Evan Gilman and Doug Barth, authors of Zero-Trust Networks: building secure systems in untrusted networks discuss zero-trust networks. The discussion covers: the perimeter network architecture; the threat model in modern networks; the meaning of...
Neil Madden, author of the API Security in Action book and Security Director of ForgeRock, discusses the key technical features of securing an API. Host Gavin Henry spoke with Madden about API versus Web App security, choice of authentication...
Joshua Davies, author of Implementing SSL / TLS Using Cryptography and PKI discussed SSL/TLS, public-key infrastructure, certificate authorities, and vulnerabilities in the security infrastructure. Robert Blumen spoke with Davies about the history...
Jean-Denis Greze of Plaid discusses Engineering Maturity and its importance in maintaining velocity while growing an engineering team grows. Where engineering managers have not experienced rapid growth, related problems can grow out of hand. Host...
Michael Hausenblas talks with host Kim Carter about topics covered in Michael’s ebook Container Networking, such as single vs. multi-host container networking, orchestration, Kubernetes, service discovery, and many more. Michael and Kim also discuss...
Natalie Silvanovich from Google Project Zero talks with Kim Carter about what attack surface is in regards to software, how to identify risks and reduce the attack surface of the software you as a Software Engineer are creating. Natalie found over...
Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption (E2EE), backdoors, the scenarios where E2EE can be and should be used. IM, Voice over IP, Email scenarios, as well as interservice...
Founder of Summit Route / creator of FLAWS, Scott Piper talks with Kim Carter about Cloud Security. Covering the often misunderstood Shared Responsibility Model. Kim and Scott discuss how our assets have changed, and what the risks and...
Edaena Salinas talks with Sachin Gadre about the internet of things (IoT). What is IoT? What is the architecture of an IoT application? Sachin walks through a series of example to show how IoT applications are used and how they are built. Topics...
Armon Dadgar speaks to Matthew Farwell about Secrets Management. The show covers: what a secret is; the difference between secrets and sensitive data; what is secrets management; the different types of secrets; key management; auditing of secrets;...