logo
episode-header-image
Aug 2024
36m 20s

D2DO249: The Anatomy of TLS 1.3 and Why ...

Packet Pushers
About this episode
Transport Layer Security (TLS) is today’s topic with guest Ed Harmoush. TLS plays a critical role in Internet security, and we dive into the differences between versions 1.2 and 1.3 In addition, Ed shares his journey into TLS, explains its components, and addresses common misconceptions about certificates and their validation processes. The episode also highlights... Read more »
Up next
Nov 19
D2DO287: Leveling Up in Data Science
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get u ... Show More
37m 51s
Nov 5
D2DO286: Scaling Kubernetes Across Clouds – Identity, DNS, and Security
If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolution ... Show More
40m 39s
Oct 22
D2DO285: The Death of IaC Has Been Greatly Exaggerated
While declaring the death of Infrastructure as Code (IaC) or Terraform may get you clicks on LinkedIn, IaC is alive and kicking. On today’s Day Two DevOps we talk about why IaC still matters. Guest Malcolm Matalka argues that IaC provides the tools and a model for managing infras ... Show More
39m 52s
Recommended Episodes
Sep 2024
Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown
Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch ... Show More
1h 58m
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
<p>In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what i ... Show More
36m 29s
Aug 8
Cybersecurity Alerts: Black Hat Exposes AI and Firmware Vulnerabilities
In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistant ... Show More
11m 54s
Apr 2024
The role of Real Time Defense in Cloud Security
<p>In this episode from KubeCon Paris 2024, we spoke to <a href="https://www.linkedin.com/in/degio/" target="_blank" rel="noopener noreferer">Loris Degioanni,</a> Co-Founder and CTO of <a href="https://sysdig.com/" target="_blank" rel="noopener noreferer">Sysdig</a> about Open So ... Show More
21m 35s
Nov 2023
Episode 46: The SAML Ramble
Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes ... Show More
43m 40s
Jan 2025
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris ... Show More
43m 23s
Dec 2024
Tech Bytes: Protecting OT/IoT Devices With FortiLink NAC (Sponsored)
Today on the Tech Bytes podcast, sponsored by Fortinet, we talk about IoT and OT risks and how to mitigate them. One option from Fortinet is FortiLink NAC, a free feature that can help you segment and protect IoT and OT devices and can even help deploy virtual patches. Another op ... Show More
18m 49s