Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/db/42/ad/db42ad1b-a726-2129-5959-ad731e8d6e08/mza_16128486563068662067.jpg/600x600bb.jpg
The Ring of Defense
Robin Johns and Bill Carter
34 episodes
2 months ago
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interested in safeguarding your digital presence, this podcast offers valuable insights and practical advice.
Show more...
Technology
RSS
All content for The Ring of Defense is the property of Robin Johns and Bill Carter and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interested in safeguarding your digital presence, this podcast offers valuable insights and practical advice.
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/db/42/ad/db42ad1b-a726-2129-5959-ad731e8d6e08/mza_16128486563068662067.jpg/600x600bb.jpg
What even is a DGA anyway?
The Ring of Defense
25 minutes
2 years ago
What even is a DGA anyway?

Domain Generating Algorithms (DGA): 
- Threat actors often rely on domain-generating algorithms to circumvent traditional URL filtering to establish a malicious connection with a deployed payload. But do you know what DGAs are, or how to protect against them?

The 3CX Supply Chain Attack
- On March 29th, a new supply chain attack was identified targeting 3CX, a VoIP IPXS developer. This exploit used a 10-year-old Microsoft vulnerability (CVE-2013-3900) that makes executables appear to be legitimately signed by Microsoft while, in fact, they are being used to distribute malware. How did this happen, and how can you prevent this from being a problem in your business environment?

The Ring of Defense
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interested in safeguarding your digital presence, this podcast offers valuable insights and practical advice.