Migrations Webinar</media:title>
            <media:description type="html">&lt;p&gt;Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you on how to simplify and accelerate large-scale complex application migration projects.&lt;/p&gt;
&lt;p&gt;The webinar will cover:&lt;br&gt;
   •	Why organizations choose to migrate their applications to the cloud&lt;br&gt;
   •	What is required in order to move the security portion of your application and how long it may take&lt;br&gt;
   •	Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br&gt;
   •	How to deliver unified security policy management across the hybrid cloud environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cloud-migrations-made-simpler-safe"&gt;&lt;img src="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=20b747595bfc66082c680695eb8af3a8&amp;source=podcast&amp;photo%5fid=64889600" width="625" height="352" type="text/html" medium="video" duration="2150" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud migration</category>
            <category>cloud security</category>
            <category>migrate applications</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/audio/podcast/64563330-4-audio.mp3" type="audio/mp3" length="19988261"/>
            <title>Overcoming the Challenges of Managing a Hybrid Environment</title>
            <link>http://video.algosec.com/overcoming-the-challenges-of</link>
            <description>&lt;p&gt;Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS) | Sep 2020&lt;/p&gt;
&lt;p&gt;Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.&lt;/p&gt;
&lt;p&gt;Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.&lt;/p&gt;
&lt;p&gt;In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:&lt;br /&gt;
&lt;br /&gt;
    •	Securely migrate workloads from on-prem to public cloud&lt;br /&gt;
    •	Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.&lt;br /&gt;
    •	Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations&lt;br /&gt;
    •	Protect your data, accounts, and workloads from misconfiguration risks&lt;br /&gt;
    •	Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting&lt;br /&gt;
    •	Gain a unified view of your compliance status and achieve continuous compliance&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/overcoming-the-challenges-of"&gt;&lt;img src="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64563330</guid>
            <pubDate>Thu, 01 Oct 2020 15:58:19 GMT</pubDate>
            <media:title>Overcoming the Challenges of Managing a Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS) | Sep 2020&lt;/p&gt;
&lt;p&gt;Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.&lt;/p&gt;
&lt;p&gt;Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.&lt;/p&gt;
&lt;p&gt;In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:&lt;br /&gt;
&lt;br /&gt;
    •	Securely migrate workloads from on-prem to public cloud&lt;br /&gt;
    •	Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.&lt;br /&gt;
    •	Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations&lt;br /&gt;
    •	Protect your data, accounts, and workloads from misconfiguration risks&lt;br /&gt;
    •	Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting&lt;br /&gt;
    •	Gain a unified view of your compliance status and achieve continuous compliance&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/overcoming-the-challenges-of"&gt;&lt;img src="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f2e2295e340b972dcb3452a894e31370&amp;source=podcast&amp;photo%5fid=64563330" width="625" height="352" type="text/html" medium="video" duration="3330" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/audio/podcast/63911625-2-audio.mp3" type="audio/mp3" length="812898"/>
            <title>AlgoSec cloud central Policy Management</title>
            <link>http://video.algosec.com/algosec-cloud-central-policy</link>
            <description>&lt;p&gt;In this video we will demonstrate the power of central policy management of cloud security controls.&lt;br&gt;
Save time, identify and prevent human error and risk by managing a single policy set instead of doing the same for multiple similar security controls.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-central-policy"&gt;&lt;img src="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63911625</guid>
            <pubDate>Tue, 08 Sep 2020 23:06:11 GMT</pubDate>
            <media:title>AlgoSec cloud central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;In this video we will demonstrate the power of central policy management of cloud security controls.&lt;br&gt;
Save time, identify and prevent human error and risk by managing a single policy set instead of doing the same for multiple similar security controls.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-central-policy"&gt;&lt;img src="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=171c1e0547c4d0eba7546366ddb1162d&amp;source=podcast&amp;photo%5fid=63911625" width="625" height="338" type="text/html" medium="video" duration="135" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/>
            <category>change management</category>
            <category>cloud security</category>
            <category>policy management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/audio/podcast/63911630-9-audio.mp3" type="audio/mp3" length="966260"/>
            <title>AlgoSec cloud rule usage and cleanup</title>
            <link>http://video.algosec.com/algosec-cloud-rule-usage-and</link>
            <description>&lt;p&gt;In this video we will demonstrate how &lt;b&gt;&lt;/b&gt;AlgoSec cloud can provide great value with flow logs-based rule usage and cleanup.&lt;br&gt;
With this capability you can easily observe usage tied to risky rules as well as identify unused rules and remove them to reduce risk and avoid bloated policies without compromising business continuity.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-rule-usage-and"&gt;&lt;img src="http://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/standard/download-9-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63911630</guid>
            <pubDate>Tue, 08 Sep 2020 23:01:09 GMT</pubDate>
            <media:title>AlgoSec cloud rule usage and cleanup</media:title>
            <media:description type="html">&lt;p&gt;In this video we will demonstrate how &lt;b&gt;&lt;/b&gt;AlgoSec cloud can provide great value with flow logs-based rule usage and cleanup.&lt;br&gt;
With this capability you can easily observe usage tied to risky rules as well as identify unused rules and remove them to reduce risk and avoid bloated policies without compromising business continuity.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-rule-usage-and"&gt;&lt;img src="http://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/standard/download-9-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a78e4cbefc97dc9bbb92646be1c12669&amp;source=podcast&amp;photo%5fid=63911630" width="625" height="338" type="text/html" medium="video" duration="80" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/standard/download-9-thumbnail.jpg" width="600" height="324"/>
            <category>cleanup</category>
            <category>cloud security</category>
            <category>optimization</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/audio/podcast/59793974-2-audio.mp3" type="audio/mp3" length="17898956"/>
            <title>Achieving Visibility and Security in AWS and across the Hybrid Network | AWS...</title>
            <link>http://video.algosec.com/achieving-visibility-and-security-1</link>
            <description>&lt;p&gt;&lt;p&gt;As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-visibility-and-security-1"&gt;&lt;img src="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/59793974</guid>
            <pubDate>Tue, 07 Jul 2020 10:39:58 GMT</pubDate>
            <media:title>Achieving Visibility and Security in AWS and across the Hybrid Network | AWS...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-visibility-and-security-1"&gt;&lt;img src="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fb58b308520346124ba9d7a22296a816&amp;source=podcast&amp;photo%5fid=59793974" width="625" height="352" type="text/html" medium="video" duration="2983" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>Devops</category>
            <category>network security</category>
            <category>SDN</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/audio/podcast/61650270-2-audio.mp3" type="audio/mp3" length="11335566"/>
            <title>Optimize your Juniper Investment with Intelligent Network Security Automation</title>
            <link>http://video.algosec.com/optimize-your-juniper-investment</link>
            <description>&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61650270</guid>
            <pubDate>Wed, 25 Mar 2020 19:30:22 GMT</pubDate>
            <media:title>Optimize your Juniper Investment with Intelligent Network Security Automation</media:title>
            <media:description type="html">&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d6c3dac069cd3e89e381907d0133d8cb&amp;source=podcast&amp;photo%5fid=61650270" width="625" height="352" type="text/html" medium="video" duration="1889" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>juniper</category>
            <category>Network Security</category>
            <category>Network Security Automation</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/audio/podcast/49615359-2-audio.mp3" type="audio/mp3" length="15778837"/>
            <title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</title>
            <link>http://video.algosec.com/managing-effective-security</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615359</guid>
            <pubDate>Wed, 18 Mar 2020 14:04:50 GMT</pubDate>
            <media:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a61b1227849251e32a2981784acbc6a7&amp;source=podcast&amp;photo%5fid=49615359" width="625" height="352" type="text/html" medium="video" duration="2630" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>compliance</category>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>hybrid environment</category>
            <category>IDC</category>
            <category>migrating applications</category>
            <category>multi-cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/audio/podcast/53083724-2-audio.mp3" type="audio/mp3" length="6659072"/>
            <title>Securely Managing Application Connectivity – Best Practices</title>
            <link>http://video.algosec.com/securely-managing-application</link>
            <description>&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53083724</guid>
            <pubDate>Sun, 16 Jun 2019 11:42:42 GMT</pubDate>
            <media:title>Securely Managing Application Connectivity – Best Practices</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3a53e9daff9a2bc19930ddc029e874d9&amp;source=podcast&amp;photo%5fid=53083724" width="625" height="352" type="text/html" medium="video" duration="1111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Application Security</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cloud security</category>
            <category>Connectivity</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/audio/podcast/52462354-2-audio.mp3" type="audio/mp3" length="21409688"/>
            <title>CSA Study: Security Challenges in Cloud Environments</title>
            <link>http://video.algosec.com/csa-study-security-challenges-in</link>
            <description>&lt;p&gt;John Yeoh, Global VP of Research (CSA) &amp; Yitzy Tannenbaum Product Marketing Manager (AlgoSec) | May 22 2019&lt;/p&gt;
&lt;p&gt;Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.&lt;/p&gt;
&lt;p&gt;In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.&lt;/p&gt;
&lt;p&gt;Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).&lt;/p&gt;
&lt;p&gt;We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:&lt;/p&gt;
&lt;p&gt;• Workloads being used in or moved to the cloud and how they are being deployed/migrated&lt;br /&gt;
• Types of cloud platforms being used by companies&lt;br /&gt;
• Common security challenges faced by companies when moving workloads to the cloud&lt;br /&gt;
• Methods of managing risk and vulnerabilities in the cloud environment&lt;br /&gt;
• Causes of network or application outages and the amount of time it took to remediate&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/csa-study-security-challenges-in"&gt;&lt;img src="http://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52462354</guid>
            <pubDate>Sun, 26 May 2019 12:02:05 GMT</pubDate>
            <media:title>CSA Study: Security Challenges in Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;John Yeoh, Global VP of Research (CSA) &amp; Yitzy Tannenbaum Product Marketing Manager (AlgoSec) | May 22 2019&lt;/p&gt;
&lt;p&gt;Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.&lt;/p&gt;
&lt;p&gt;In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.&lt;/p&gt;
&lt;p&gt;Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).&lt;/p&gt;
&lt;p&gt;We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:&lt;/p&gt;
&lt;p&gt;• Workloads being used in or moved to the cloud and how they are being deployed/migrated&lt;br /&gt;
• Types of cloud platforms being used by companies&lt;br /&gt;
• Common security challenges faced by companies when moving workloads to the cloud&lt;br /&gt;
• Methods of managing risk and vulnerabilities in the cloud environment&lt;br /&gt;
• Causes of network or application outages and the amount of time it took to remediate&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/csa-study-security-challenges-in"&gt;&lt;img src="http://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=eb670c2f78983d7c62bcf81293b10412&amp;source=podcast&amp;photo%5fid=52462354" width="625" height="352" type="text/html" medium="video" duration="3603" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/audio/podcast/49895193-3-audio.mp3" type="audio/mp3" length="16397626"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/audio/podcast/49615259-2-audio.mp3" type="audio/mp3" length="14028424"/>
            <title>Selecting the right security policy management solution for your organization</title>
            <link>http://video.algosec.com/selecting-the-right-security-policy</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615259</guid>
            <pubDate>Wed, 17 Oct 2018 18:30:00 GMT</pubDate>
            <media:title>Selecting the right security policy management solution for your organization</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=26569be0faf52cc329bf82bf37a909f1&amp;source=podcast&amp;photo%5fid=49615259" width="625" height="352" type="text/html" medium="video" duration="2338" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/audio/podcast/44181793-4-audio.mp3" type="audio/mp3" length="1724751"/>
            <title>Sharing Network Security Information with the Wider IT Community With Team...</title>
            <link>http://video.algosec.com/sharing-network-security</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181793</guid>
            <pubDate>Tue, 30 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Sharing Network Security Information with the Wider IT Community With Team...</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=82a8e57717222b74b1b7f76f49f5d8aa&amp;source=podcast&amp;photo%5fid=44181793" width="625" height="352" type="text/html" medium="video" duration="287" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>avishai wool</category>
            <category>chatbot</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>ms teams</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>skype for business</category>
            <category>slack</category>
            <category>team collaboration tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/audio/podcast/44181854-4-audio.mp3" type="audio/mp3" length="1461750"/>
            <title>The Benefits of Mapping Firewall Rules to Business Applications</title>
            <link>http://video.algosec.com/the-benefits-of-mapping-firewall</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181854</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>The Benefits of Mapping Firewall Rules to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72ce166d6692eacad1d4807eb07ea18e&amp;source=podcast&amp;photo%5fid=44181854" width="625" height="352" type="text/html" medium="video" duration="243" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity flows</category>
            <category>businessflow</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rule management</category>
            <category>network connectivity</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/audio/podcast/44181841-4-audio.mp3" type="audio/mp3" length="2154517"/>
            <title>New! How to Manage Dynamic Objects in Cloud Environments</title>
            <link>http://video.algosec.com/new-how-to-manage-dynamic-objects</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181841</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>New! How to Manage Dynamic Objects in Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0524b2eaa5d233030ef32c3f04935a7b&amp;source=podcast&amp;photo%5fid=44181841" width="625" height="352" type="text/html" medium="video" duration="359" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon web services security</category>
            <category>avishai wool</category>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>dynamic objects aws</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/audio/podcast/44181819-4-audio.mp3" type="audio/mp3" length="1484163"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/audio/podcast/44181920-4-audio.mp3" type="audio/mp3" length="2512343"/>
            <title>How to Intelligently Select the Security Groups to Modify When Managing...</title>
            <link>http://video.algosec.com/how-to-intelligently-select-the</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181920</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Intelligently Select the Security Groups to Modify When Managing...</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1772ee30e20c98c8d8c7667649d3e7cc&amp;source=podcast&amp;photo%5fid=44181920" width="625" height="352" type="text/html" medium="video" duration="419" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>publick cloud</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/audio/podcast/44181914-4-audio.mp3" type="audio/mp3" length="2039474"/>
            <title>The Different Data Sources for Application Connectivity Discovery</title>
            <link>http://video.algosec.com/the-different-data-sources-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181914</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>The Different Data Sources for Application Connectivity Discovery</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e939292f9bdaa1169eabd25695c8c0a5&amp;source=podcast&amp;photo%5fid=44181914" width="625" height="352" type="text/html" medium="video" duration="340" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>prof. wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/audio/podcast/44181877-4-audio.mp3" type="audio/mp3" length="2458426"/>
            <title>How to Automatically Identify Business Application Connectivity Needs from...</title>
            <link>http://video.algosec.com/how-to-automatically-identify</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181877</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Automatically Identify Business Application Connectivity Needs from...</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c2388410abe5deb84379c4ee696b5036&amp;source=podcast&amp;photo%5fid=44181877" width="625" height="352" type="text/html" medium="video" duration="410" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>network connectivity flows</category>
            <category>Network Security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/audio/podcast/44181876-4-audio.mp3" type="audio/mp3" length="2091353"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/audio/podcast/44181937-4-audio.mp3" type="audio/mp3" length="1685724"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/audio/podcast/44181993-4-audio.mp3" type="audio/mp3" length="2279121"/>
            <title>The Right Way to Audit AWS Policies</title>
            <link>http://video.algosec.com/the-right-way-to-audit-aws-policies</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181993</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>The Right Way to Audit AWS Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b1c1f67722fb6eb47731b6e174f7b8ae&amp;source=podcast&amp;photo%5fid=44181993" width="625" height="352" type="text/html" medium="video" duration="380" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/audio/podcast/44181948-5-audio.mp3" type="audio/mp3" length="2674406"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/audio/podcast/44181918-3-audio.mp3" type="audio/mp3" length="1977564"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/audio/podcast/44182148-3-audio.mp3" type="audio/mp3" length="2358743"/>
            <title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</title>
            <link>http://video.algosec.com/combining-security-groups-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182148</guid>
            <pubDate>Thu, 29 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=92cd6dd9ebc61271a4111bbc26bec00d&amp;source=podcast&amp;photo%5fid=44182148" width="625" height="352" type="text/html" medium="video" duration="393" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>firewalls</category>
            <category>nacl</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/audio/podcast/44182088-3-audio.mp3" type="audio/mp3" length="2523628"/>
            <title>Using AWS Network ACLs for Enhanced Traffic Filtering</title>
            <link>http://video.algosec.com/using-aws-network-acls-for-enhanced</link>
            <description>&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182088</guid>
            <pubDate>Mon, 26 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Using AWS Network ACLs for Enhanced Traffic Filtering</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c3e563d70dbfbdadd99c127bdbee633d&amp;source=podcast&amp;photo%5fid=44182088" width="625" height="352" type="text/html" medium="video" duration="420" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>nacl</category>
            <category>nacls</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/audio/podcast/44182267-4-audio.mp3" type="audio/mp3" length="1581495"/>
            <title>Protect Outbound Traffic in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/protect-outbound-traffic-in-an-aws</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182267</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Protect Outbound Traffic in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=03b144c5631b7e1579c2666d1136adab&amp;source=podcast&amp;photo%5fid=44182267" width="625" height="352" type="text/html" medium="video" duration="263" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AWS</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/audio/podcast/44182199-4-audio.mp3" type="audio/mp3" length="1786191"/>
            <title>The Fundamentals of AWS Security Groups</title>
            <link>http://video.algosec.com/the-fundamentals-of-aws-security</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182199</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>The Fundamentals of AWS Security Groups</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e55f13e53dac1f9b30c7fc1ff4de07da&amp;source=podcast&amp;photo%5fid=44182199" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Amazon Web Services (Website)</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall policy management</category>
            <category>firewalls</category>
            <category>hybrid cloud</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/audio/podcast/44182182-4-audio.mp3" type="audio/mp3" length="2293384"/>
            <title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/change-management-auditing-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182182</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0cea2f1b49838b5d93d68f90d8d099e&amp;source=podcast&amp;photo%5fid=44182182" width="625" height="352" type="text/html" medium="video" duration="382" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>hipaa</category>
            <category>hybrid cloud</category>
            <category>hybrid environments</category>
            <category>network security</category>
            <category>pci</category>
            <category>prof wool</category>
            <category>Regulatory Compliance</category>
            <category>SDN</category>
            <category>sox</category>
        </item>
    </channel>
</rss>
