
Sign up to save your podcasts
Or


Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the implementation of secure communication protocols like TLS, SSH, and IPSec, which provide confidentiality and integrity for data in transit. We explain how these protocols differ from insecure alternatives like Telnet, HTTP, and FTP, and why default configurations often need to be hardened to ensure true protection. Topics include cipher suite selection, certificate management, forward secrecy, and secure key exchange—all of which play a role in protocol strength. We also discuss port control, protocol filtering, and legacy support, especially in hybrid environments where older systems may not support modern encryption. Secure protocol implementation is about more than enabling HTTPS—it’s about understanding and configuring the full security context behind each connection.
 By Dr. Jason Edwards
By Dr. Jason Edwards5
33 ratings
Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the implementation of secure communication protocols like TLS, SSH, and IPSec, which provide confidentiality and integrity for data in transit. We explain how these protocols differ from insecure alternatives like Telnet, HTTP, and FTP, and why default configurations often need to be hardened to ensure true protection. Topics include cipher suite selection, certificate management, forward secrecy, and secure key exchange—all of which play a role in protocol strength. We also discuss port control, protocol filtering, and legacy support, especially in hybrid environments where older systems may not support modern encryption. Secure protocol implementation is about more than enabling HTTPS—it’s about understanding and configuring the full security context behind each connection.

1,017 Listeners

322 Listeners

140 Listeners

44,027 Listeners