Mozilla chose to follow Google Chrome in deprecating the Entrust trusted roots. Join Tim Callan and Jason Soroko in this episode of Root Causes Podcast where they give you the details and explain why this action matters. Listen at Sectigo here: https://lnkd.in/eYrGBDnF #digitaltrust #digitalsecurity #clm #ca #sectigo
Sectigo’s Post
More Relevant Posts
-
Improving SemVer compliance is better for everyone: - As a user, I don't want my dependencies to break my code. - As a maintainer, I don't want to break my users. - As a community member, I want maintainers to be able to focus on shipping new features. They are already short on time, and I don't want them to waste time triaging breakage that could have been avoided. An excerpt from my Changelog podcast appearance — check it out here: https://lnkd.in/djUH4B7J
To view or add a comment, sign in
-
From the @CoffeeAndOSS Archives, I chatted with Jeff Bankenburg about all sorts of great #tech and #oss topics. Access the stream or listen to the podcast below. Be sure to like/subscribe. Thanks for tuning in! https://lnkd.in/gSexSnN6
To view or add a comment, sign in
-
Microsoft just dropped a bombshell (well maybe not a bombshell - maybe something we've been saying for a long time) in their latest webinar, confirming everything we've been discussing for the last year. It's crazy how they finally addressed the concept of technical debt, which we've been diving into on the podcast and within our company. #MicrosoftWebinar #TechnicalDebt #DigitalDebt
To view or add a comment, sign in
-
How do you build security tooling & processes that your colleagues actually adopt? Leticia Lourenco, a UX designer on Netflix's AppSec team, shared a ton of practical takeaways including: 🔹 How to apply UX and Product principles to security tooling and processes so that they're widely adopted and provide a great experience 🔹 How Netflix auto-rightsizes Google Drive permissions, and rolled it out effectively to the whole company 🔹 Learning from other industries and their guidance patterns to improve security communication and design 🔹 The importance of established design patterns and information architecture and much more! I really enjoyed this discussion because even if you have the most technically impressive security tooling, if no one uses it, it's not meaningfully reducing risk. Check it out! 👇
🚀 The latest episode of the Modern Security Podcast is LIVE! 🎉 Join Letty Lourenco, Netflix Senior Software engineer, for an insightful conversation on empowering users with self-service and secure defaults. 🔒 Tune in now https://lnkd.in/dwG343hZ #ModernSecurityPodcast
To view or add a comment, sign in
-
When dealing with technology, it is always required to be prepared for unprecedented scenarios, such as traffic spikes 🚀. One of the primary issues companies encounter is the identification of performance bottlenecks. This often turns out to be queues building up in various parts of the system, such as network sockets or I/O queues. These bottlenecks can significantly degrade system performance, leading to latency issues and resource conflicts 🕒⚠️. Discover various strategies to address the challenges that arise when scaling your system by tuning into the podcast. Tune in now🎧- https://lnkd.in/gTJG49Jq #TechChallenges #SystemScaling #PerformanceBottlenecks #TechPodcast #SoftwareEngineering #TrafficSpikes #Latency #DaffodilSoftware #UnthinakableSolutions
To view or add a comment, sign in
-
-
A massive backdoor exploit was found in the XZ Utils library, which is included with almost all Linux distributions, granting root access to an attacker just by logging in to a server via SSH. In this episode, we are covering the intricate workings of how the exploit works from building and including into the library itself, to actually exploiting.All of this and more on this episode of The Dark Assassins Podcast. Listen now on Apple Podcasts, Spotify, iHeartRadio, on our website, or wherever you get your podcasts.
The Dark Assassins Podcast
darkassassinsinc.com
To view or add a comment, sign in
-
Have you had a chance to listen to our recap of ICANN79? 🎧 Check out the latest episode of our podcast for an update on the developments in DNS Abuse, a discussion on the Registration Data Request Service (RDRS), and more information on the timeline for the next round of TLDs. 🔗 Available now: https://lnkd.in/ea3Ak9D2 Don't miss out - catch up on ICANN79 insights today and let us know what you would like us to cover in the future. #domainnames #newgtlds #dotbrand #dnsabuse #rdrs #subpro
The Com Laude Podcast - Post ICANN79 Review and Discussion (Episode 8) - Com Laude
comlaude.com
To view or add a comment, sign in
-
Focusing on UBEO Business Marketing Services throughout the East Coast for Direct Mailing & Fulfillment | Signage & Wide Format | Merchandising Strategies | Digital Marketing Solutions
I'm listening to How Algorithms 'Flatten' Culture on Fresh Air with @TuneIn. #NowPlaying http://tun.in/tzbjdD a podcast worth listening to Algorithms are helpful and convenient, but they cannot replace critical thinking. We must remember that these are tools in the journey, we own them. They don't own us. #think #digitaltools
To view or add a comment, sign in
-
Want to be a Google's Google Summer of Code contributor? Make your application stand out with tips from GSoC's mentors Nishant Singhal and Chitransh Anand In our latest Codebix's podcast, we discuss all things about GSoC. From Application processes to Selection. Check video in first comment. :)
To view or add a comment, sign in
-
-
Did you know the Functional Source License (FSL) is a new kind of license that aims to balance user freedom and developer sustainability in #opensource? If you want to learn more about the #FSL and Sentry (sentry.io)’s unique approach to open source, you can watch the full episode of the podcast here: https://lnkd.in/dF_e73UC What do you think of the FSL and Sentry’s story? Do you think the FSL is the solution to the open source challenges?
To view or add a comment, sign in