logo
episode-header-image
Aug 2024
36m 20s

D2DO249: The Anatomy of TLS 1.3 and Why ...

Packet Pushers
About this episode
Transport Layer Security (TLS) is today’s topic with guest Ed Harmoush. TLS plays a critical role in Internet security, and we dive into the differences between versions 1.2 and 1.3 In addition, Ed shares his journey into TLS, explains its components, and addresses common misconceptions about certificates and their validation processes. The episode also highlights... Read more »
Up next
Yesterday
D2DO301: Actually Implementing AI
Kyler and Ned are joined by Enrico Teotti, an independent consultant with over 25 years of experience. Enrico has worked with clients on real-world AI implementations, and he’s here talk about what he’s learned, including using AI to query databases, and for debugging and perform ... Show More
46m 53s
Apr 15
D2DO300: Open Source Malware!
Malware has shifted from phishing expeditions to open source packages, domains, and repositories. Ned and Kyler welcome Jenn Gile, co-founder of Open Source Malware, to discuss how malware is making its way into open source software. Together they break down NPM compromises, AI-d ... Show More
41m 13s
Apr 1
D2DO299: The State of Platform Engineering and DevEx
Ned and Kyler discuss the state of platform engineering, DevEx, and how AI is affecting choices in those domains with guest Annem Shah. They discuss how AI can help bridge the gap between initial setup and continuous operations by providing feedback and interpreting complex error ... Show More
43m 28s
Recommended Episodes
Sep 2024
Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown
Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch ... Show More
1h 58m
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
<p>In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what i ... Show More
36m 29s
Aug 2022
Episode 109 - Verify and Verify Again
<p>Making sure our #VoiceFirst applications are written securely and use secure components is important. And when one of those components has a security bug, it is important that we update it as soon as we can. Mark highlights a recent security vulnerability in the node-forge mod ... Show More
16m 37s
Apr 2024
The role of Real Time Defense in Cloud Security
tail spinning
21m 35s
Nov 2023
Episode 46: The SAML Ramble
Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes ... Show More
43m 40s
Jan 2025
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris ... Show More
43m 23s