We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Cooking Us Security for the Modern macOS Fleet

00:00

Formal Metadata

Title
Cooking Us Security for the Modern macOS Fleet
Title of Series
Number of Parts
45
Author
License
CC Attribution - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The risks faced by corporate IT teams have been rapidly changing in recent years, causing us to forego many of our previous assumptions about security, perimeters, and endpoint management in particular. To lay a foundation, we will discuss our assessment of the organization's corporate IT attack surface, as well as our corporate IT threat model and technology stack. We will delve into the processes and technologies we rely on to mitigate these known and unknown risks, with a focus on how we are utilizing Chef for securing our macOS-based fleet.
Information securityAdaptive behaviorProcess modelingEnterprise architecturePower (physics)Control flowAxiom of choiceService (economics)Point cloudBoundary value problemFeasibility studyMathematicsOrder (biology)Self-organizationSheaf (mathematics)Right angleData recoveryWave packetService (economics)Form (programming)AreaAdaptive behaviorLaptopContext awarenessStack (abstract data type)Game controllerEnterprise architectureServer (computing)Multiplication signBoundary value problemIntegrated development environmentAxiom of choiceType theoryInformation securityDifferent (Kate Ryan album)Cloud computingScripting languageDependent and independent variablesMereologyOpen sourceComputer programmingPlastikkarteNumberAsynchronous Transfer ModeSpacetimeAnalytic setComputer configurationProcess modelingCellular automatonBit rateHypermediaPower (physics)MathematicsChemical equationInternetworkingTerm (mathematics)Heegaard splittingCASE <Informatik>Point (geometry)Water vaporJSONXMLUMLComputer animation
MathematicsControl flowGUI widgetInformation securityRing (mathematics)SurfaceProcess modelingUsabilityAdaptive behaviorBoundary value problemDiscounts and allowancesAxiom of choiceCorporate NetworkGraphical user interfaceQuery languageExtension (kinesiology)Configuration spacePoint cloudEnterprise architectureVirtuelles privates NetzwerkProduct (business)Integrated development environmentComputer networkLaptopComputer hardwareOffice suiteRouter (computing)AnalogyForm (programming)Graph (mathematics)ConcentricSystem callDiagramSpacetimeGame controllerBoundary value problemInternetworkingData managementElement (mathematics)PhysicalismData centerCloud computingDependent and independent variablesIntegrated development environmentPoint (geometry)Data miningScripting languageSeries (mathematics)Different (Kate Ryan album)Point cloudFlow separationSurfaceConfiguration spaceProcess modelingBlock (periodic table)Ring (mathematics)BuildingOrder (biology)SoftwareProduct (business)Service (economics)Functional (mathematics)Interface (computing)Axiom of choiceDiscounts and allowancesInformation securityPerturbation theoryFocus (optics)AreaGoodness of fitMechanism designComputer programmingPosition operatorMoving averageReading (process)Field (computer science)Arithmetic meanMultiplication signCovering spaceSheaf (mathematics)ArmBitFigurate numberMereologyFacebookLattice (order)Computer fontCategory of beingOperator (mathematics)Mobile appForcing (mathematics)
Graphical user interfaceExtension (kinesiology)Configuration spaceBoundary value problemProduct (business)Virtuelles privates NetzwerkEnterprise architecturePoint cloudCorporate NetworkIntegrated development environmentInformation securityStack (abstract data type)Query languageDiscounts and allowancesProcess modelingAdaptive behaviorServer (computing)Computer-generated imageryVideo gameVertex (graph theory)Latent heatPhysical systemBlogMultiplicationTelecommunicationInformation securityPoint (geometry)Bootstrap aggregatingElement (mathematics)Virtual machineMathematicsBitConfiguration spaceShift operatorOperator (mathematics)NumberCartesian coordinate systemAdditionServer (computing)Constraint (mathematics)Direct numerical simulationSymbol tableSoftwareOnline helpSurfaceGame controllerRevision controlEnterprise architectureDistribution (mathematics)Product (business)Functional (mathematics)Instance (computer science)SpacetimeAntivirus softwareMultiplication signData managementLaptopMixture modelProcess modelingLevel (video gaming)Field (computer science)Configuration managementVideo gamePhysical systemOffice suiteCycle (graph theory)outputLoginIntegrated development environmentWindowWeightFlow separationPublic key certificateVector spaceInternetworkingIncidence algebraContext awarenessDifferent (Kate Ryan album)Boiling pointForestRegulator geneElectronic mailing listGoodness of fitForm (programming)Virtuelles privates NetzwerkGroup actionMereologyAuthenticationNational Institute of Standards and TechnologyMobile appInstallation artInheritance (object-oriented programming)MultiplicationComputer animation
MultiplicationServer (computing)TelecommunicationInformation securityCore dumpWritingAerodynamicsSource codeOrder (biology)LaptopComputer fileMereologyMultiplication signConfiguration spaceStructural loadMappingDesign by contractLevel (video gaming)Flow separationSoftware maintenanceFile formatGradient descentControl flowFrequencyElectronic mailing listSoftware frameworkEvent horizonQuicksortExtension (kinesiology)Information securityWritingPoint (geometry)HypermediaBitDifferent (Kate Ryan album)WindowProcess modelingAdditionMacOS XSet (mathematics)Natural numberWeb portalOpen sourceProjective planeShared memoryStandard deviationMathematicsColor confinementGroup actionPhysical systemGame controllerLibrary (computing)Video gameTerm (mathematics)Matrix (mathematics)Type theoryCausalityOcean currentMaxima and minima1 (number)Core dumpVirtual machineOnline helpContent (media)Computer animation
Software testingMereologyFile systemAntivirus softwareBitProfil (magazine)Cross-platformOpen sourceConfiguration spaceDecision theoryComputer fileSoftwareLaptopTouchscreenProcess modelingEnterprise architectureDescriptive statisticsQuery languageGame controllerType theoryBit rateProduct (business)Block (periodic table)1 (number)Core dumpInformation securityINTEGRALDirectory serviceLocal ringOpen setProjective planeSoftware bugWeb browserWeightMathematicsSpacetimeCuboidMultiplication signCartesian coordinate systemInstance (computer science)Installation art2 (number)Scripting languagePredictabilityElectronic mailing listControl flowDigitizingString (computer science)outputFreezingRight angleWordError messageBuffer solutionLecture/Conference
System administratorMultiplication signCodeSoftware testingOffice suiteMoment (mathematics)Different (Kate Ryan album)LaptopQuicksortOpen sourceVirtuelles privates NetzwerkProcess modelingConfiguration spaceTransport Layer SecurityPublic key certificateOperator (mathematics)Type theoryAutomationTerm (mathematics)LoginWeb 2.0PasswordTouchscreenComplex (psychology)Set (mathematics)Bus (computing)DivisorChannel capacityBenchmarkDecision theoryInstance (computer science)Latent heatServer (computing)Integrated development environmentProduct (business)Boss CorporationPoint (geometry)WordPlanningMereologyLine (geometry)Theory of relativityFood energyLevel (video gaming)Sampling (statistics)Object (grammar)Domain nameLecture/Conference
JSONXML
Transcript: English(auto-generated)