<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/security management"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/security management?tag=security+management&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4?source=podcast" type="video/mp4" length="79096815"/>
            <title>Master the Zero Trust Strategy for Improved Cybersecurity</title>
            <link>http://video.algosec.com/master-the-zero-trust-strategy-for</link>
            <description>&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/84210327</guid>
            <pubDate>Wed, 08 Mar 2023 17:01:07 GMT</pubDate>
            <media:title>Master the Zero Trust Strategy for Improved Cybersecurity</media:title>
            <media:description type="html">&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f244c9bfea16f9a9b492ce8a5122a148&amp;source=podcast&amp;photo%5fid=84210327" width="625" height="352" type="text/html" medium="video" duration="1180" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro-segmentatio</category>
            <category>micro-segmentation</category>
            <category>network managemen</category>
            <category>network management</category>
            <category>network securit</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4?source=podcast" type="video/mp4" length="108886012"/>
            <title>Zero Trust Framework for Network Security</title>
            <link>http://video.algosec.com/zero-trust-framework-for-network</link>
            <description>&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83004257</guid>
            <pubDate>Thu, 02 Feb 2023 10:11:27 GMT</pubDate>
            <media:title>Zero Trust Framework for Network Security</media:title>
            <media:description type="html">&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bfa44d66208c73afcdb215c88f01464d&amp;source=podcast&amp;photo%5fid=83004257" width="625" height="391" type="text/html" medium="video" duration="2681" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro segmentation</category>
            <category>micro-segmentation</category>
            <category>network management</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/video_medium/measures-that-actually-do-reduce-2-video.mp4?source=podcast" type="video/mp4" length="196437253"/>
            <title>Measures that actually Do reduce your hacking risks</title>
            <link>http://video.algosec.com/measures-that-actually-do-reduce-2</link>
            <description>&lt;p&gt;Robert Bigman, former CISO of the CIA offers tried and proven hacking risk measures that are "must haves" in any organization's cybersecurity toolkit. To see how these can apply to securing the connectivity of your critical business applications, please visit&amp;nbsp;&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/measures-that-actually-do-reduce-2"&gt;&lt;img src="http://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/75737381</guid>
            <pubDate>Tue, 10 May 2022 14:14:53 GMT</pubDate>
            <media:title>Measures that actually Do reduce your hacking risks</media:title>
            <media:description type="html">&lt;p&gt;Robert Bigman, former CISO of the CIA offers tried and proven hacking risk measures that are "must haves" in any organization's cybersecurity toolkit. To see how these can apply to securing the connectivity of your critical business applications, please visit&amp;nbsp;&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/measures-that-actually-do-reduce-2"&gt;&lt;img src="http://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a81dbf8f5c3fe5ce347c1f1ee183bd81&amp;source=podcast&amp;photo%5fid=75737381" width="625" height="352" type="text/html" medium="video" duration="2550" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>cyber security</category>
            <category>gated</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4?source=podcast" type="video/mp4" length="46819234"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/video_medium/the-6-best-practices-to-stay-secure-video.mp4?source=podcast" type="video/mp4" length="46529949"/>
            <title>The 6 best practices to stay secure in the hybrid cloud</title>
            <link>http://video.algosec.com/the-6-best-practices-to-stay-secure</link>
            <description>&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68518614</guid>
            <pubDate>Sun, 02 May 2021 16:13:13 GMT</pubDate>
            <media:title>The 6 best practices to stay secure in the hybrid cloud</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=629c798b0006a3bc66c9e695b31bf6bc&amp;source=podcast&amp;photo%5fid=68518614" width="625" height="352" type="text/html" medium="video" duration="2100" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>cyber security</category>
            <category>firewall management</category>
            <category>security management</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/video_medium/algosec-api-swagger-video.mp4?source=podcast" type="video/mp4" length="2087308"/>
            <title>AlgoSec API Swagger</title>
            <link>http://video.algosec.com/algosec-api-swagger</link>
            <description>&lt;p&gt;On premise and in the cloud, AlgoSec simplifies and automates network security policy management to make your enterprise more agile, more secure and more compliant – all the time.&lt;br&gt;The AlgoSec platform&amp;nbsp;provides a set of Swagger API documentation, available right from the platform itself.&amp;nbsp;
&lt;p&gt;Swagger enables you to execute API request calls and access lists of requested parameters.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-api-swagger"&gt;&lt;img src="http://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/standard/download-4-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64561980</guid>
            <pubDate>Thu, 01 Oct 2020 14:24:56 GMT</pubDate>
            <media:title>AlgoSec API Swagger</media:title>
            <media:description type="html">&lt;p&gt;On premise and in the cloud, AlgoSec simplifies and automates network security policy management to make your enterprise more agile, more secure and more compliant – all the time.&lt;br&gt;The AlgoSec platform&amp;nbsp;provides a set of Swagger API documentation, available right from the platform itself.&amp;nbsp;
&lt;p&gt;Swagger enables you to execute API request calls and access lists of requested parameters.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-api-swagger"&gt;&lt;img src="http://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/standard/download-4-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=25dc98b38a36710af6136fe6c29bb24b&amp;source=podcast&amp;photo%5fid=64561980" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/standard/download-4-thumbnail.jpg" width="75" height=""/>
            <category>API</category>
            <category>REST</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4?source=podcast" type="video/mp4" length="74582768"/>
            <title>Firewall Rule Recertification with Application Connectivity</title>
            <link>http://video.algosec.com/firewall-rule-recertification-with</link>
            <description>&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/51313899</guid>
            <pubDate>Mon, 29 Apr 2019 11:39:25 GMT</pubDate>
            <media:title>Firewall Rule Recertification with Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=28b03ebf89a04b04bfe7ccebae9cb7f5&amp;source=podcast&amp;photo%5fid=51313899" width="625" height="352" type="text/html" medium="video" duration="1197" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/>
            <category> Compliance</category>
            <category> Connectivity</category>
            <category> Cyber Security</category>
            <category> firewall management</category>
            <category> firewall rule recertification</category>
            <category>Firewalls</category>
            <category> Network Security</category>
            <category> Security Management</category>
            <category> security policy</category>
            <category> security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/video_medium/boosting-network-security-with-video.mp4?source=podcast" type="video/mp4" length="55910015"/>
            <title>Boosting Network Security with ChatOps</title>
            <link>http://video.algosec.com/boosting-network-security-with</link>
            <description>&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&lt;/b&gt;&amp;nbsp; | Apr 17 2019&lt;br&gt;&lt;br&gt;
The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.
&lt;p&gt;Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.&lt;/p&gt;
In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Shorten resolution time of critical security incidents&lt;/li&gt;&lt;li&gt;Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams&lt;/li&gt;&lt;li&gt;Ensure ongoing security and compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/boosting-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/50970008</guid>
            <pubDate>Thu, 25 Apr 2019 12:30:30 GMT</pubDate>
            <media:title>Boosting Network Security with ChatOps</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&lt;/b&gt;&amp;nbsp; | Apr 17 2019&lt;br&gt;&lt;br&gt;
The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.
&lt;p&gt;Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.&lt;/p&gt;
In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Shorten resolution time of critical security incidents&lt;/li&gt;&lt;li&gt;Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams&lt;/li&gt;&lt;li&gt;Ensure ongoing security and compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/boosting-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a28b16cd51ce9081093b2ef5a096fae3&amp;source=podcast&amp;photo%5fid=50970008" width="625" height="352" type="text/html" medium="video" duration="1786" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Bots</category>
            <category>ChatOps</category>
            <category>Cyber Security</category>
            <category>DevOps</category>
            <category>IT Security</category>
            <category>Network Management</category>
            <category>Network Security</category>
            <category>Security Management</category>
            <category>security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/27288170/43950798/e1d2f3d8e6ad63fbb719aee4fb7c4769/standard/download-2-thumbnail.jpg" type="image/jpeg" length="32809"/>
            <title>Kuppingercole Analysts: Driving Agility and Reducing Cyber Risks with...</title>
            <link>http://video.algosec.com/kuppingercole-analysts-driving</link>
            <description>&lt;p&gt;Joint Analyst webinar with Alexei Balaganski, Lead Analyst at KuppingerCole&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/kuppingercole-analysts-driving"&gt;&lt;img src="http://video.algosec.com/27288170/43950798/e1d2f3d8e6ad63fbb719aee4fb7c4769/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/43950798</guid>
            <pubDate>Wed, 06 Feb 2019 14:11:25 GMT</pubDate>
            <media:title>Kuppingercole Analysts: Driving Agility and Reducing Cyber Risks with...</media:title>
            <media:description type="html">&lt;p&gt;Joint Analyst webinar with Alexei Balaganski, Lead Analyst at KuppingerCole&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/kuppingercole-analysts-driving"&gt;&lt;img src="http://video.algosec.com/27288170/43950798/e1d2f3d8e6ad63fbb719aee4fb7c4769/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e1d2f3d8e6ad63fbb719aee4fb7c4769&amp;source=podcast&amp;photo%5fid=43950798" width="625" height="352" type="text/html" medium="video" duration="3571" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/27288170/43950798/e1d2f3d8e6ad63fbb719aee4fb7c4769/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Kuppingercole analyst</category>
            <category>Security Management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4?source=podcast" type="video/mp4" length="15245868"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4?source=podcast" type="video/mp4" length="14040752"/>
            <title>How to Integrate Security into the Test Environment</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the-1</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181992</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the Test Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=530e283f33821556fb69c84052c07c98&amp;source=podcast&amp;photo%5fid=44181992" width="625" height="352" type="text/html" medium="video" duration="292" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4?source=podcast" type="video/mp4" length="24919436"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4?source=podcast" type="video/mp4" length="16789600"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4?source=podcast" type="video/mp4" length="12747509"/>
            <title>Demo: AlgoSec's Cisco ACI App Center</title>
            <link>http://video.algosec.com/demo-algosecs-cisco-aci-app-center</link>
            <description>&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181981</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec's Cisco ACI App Center</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd6ffbb3cb4ab2fd653726f5bec24c85&amp;source=podcast&amp;photo%5fid=44181981" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>ACI Fabric</category>
            <category>AlgoSec Cisco ACI App</category>
            <category>Audit and Compliance</category>
            <category>cisco</category>
            <category>Cisco ACI App</category>
            <category>epgs</category>
            <category>Firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/video_medium/lesson-1-how-to-bring-business-video.mp4?source=podcast" type="video/mp4" length="17546952"/>
            <title>Lesson 1: How to Bring Business Context into Incident Response</title>
            <link>http://video.algosec.com/lesson-1-how-to-bring-business</link>
            <description>&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 1&lt;/p&gt;
&lt;p&gt;SIEM solutions collect and analyze logs generated by the technology infrastructure, security systems and business applications. The Security Operations Center (SOC) team uses this information to identify and flag suspicious activity for further investigation. In this lesson, Professor Wool explains why it’s important to connect the information collected by the SIEM with other databases that provide information on application connectivity, in order to make informed decisions on the level of risk to the business, and the steps the SOC needs to take to neutralize the attack.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-bring-business"&gt;&lt;img src="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182073</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Bring Business Context into Incident Response</media:title>
            <media:description type="html">&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 1&lt;/p&gt;
&lt;p&gt;SIEM solutions collect and analyze logs generated by the technology infrastructure, security systems and business applications. The Security Operations Center (SOC) team uses this information to identify and flag suspicious activity for further investigation. In this lesson, Professor Wool explains why it’s important to connect the information collected by the SIEM with other databases that provide information on application connectivity, in order to make informed decisions on the level of risk to the business, and the steps the SOC needs to take to neutralize the attack.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-bring-business"&gt;&lt;img src="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a56a7b4cd02011edfe60a8dc31f51281&amp;source=podcast&amp;photo%5fid=44182073" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyberattack</category>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>incident resonse</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Incident and Event Magement</category>
            <category>security management</category>
            <category>siem</category>
            <category>splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/video_medium/lesson-2-bringing-reachability-video.mp4?source=podcast" type="video/mp4" length="17727360"/>
            <title>Lesson 2: Bringing Reachability Analysis into Incident Response</title>
            <link>http://video.algosec.com/lesson-2-bringing-reachability</link>
            <description>&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182021</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 2: Bringing Reachability Analysis into Incident Response</media:title>
            <media:description type="html">&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0d85fa329b1dfbdd446266c8b43a5f3&amp;source=podcast&amp;photo%5fid=44182021" width="625" height="352" type="text/html" medium="video" duration="336" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyberattack</category>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>incident response</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security incident and event management</category>
            <category>security management</category>
            <category>security policy</category>
            <category>siem</category>
            <category>splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="6902436"/>
            <title>AlgoSec Splunk App for Incident Response</title>
            <link>http://video.algosec.com/algosec-splunk-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182052</guid>
            <pubDate>Mon, 28 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Splunk App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0c4d10edf34317e11d28581651e31def&amp;source=podcast&amp;photo%5fid=44182052" width="625" height="352" type="text/html" medium="video" duration="214" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security information and event management</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>SIEM</category>
            <category>Splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/video_medium/best-practices-for-incorporating-video.mp4?source=podcast" type="video/mp4" length="22799886"/>
            <title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</title>
            <link>http://video.algosec.com/best-practices-for-incorporating</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182114</guid>
            <pubDate>Wed, 16 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c49b17648815f3daa2a78afe31fd3ad6&amp;source=podcast&amp;photo%5fid=44182114" width="625" height="352" type="text/html" medium="video" duration="387" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4?source=podcast" type="video/mp4" length="8871061"/>
            <title>Cisco ACI and AlgoSec Integration (Overview and Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration-1</link>
            <description>&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182087</guid>
            <pubDate>Mon, 31 Oct 2016 02:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</media:title>
            <media:description type="html">&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dcd1a526c8336ca642a67e763c8639bd&amp;source=podcast&amp;photo%5fid=44182087" width="625" height="352" type="text/html" medium="video" duration="458" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4?source=podcast" type="video/mp4" length="17536828"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="16089357"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="17164651"/>
            <title>Lesson 12: Managing Your Security Policy for Disaster Recovery</title>
            <link>http://video.algosec.com/lesson-12-managing-your-security</link>
            <description>&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182154</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ab2e958faa7e5fa8581da3380b0a834&amp;source=podcast&amp;photo%5fid=44182154" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Disaster Recovery</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/video_medium/lesson-5-the-challenges-of-east-video.mp4?source=podcast" type="video/mp4" length="13531854"/>
            <title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</title>
            <link>http://video.algosec.com/lesson-5-the-challenges-of-east</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182248</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=29825a33ac4f02b0fdd0df1d19c6aafc&amp;source=podcast&amp;photo%5fid=44182248" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4?source=podcast" type="video/mp4" length="24591521"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/video_medium/lesson-3-common-mistakes-and-best-video.mp4?source=podcast" type="video/mp4" length="21328766"/>
            <title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</title>
            <link>http://video.algosec.com/lesson-3-common-mistakes-and-best</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182303</guid>
            <pubDate>Thu, 26 Mar 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=01e5f51fd43db5def8186c84fe86ec65&amp;source=podcast&amp;photo%5fid=44182303" width="625" height="352" type="text/html" medium="video" duration="405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewalls</category>
            <category>network security</category>
            <category>network security zone</category>
            <category>network security zones</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security zone</category>
            <category>security zones</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/video_medium/lesson-4-data-center-segmentation-video.mp4?source=podcast" type="video/mp4" length="16927987"/>
            <title>Lesson 4: Data Center Segmentation Best Practices</title>
            <link>http://video.algosec.com/lesson-4-data-center-segmentation</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182229</guid>
            <pubDate>Wed, 28 Jan 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Data Center Segmentation Best Practices</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e7de21fde97412592b2fd22ec86e6e4a&amp;source=podcast&amp;photo%5fid=44182229" width="625" height="352" type="text/html" medium="video" duration="308" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4?source=podcast" type="video/mp4" length="30751680"/>
            <title>Tips for Secure Decommissioning of Business Applications</title>
            <link>http://video.algosec.com/tips-for-secure-decommissioning-of</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182331</guid>
            <pubDate>Fri, 14 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips for Secure Decommissioning of Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d3adefaf0577207562515ea8e3018ec9&amp;source=podcast&amp;photo%5fid=44182331" width="625" height="352" type="text/html" medium="video" duration="499" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>applications</category>
            <category>decommission</category>
            <category>decommissioning</category>
            <category>firewall management</category>
            <category>firewall operations management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network operations</category>
            <category>Professor Wool</category>
            <category>secure</category>
            <category>security</category>
            <category>security change management</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4?source=podcast" type="video/mp4" length="17810477"/>
            <title>Examining the Need for Application-Centric Security Policy Management</title>
            <link>http://video.algosec.com/examining-the-need-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182409</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Examining the Need for Application-Centric Security Policy Management</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5f1d0c698cae1c93e39648727d821d53&amp;source=podcast&amp;photo%5fid=44182409" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>decommission application</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/video_medium/lesson-10-tips-to-simplify-video.mp4?source=podcast" type="video/mp4" length="17136234"/>
            <title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</title>
            <link>http://video.algosec.com/lesson-10-tips-to-simplify</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182380</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e32f091cc2c3304f4ce552d35b7a0ccc&amp;source=podcast&amp;photo%5fid=44182380" width="625" height="352" type="text/html" medium="video" duration="293" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>business applications</category>
            <category>cloud migration</category>
            <category>data center</category>
            <category>data center application</category>
            <category>data center consolidation</category>
            <category>datacenter consolidation</category>
            <category>data center migration</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>physical data center</category>
            <category>private cloud</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/video_medium/lesson-7-examining-the-challenges-video.mp4?source=podcast" type="video/mp4" length="40171738"/>
            <title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</title>
            <link>http://video.algosec.com/lesson-7-examining-the-challenges</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182374</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=11f3ec0bd4c2c56ab1b60ec291133dd3&amp;source=podcast&amp;photo%5fid=44182374" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>Firewalls</category>
            <category>HSRP</category>
            <category>network routing</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>routing</category>
            <category>security management</category>
            <category>SNMP</category>
            <category>SSH</category>
            <category>VRPP</category>
        </item>
    </channel>
</rss>
