
Sign up to save your podcasts
Or


Whitelisting and blocklisting are tried and true elements of the computer industry. In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world. We discuss fuzzy entities, the scaling problem, layered defenses, and the trouble with active attackers.
By Tim Callan and Jason Soroko5
1515 ratings
Whitelisting and blocklisting are tried and true elements of the computer industry. In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world. We discuss fuzzy entities, the scaling problem, layered defenses, and the trouble with active attackers.

30,609 Listeners

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

8,077 Listeners

315 Listeners

195 Listeners

8,043 Listeners

6,097 Listeners

10,254 Listeners

45 Listeners