PP068: Common Kubernetes Risks and What to Do About Them

PP068: Common Kubernetes Risks and What to Do...

Up next

PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We dis ...  Show more

PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy network, the popular Notepad++ ...  Show more

Recommended Episodes

Re-Rolling Role Playing Games
Imaginary Worlds

The world of tabletop role-playing games is much broader than Dungeons & Dragons, and there’s been a boom of DIY tabletop RPGs in the last decade. But as new players are coming on to the scene, they’re asking new questions about what defines a game, and what might be problematic ...  Show more

Ask a Professional Scrum Trainer - Psychological Safety with Joanna Plaskonka
Scrum.org Community Podcast

In this episode of the Scrum.org Community Podcast, guest host Lindsay Velecina is joined by Professional Scrum Trainer Joanna Plaskonka to answer lingering questions from her recent webinar on psychological safety in Scrum Teams. Joanna shares practical insights on measuring ...

  Show more

The Cybersecurity Readiness Podcast Trailer
The Cybersecurity Readiness Podcast Series

Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level. Host Dr. Dave Chatterjee converses with subject ...  Show more

Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away
Afternoon Cyber Tea with Ann Johnson

Kevin Beaumont, a thought leader in the cybersecurity industry on incident detection and response, joins Ann to talk about the security trends that are peaking, plateauing, and plummeting. They trade insights on how organizations can examine the dynamics of an attack and effectiv ...  Show more