logo
episode-header-image
Aug 2024
36m 20s

D2DO249: The Anatomy of TLS 1.3 and Why ...

Packet Pushers
About this episode
Transport Layer Security (TLS) is today’s topic with guest Ed Harmoush. TLS plays a critical role in Internet security, and we dive into the differences between versions 1.2 and 1.3 In addition, Ed shares his journey into TLS, explains its components, and addresses common misconceptions about certificates and their validation processes. The episode also highlights... Read more »
Up next
Mar 11
D2DO296: Make Multi-Cloud and Hybrid Cloud Portability a Reality With FluidCloud (Sponsored)
FluidCloud calls itself a cloud-cloning platform. In other words, the company can map and copy all the cloud infrastructure settings from one public cloud—including compute, storage, networking, and identity—and port those settings to a different public cloud. On today’s sponsore ... Show More
43m 44s
Mar 4
D2DO295: Risks and Benefits of Putting AI in Production
Engineers and developers are using AI like never before, including in production. That has potential consequences, both good and bad, for uptime, operations, security and risk management, and more. Today’s guest, Rich Mogull, guides us through the decision-making process of addin ... Show More
45m 40s
Feb 18
D2DO294: AI in My Vuln Research Workflow
Kat Traxler, Principal Security Researcher at Vectra AI, returns to the podcast to discuss her AI-powered vulnerability research workflow. She explains how she uses two different AI models to act as the “blackboard” while she applies her expertise to triage AI-generated ideas to ... Show More
33m 54s
Recommended Episodes
Sep 2024
Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown
Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch ... Show More
1h 58m
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
<p>In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what i ... Show More
36m 29s
Aug 2022
Episode 109 - Verify and Verify Again
<p>Making sure our #VoiceFirst applications are written securely and use secure components is important. And when one of those components has a security bug, it is important that we update it as soon as we can. Mark highlights a recent security vulnerability in the node-forge mod ... Show More
16m 37s
Apr 2024
The role of Real Time Defense in Cloud Security
tail spinning
21m 35s
Nov 2023
Episode 46: The SAML Ramble
Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes ... Show More
43m 40s
Jan 2025
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris ... Show More
43m 23s