Thanks for visiting The Cell Phone Junkie! I will be taking the time each week to discuss my favorite topic, cell phones. Any feedback is appreciated and welcome. You can email me at: questions (AT) thecellphonejunkie (DOT) com or call: 206-203-3734 Thanks and welcome!
…
continue reading
Indhold leveret af Ken Johnson and Seth Law, Ken Johnson, and Seth Law. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Ken Johnson and Seth Law, Ken Johnson, and Seth Law eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !
Gå offline med appen Player FM !
Episode 278 - Security Conferences, Testing Data in Git, Unforgivable Vulnerabilities
Manage episode 469689709 series 2371855
Indhold leveret af Ken Johnson and Seth Law, Ken Johnson, and Seth Law. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Ken Johnson and Seth Law, Ken Johnson, and Seth Law eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Seth and Ken return without a guest to discuss recent news, breaches, and research. Initial discussions around the purposes of the various security conferences and what is recommended for various professional levels. An article discussing recent customer data exposure by Zapier in git test data. Synthetic test data has been an issue for long time so not a surprising turn of events. Finally, thoughts on the definitions and classification of Unforgivable Vulnerabilities as proposed by the UK's National Cyber Security Centre.
…
continue reading
353 episoder
Manage episode 469689709 series 2371855
Indhold leveret af Ken Johnson and Seth Law, Ken Johnson, and Seth Law. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Ken Johnson and Seth Law, Ken Johnson, and Seth Law eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Seth and Ken return without a guest to discuss recent news, breaches, and research. Initial discussions around the purposes of the various security conferences and what is recommended for various professional levels. An article discussing recent customer data exposure by Zapier in git test data. Synthetic test data has been an issue for long time so not a surprising turn of events. Finally, thoughts on the definitions and classification of Unforgivable Vulnerabilities as proposed by the UK's National Cyber Security Centre.
…
continue reading
353 episoder
Alle episoder
×Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.