Home
Categories
EXPLORE
Music
Society & Culture
Comedy
Education
Business
True Crime
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/c8/80/bc/c880bc75-ebe5-69a6-2f02-95ec898dd65d/mza_9657604514211488056.png/600x600bb.jpg
Heavy Strategy
Packet Pushers
117 episodes
1 week ago
The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains, and now in the form... Read more »
Show more...
Technology
RSS
All content for Heavy Strategy is the property of Packet Pushers and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains, and now in the form... Read more »
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/c8/80/bc/c880bc75-ebe5-69a6-2f02-95ec898dd65d/mza_9657604514211488056.png/600x600bb.jpg
HS108: Keeping the (IT) House Clean to Avoid the Plague
Heavy Strategy
23 minutes 55 seconds
4 months ago
HS108: Keeping the (IT) House Clean to Avoid the Plague
Whether it’s CNAME records pointing to dead endpoints or abandoned cloud storage buckets still mentioned in the makefile or Chef recipe, seemingly innocuous bits of infrastructure that don’t get cleaned up can turn into serious security threats. (Both of these examples are taken from real-life attacks, BTW). When and how and who within IT should... Read more »
Heavy Strategy
The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains, and now in the form... Read more »