<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Prof Wool: Firewall Management 201</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>Prof Wool: Firewall Management 201</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/podcast/prof-wool-firewall-management-201-1"/>
        <atom:link rel="next" href="https://video.algosec.com/podcast/prof-wool-firewall-management-201-1?p=2&amp;album%5fid=49615315&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/video_medium/sharing-network-security-video.mp4?source=podcast" type="video/mp4" length="16792470"/>
            <title>Sharing Network Security Information with the Wider IT Community With Team...</title>
            <link>http://video.algosec.com/sharing-network-security</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181793</guid>
            <pubDate>Tue, 30 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Sharing Network Security Information with the Wider IT Community With Team...</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=82a8e57717222b74b1b7f76f49f5d8aa&amp;source=podcast&amp;photo%5fid=44181793" width="625" height="352" type="text/html" medium="video" duration="287" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>avishai wool</category>
            <category>chatbot</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>ms teams</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>skype for business</category>
            <category>slack</category>
            <category>team collaboration tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4?source=podcast" type="video/mp4" length="15245868"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="17164651"/>
            <title>Lesson 12: Managing Your Security Policy for Disaster Recovery</title>
            <link>http://video.algosec.com/lesson-12-managing-your-security</link>
            <description>&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182154</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ab2e958faa7e5fa8581da3380b0a834&amp;source=podcast&amp;photo%5fid=44182154" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Disaster Recovery</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/video_medium/lesson-8-nat-considerations-when-video.mp4?source=podcast" type="video/mp4" length="22584967"/>
            <title>Lesson 8: NAT Considerations When Managing Your Security Policy</title>
            <link>http://video.algosec.com/lesson-8-nat-considerations-when</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182234</guid>
            <pubDate>Tue, 11 Nov 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 8: NAT Considerations When Managing Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c4e501a5254536aa42ad741dacb80d20&amp;source=podcast&amp;photo%5fid=44182234" width="625" height="352" type="text/html" medium="video" duration="397" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network address translation</category>
            <category>Network Security</category>
            <category>network security policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/video_medium/lesson-10-tips-to-simplify-video.mp4?source=podcast" type="video/mp4" length="17136234"/>
            <title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</title>
            <link>http://video.algosec.com/lesson-10-tips-to-simplify</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182380</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e32f091cc2c3304f4ce552d35b7a0ccc&amp;source=podcast&amp;photo%5fid=44182380" width="625" height="352" type="text/html" medium="video" duration="293" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>business applications</category>
            <category>cloud migration</category>
            <category>data center</category>
            <category>data center application</category>
            <category>data center consolidation</category>
            <category>datacenter consolidation</category>
            <category>data center migration</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>physical data center</category>
            <category>private cloud</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/video_medium/lesson-7-examining-the-challenges-video.mp4?source=podcast" type="video/mp4" length="40171738"/>
            <title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</title>
            <link>http://video.algosec.com/lesson-7-examining-the-challenges</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182374</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=11f3ec0bd4c2c56ab1b60ec291133dd3&amp;source=podcast&amp;photo%5fid=44182374" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>Firewalls</category>
            <category>HSRP</category>
            <category>network routing</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>routing</category>
            <category>security management</category>
            <category>SNMP</category>
            <category>SSH</category>
            <category>VRPP</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/video_medium/lesson-4-tips-for-firewall-rule-video.mp4?source=podcast" type="video/mp4" length="23075092"/>
            <title>Lesson 4: Tips for Firewall Rule Recertification</title>
            <link>http://video.algosec.com/lesson-4-tips-for-firewall-rule</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182607</guid>
            <pubDate>Thu, 18 Oct 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Tips for Firewall Rule Recertification</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc89d0b912300da27e034e544e2dc875&amp;source=podcast&amp;photo%5fid=44182607" width="625" height="352" type="text/html" medium="video" duration="395" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall rule</category>
            <category>firewall rule recertification</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/video_medium/lesson-6-analyzing-routers-as-part-video.mp4?source=podcast" type="video/mp4" length="20495387"/>
            <title>Lesson 6: Analyzing Routers as Part of Your Security Policy</title>
            <link>http://video.algosec.com/lesson-6-analyzing-routers-as-part</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182766</guid>
            <pubDate>Tue, 25 Sep 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 6: Analyzing Routers as Part of Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f024d96dd0d23aa74a2f8fa6a4ac0c5&amp;source=podcast&amp;photo%5fid=44182766" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>access control lists</category>
            <category>ACLs</category>
            <category>Audit and Compliance</category>
            <category>fire wall change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>router ACLs</category>
            <category>routers</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/video_medium/lesson-1-examining-the-most-common-video.mp4?source=podcast" type="video/mp4" length="26405122"/>
            <title>Lesson 1: Examining the Most Common Firewall Misconfigurations</title>
            <link>http://video.algosec.com/lesson-1-examining-the-most-common</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182624</guid>
            <pubDate>Mon, 17 Sep 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Examining the Most Common Firewall Misconfigurations</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0b0094e9616d6c9f528a648df323567&amp;source=podcast&amp;photo%5fid=44182624" width="625" height="352" type="text/html" medium="video" duration="389" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management software</category>
            <category>firewall misconfigurations</category>
            <category>firewall risk</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4?source=podcast" type="video/mp4" length="30272598"/>
            <title>Lesson 2: Automating the Firewall Change Control Process</title>
            <link>http://video.algosec.com/lesson-2-automating-the-firewall</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182690</guid>
            <pubDate>Thu, 28 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Automating the Firewall Change Control Process</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da5caa63acf663010badf236bea69325&amp;source=podcast&amp;photo%5fid=44182690" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>automate firewall changes</category>
            <category>firewall change control</category>
            <category>firewall change workflow</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/video_medium/lesson-5-managing-firewall-policies-video.mp4?source=podcast" type="video/mp4" length="19797888"/>
            <title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</title>
            <link>http://video.algosec.com/lesson-5-managing-firewall-policies</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182901</guid>
            <pubDate>Mon, 07 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4e056f684aafa0ce814606197c80924b&amp;source=podcast&amp;photo%5fid=44182901" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Software Technology Security</category>
            <category>virtualization</category>
        </item>
    </channel>
</rss>
