PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

PP097: How and Why to Turn the Browser into a...

Up next

PP099: The Care and Feeding of Kerberos for Windows Environments

Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerbero ...  Show more

PP098: What Goes On Inside a Firewall?

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the bi ...  Show more

Recommended Episodes

Re-Rolling Role Playing Games
Imaginary Worlds

The world of tabletop role-playing games is much broader than Dungeons & Dragons, and there’s been a boom of DIY tabletop RPGs in the last decade. But as new players are coming on to the scene, they’re asking new questions about what defines a game, and what might be problematic ...  Show more

Ask a Professional Scrum Trainer - Psychological Safety with Joanna Plaskonka
Scrum.org Community Podcast

In this episode of the Scrum.org Community Podcast, guest host Lindsay Velecina is joined by Professional Scrum Trainer Joanna Plaskonka to answer lingering questions from her recent webinar on psychological safety in Scrum Teams. Joanna shares practical insights on measuring ...

  Show more

The Cybersecurity Readiness Podcast Trailer
The Cybersecurity Readiness Podcast Series

Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level. Host Dr. Dave Chatterjee converses with subject ...  Show more

Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away
Afternoon Cyber Tea with Ann Johnson

Kevin Beaumont, a thought leader in the cybersecurity industry on incident detection and response, joins Ann to talk about the security trends that are peaking, plateauing, and plummeting. They trade insights on how organizations can examine the dynamics of an attack and effectiv ...  Show more