Josh and Kurt talk about how to report one security flaw
Category Archives: Podcast
Episode 246 – Door 21: Bug bounties
Josh and Kurt talk about bug bounties
Episode 245 – Door 20: Is SMS 2FA better than no 2FA?
Josh and Kurt talk about if SMS 2 factor auth is better than no 2FA Links Cyber deepfaked their host
Episode 244 – Door 19: TLS certificate trust
Josh and Kurt talk about modern TLS certificate trust
Episode 243 – Door 18: Don’t roll your own crypto or auth
Josh and Kurt talk about why it’s a horrible idea to roll your own crypto or auth
Episode 242 – Door 17: Vulnerability response
Josh and Kurt talk about vulnerability response. What is it, what does it mean, how does it work
Episode 241 – Door 16: 16 bits of change
Josh and Kurt talk about the switch from 16 to 32 to 64 bit and even the changes from Intel to ARM
Episode 240 – Door 15: Supplier compliance
Josh and Kurt talk about supplier compliance Links Annex A.15.1 of ISO 27001:2013 Episode 162 – SBOM with Allan Friedman
Episode 239 – Door 14: Backdoors
Josh and Kurt talk about backdoors in open source software
Episode 238 – Door 13: Unlucky or survivor bias?
Josh and Kurt talk about the unluckiest man in the world and survivor bias Links Unluckiest man in the world