PP099: The Care and Feeding of Kerberos for Windows Environments

PP099: The Care and Feeding of Kerberos for W...

Up next

PP098: What Goes On Inside a Firewall?

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the bi ...  Show more

PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We dis ...  Show more

Recommended Episodes

Re-Rolling Role Playing Games
Imaginary Worlds

The world of tabletop role-playing games is much broader than Dungeons & Dragons, and there’s been a boom of DIY tabletop RPGs in the last decade. But as new players are coming on to the scene, they’re asking new questions about what defines a game, and what might be problematic ...  Show more

Ask a Professional Scrum Trainer - Psychological Safety with Joanna Plaskonka
Scrum.org Community Podcast

In this episode of the Scrum.org Community Podcast, guest host Lindsay Velecina is joined by Professional Scrum Trainer Joanna Plaskonka to answer lingering questions from her recent webinar on psychological safety in Scrum Teams. Joanna shares practical insights on measuring ...

  Show more

The Cybersecurity Readiness Podcast Trailer
The Cybersecurity Readiness Podcast Series

Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level. Host Dr. Dave Chatterjee converses with subject ...  Show more

Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away
Afternoon Cyber Tea with Ann Johnson

Kevin Beaumont, a thought leader in the cybersecurity industry on incident detection and response, joins Ann to talk about the security trends that are peaking, plateauing, and plummeting. They trade insights on how organizations can examine the dynamics of an attack and effectiv ...  Show more