Player FM - Internet Radio Done Right
62 subscribers
Checked 1h ago
تمت الإضافة منذ قبل eight عام
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency
Manage episode 461120470 series 1402332
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »
…
continue reading
1685 حلقات
Manage episode 461120470 series 1402332
المحتوى المقدم من Packet Pushers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Packet Pushers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »
…
continue reading
1685 حلقات
كل الحلقات
×![Artwork](/static/images/128pixel.png)
1 N4N013: Spanning Tree Part 1 – An Introduction and Broadcast Storms 52:33
52:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب52:33![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NAN085: Embrace Change to Thrive in the Tech Industry 59:54
59:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب59:54![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »…
![Artwork](/static/images/128pixel.png)
1 PP049: CSMM – A Practical Model for Improving Your Cloud Security 42:55
42:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب42:55![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HS094: How Risky Is Your Organization’s AI Strategy? 24:36
24:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:36![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NB513: UK Demands Apple Backdoor; AI Spending: Can’t Stop, Won’t Stop 39:15
39:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:15![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »…
![Artwork](/static/images/128pixel.png)
1 Tech Bytes: When the Internet Is Your Network, Catchpoint IPM Provides Critical Visibility (Sponsored) 16:24
16:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب16:24![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HN767: Effective Networking on the Cheap 1:09:58
1:09:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:09:58![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »…
![Artwork](/static/images/128pixel.png)
1 TNO015: Revolutionizing Telecom with NetOps Automation and Collaboration 1:00:07
1:00:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:00:07![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »…
![Artwork](/static/images/128pixel.png)
1 IPB168: Deploying IPv6-Only Wi-Fi at the SC24 Conference 34:22
34:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب34:22![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help ... Read more »…
![Artwork](/static/images/128pixel.png)
1 N4N012: Russ White On Why We Need Network Models 49:21
49:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب49:21![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered ... Read more »…
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »…
![Artwork](/static/images/128pixel.png)
1 PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More 39:08
39:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:08![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HW045: A Comprehensive Guide to Wi-Fi Explorer Pro 3: Features, Insights, and More! 27:17
27:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:17![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of ... Read more »…
![Artwork](/static/images/128pixel.png)
1 NB512: US Objects to HPE-Juniper Wedding; Cheeky DeepSeek Freaks VCs 29:55
29:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:55![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets ... Read more »…
![Artwork](/static/images/128pixel.png)
1 HN 766: Ensuring QoE for Agentic AI With Broadcom VeloRAIN (Sponsored) 55:06
55:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب55:06![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject ... Read more »…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.