<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/security"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/security?tag=security&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4?source=podcast" type="video/mp4" length="79096815"/>
            <title>Master the Zero Trust Strategy for Improved Cybersecurity</title>
            <link>http://video.algosec.com/master-the-zero-trust-strategy-for</link>
            <description>&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/84210327</guid>
            <pubDate>Wed, 08 Mar 2023 17:01:07 GMT</pubDate>
            <media:title>Master the Zero Trust Strategy for Improved Cybersecurity</media:title>
            <media:description type="html">&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f244c9bfea16f9a9b492ce8a5122a148&amp;source=podcast&amp;photo%5fid=84210327" width="625" height="352" type="text/html" medium="video" duration="1180" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro-segmentatio</category>
            <category>micro-segmentation</category>
            <category>network managemen</category>
            <category>network management</category>
            <category>network securit</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4?source=podcast" type="video/mp4" length="108886012"/>
            <title>Zero Trust Framework for Network Security</title>
            <link>http://video.algosec.com/zero-trust-framework-for-network</link>
            <description>&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83004257</guid>
            <pubDate>Thu, 02 Feb 2023 10:11:27 GMT</pubDate>
            <media:title>Zero Trust Framework for Network Security</media:title>
            <media:description type="html">&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bfa44d66208c73afcdb215c88f01464d&amp;source=podcast&amp;photo%5fid=83004257" width="625" height="391" type="text/html" medium="video" duration="2681" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro segmentation</category>
            <category>micro-segmentation</category>
            <category>network management</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/video_medium/iac-connectivity-risk-analysis-video.mp4?source=podcast" type="video/mp4" length="6019704"/>
            <title>IaC Connectivity Risk Analysis: Identify risks from your pull requests</title>
            <link>http://video.algosec.com/iac-connectivity-risk-analysis</link>
            <description>&lt;p&gt;The AlgoSec cloud Infrastructure-as-Code (IaC) Connectivity Risk Analysis seamlessly integrates into your CI/CD pipeline, scanning code for vulnerabilities in GitHub or GitLab before cloud deployment. It offers developers instant risk assessments and remediation steps directly within their workflow, enhancing security without slowing down development. Learn how this feature streamlines secure code deployment in your cloud infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/iac-connectivity-risk-analysis"&gt;&lt;img src="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/75568163</guid>
            <pubDate>Thu, 15 Sep 2022 19:04:40 GMT</pubDate>
            <media:title>IaC Connectivity Risk Analysis: Identify risks from your pull requests</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec cloud Infrastructure-as-Code (IaC) Connectivity Risk Analysis seamlessly integrates into your CI/CD pipeline, scanning code for vulnerabilities in GitHub or GitLab before cloud deployment. It offers developers instant risk assessments and remediation steps directly within their workflow, enhancing security without slowing down development. Learn how this feature streamlines secure code deployment in your cloud infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/iac-connectivity-risk-analysis"&gt;&lt;img src="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f166fe59d12a6678a5a4ae58b36d3e16&amp;source=podcast&amp;photo%5fid=75568163" width="625" height="352" type="text/html" medium="video" duration="141" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/standard/download-29-thumbnail.jpg" width="75" height=""/>
            <category>cloud security</category>
            <category>demo</category>
            <category>devops</category>
            <category>DevSecOps</category>
            <category>IaC</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/video_medium/migrate-modernize-supercharging-video.mp4?source=podcast" type="video/mp4" length="68356794"/>
            <title>Migrate &amp; modernize: Supercharging your Cisco Nexus refresh with ACI </title>
            <link>http://video.algosec.com/migrate-modernize-supercharging</link>
            <description>&lt;p&gt;If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI.&lt;/p&gt;
&lt;p&gt;We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity!&lt;/p&gt;
&lt;p&gt;Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time.&lt;/p&gt;
&lt;p&gt;AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to:&lt;/p&gt;
&lt;p&gt;• Migrate your current Nexus flows to ACI using your preferred mode – network or application centric.&lt;br /&gt;&lt;br /&gt;
• Remove vulnerabilities caused by human error via automation of network change processes.&lt;br /&gt;&lt;br /&gt;
• Instantly identify and remediate risk and compliance violations.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migrate-modernize-supercharging"&gt;&lt;img src="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69536079</guid>
            <pubDate>Thu, 10 Jun 2021 22:27:12 GMT</pubDate>
            <media:title>Migrate &amp; modernize: Supercharging your Cisco Nexus refresh with ACI </media:title>
            <media:description type="html">&lt;p&gt;If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI.&lt;/p&gt;
&lt;p&gt;We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity!&lt;/p&gt;
&lt;p&gt;Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time.&lt;/p&gt;
&lt;p&gt;AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to:&lt;/p&gt;
&lt;p&gt;• Migrate your current Nexus flows to ACI using your preferred mode – network or application centric.&lt;br /&gt;&lt;br /&gt;
• Remove vulnerabilities caused by human error via automation of network change processes.&lt;br /&gt;&lt;br /&gt;
• Instantly identify and remediate risk and compliance violations.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migrate-modernize-supercharging"&gt;&lt;img src="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=140324964f1a31c47b5100a2c54f8d7d&amp;source=podcast&amp;photo%5fid=69536079" width="625" height="352" type="text/html" medium="video" duration="2522" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>change management</category>
            <category>cisco</category>
            <category>cisco aci app</category>
            <category>network security</category>
            <category>sdn</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/video_medium/modernize-your-network-and-harness-video.mp4?source=podcast" type="video/mp4" length="14721471"/>
            <title>Modernize your network and Harness the power of Nexus &amp; Cisco ACI with AlgoSec</title>
            <link>http://video.algosec.com/modernize-your-network-and-harness</link>
            <description>&lt;p&gt;Watch this short video and see how you can easily modernize your infrastructure with AlgoSec and upgrading your Cisco nexus switches to ACI&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/modernize-your-network-and-harness"&gt;&lt;img src="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68076664</guid>
            <pubDate>Tue, 06 Apr 2021 16:18:13 GMT</pubDate>
            <media:title>Modernize your network and Harness the power of Nexus &amp; Cisco ACI with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Watch this short video and see how you can easily modernize your infrastructure with AlgoSec and upgrading your Cisco nexus switches to ACI&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/modernize-your-network-and-harness"&gt;&lt;img src="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ef90e0c554cbc0046df6524c071f172c&amp;source=podcast&amp;photo%5fid=68076664" width="625" height="352" type="text/html" medium="video" duration="535" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>Change Management</category>
            <category>cisco</category>
            <category>network security</category>
            <category>sdn</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/video_medium/demo-algosec-incident-response-video.mp4?source=podcast" type="video/mp4" length="5304201"/>
            <title>Demo: AlgoSec Incident Response Extension for IBM Resilient</title>
            <link>http://video.algosec.com/demo-algosec-incident-response</link>
            <description>&lt;p&gt;&lt;p&gt;Resilient is an intelligent orchestration and
case management system that enables security teams to respond to security
incidents quickly and effectively.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosec-incident-response"&gt;&lt;img src="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181693</guid>
            <pubDate>Sun, 09 Dec 2018 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec Incident Response Extension for IBM Resilient</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Resilient is an intelligent orchestration and
case management system that enables security teams to respond to security
incidents quickly and effectively.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosec-incident-response"&gt;&lt;img src="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ab08e40eb5ce9c0c1465ae6c4f9de8b4&amp;source=podcast&amp;photo%5fid=44181693" width="625" height="469" type="text/html" medium="video" duration="285" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>algosec</category>
            <category>ibm</category>
            <category>managment</category>
            <category>network</category>
            <category>policy</category>
            <category>resilient</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/video_medium/lesson-5-the-challenges-of-east-video.mp4?source=podcast" type="video/mp4" length="13531854"/>
            <title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</title>
            <link>http://video.algosec.com/lesson-5-the-challenges-of-east</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182248</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=29825a33ac4f02b0fdd0df1d19c6aafc&amp;source=podcast&amp;photo%5fid=44182248" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4?source=podcast" type="video/mp4" length="24591521"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/video_medium/lesson-3-common-mistakes-and-best-video.mp4?source=podcast" type="video/mp4" length="21328766"/>
            <title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</title>
            <link>http://video.algosec.com/lesson-3-common-mistakes-and-best</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182303</guid>
            <pubDate>Thu, 26 Mar 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=01e5f51fd43db5def8186c84fe86ec65&amp;source=podcast&amp;photo%5fid=44182303" width="625" height="352" type="text/html" medium="video" duration="405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewalls</category>
            <category>network security</category>
            <category>network security zone</category>
            <category>network security zones</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security zone</category>
            <category>security zones</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/video_medium/lesson-4-data-center-segmentation-video.mp4?source=podcast" type="video/mp4" length="16927987"/>
            <title>Lesson 4: Data Center Segmentation Best Practices</title>
            <link>http://video.algosec.com/lesson-4-data-center-segmentation</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182229</guid>
            <pubDate>Wed, 28 Jan 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Data Center Segmentation Best Practices</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e7de21fde97412592b2fd22ec86e6e4a&amp;source=podcast&amp;photo%5fid=44182229" width="625" height="352" type="text/html" medium="video" duration="308" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4?source=podcast" type="video/mp4" length="6679131"/>
            <title>AlgoSec Overview: Managing Security Policies in Your Data Center</title>
            <link>http://video.algosec.com/algosec-overview-managing-security</link>
            <description>&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182317</guid>
            <pubDate>Wed, 29 Oct 2014 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Overview: Managing Security Policies in Your Data Center</media:title>
            <media:description type="html">&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c689444345c25371b1dc1dc245a12deb&amp;source=podcast&amp;photo%5fid=44182317" width="625" height="352" type="text/html" medium="video" duration="132" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec businessflor</category>
            <category>algosec fireflow</category>
            <category>AlgoSec Security Policy Management</category>
            <category>Audit and Compliance</category>
            <category>Data Center</category>
            <category>Datacenters</category>
            <category>firewall auditing</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security</category>
            <category>Security Policy</category>
            <category>virtual datacenter</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/video_medium/application-centric-vulnerability-video.mp4?source=podcast" type="video/mp4" length="7848940"/>
            <title>Application-Centric Vulnerability Management</title>
            <link>http://video.algosec.com/application-centric-vulnerability</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182367</guid>
            <pubDate>Mon, 17 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Application-Centric Vulnerability Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72365f6bd62eb3ef670bda01ab75deac&amp;source=podcast&amp;photo%5fid=44182367" width="625" height="469" type="text/html" medium="video" duration="139" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec</category>
            <category>application-centric vulnerability management</category>
            <category>application connectivity</category>
            <category>CVSS scores</category>
            <category>cyber security</category>
            <category>network security</category>
            <category>Qualys</category>
            <category>security</category>
            <category>security infrastructure</category>
            <category>vulnerabilities</category>
            <category>Vulnerability Management</category>
            <category>vulnerability scanner</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4?source=podcast" type="video/mp4" length="30751680"/>
            <title>Tips for Secure Decommissioning of Business Applications</title>
            <link>http://video.algosec.com/tips-for-secure-decommissioning-of</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182331</guid>
            <pubDate>Fri, 14 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips for Secure Decommissioning of Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d3adefaf0577207562515ea8e3018ec9&amp;source=podcast&amp;photo%5fid=44182331" width="625" height="352" type="text/html" medium="video" duration="499" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>applications</category>
            <category>decommission</category>
            <category>decommissioning</category>
            <category>firewall management</category>
            <category>firewall operations management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network operations</category>
            <category>Professor Wool</category>
            <category>secure</category>
            <category>security</category>
            <category>security change management</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4?source=podcast" type="video/mp4" length="17810477"/>
            <title>Examining the Need for Application-Centric Security Policy Management</title>
            <link>http://video.algosec.com/examining-the-need-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182409</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Examining the Need for Application-Centric Security Policy Management</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5f1d0c698cae1c93e39648727d821d53&amp;source=podcast&amp;photo%5fid=44182409" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>decommission application</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/video_medium/lesson-6-analyzing-routers-as-part-video.mp4?source=podcast" type="video/mp4" length="20495387"/>
            <title>Lesson 6: Analyzing Routers as Part of Your Security Policy</title>
            <link>http://video.algosec.com/lesson-6-analyzing-routers-as-part</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182766</guid>
            <pubDate>Tue, 25 Sep 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 6: Analyzing Routers as Part of Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f024d96dd0d23aa74a2f8fa6a4ac0c5&amp;source=podcast&amp;photo%5fid=44182766" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>access control lists</category>
            <category>ACLs</category>
            <category>Audit and Compliance</category>
            <category>fire wall change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>router ACLs</category>
            <category>routers</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4?source=podcast" type="video/mp4" length="30272598"/>
            <title>Lesson 2: Automating the Firewall Change Control Process</title>
            <link>http://video.algosec.com/lesson-2-automating-the-firewall</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182690</guid>
            <pubDate>Thu, 28 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Automating the Firewall Change Control Process</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da5caa63acf663010badf236bea69325&amp;source=podcast&amp;photo%5fid=44182690" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>automate firewall changes</category>
            <category>firewall change control</category>
            <category>firewall change workflow</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
    </channel>
</rss>
