show episodes
 
Hosted by Viktor Gamov and Kaitlyn Barnard, we interview software developers and technology leaders at the top of their game every other week. We’ll also give you the tools, tactics and strategies you need to take your cloud native architecture to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you can tackle your biggest connectivity challenges.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Secure Connections

IoTSSA (Internet of Things Security Services Association)

Unsubscribe
Unsubscribe
Monthly
 
Ryan Morris, IT Channel Veteran talks with todays leading cybersecurity experts about everything cybersecurity. The current threat landscape, the newest bleeding edge tools and communicating their importance to the SMB
  continue reading
 
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
"This show brings you the latest trends, tools, and techniques in test automation. Each week, we explore a range of topics related to quality assurance, including continuous integration, automation frameworks, and test-driven development. In addition to expert insights and real-world examples, we also feature interviews with industry leaders and members of the test automation community. These interviews offer a unique opportunity to learn from the experiences of others and ask questions abou ...
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
  continue reading
 
Building a successful API requires more than just coding. It starts with collaborative design, focuses on creating a great developer experience, and ends with getting your company on board, maintaining consistency, and maximizing your API’s profitability. In the API Intersection, you’ll learn from experienced API practitioners who transformed their organizations, and get tangible advice to build quality APIs with collaborative API-first design. Jason Harmon brings over a decade of industry-r ...
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

Unsubscribe
Unsubscribe
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
  continue reading
 
Artwork

1
AskDeveloper Podcast

Mohamed Elsherif, Amr Eldeeb, Yasser Makram

Unsubscribe
Unsubscribe
Monthly
 
Welcome to the AskDeveloper Podcast, in this podcast Tamer Zaki & Mohamed Elsherif are discussing the many software related issues especially in the Egyptian technology market, and how to change the culture for companies and development teams to adopt the right methodologies and processes. Our theme music is provided by www.podcastthemes.com
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Every week, Ledger takes you through the news, hopes and downs that shatter the crypto space. Meet Ledger people, experts and partners. Listen to their stories and vision on the future of DeFi, Web3, Bitcoin. Be the first to learn Ledger updates and new nifty features. 30 minutes to keep up the pace and stay up to date. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We're thrilled to introduce our revamped podcast, dedicated to guiding you through the latest and greatest in the world of .NET development. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-p ...
  continue reading
 
Buzzword Bingo explores top-of-mind topics in enterprise tech. Each topic is examined from multiple perspectives through in-depth interviews with industry leaders and aficionados. Powered by Rubrik.
  continue reading
 
Regularly hosted by Ron Westfall, The 5G Factor covers the latest news in communications networks to help you navigate the landscape of mobile and cloud technologies, edge networking, data networking, CSP networks, orchestration, and more.
  continue reading
 
Artwork

1
Cloud Talk

Rackspace Technology

Unsubscribe
Unsubscribe
Monthly
 
Cloud Talk brings you discussions on topics like digital transformation, Kubernetes, IoT, edge computing and multicloud, as told through the perspectives of the people and the companies who are living this transformation on a daily basis. In Cloud Talk, host Jeff DeVerter interviews some of the most influential figures on the frontlines of cloud technology, helping you stay connected. Jeff is CTO at Rackspace and has spent over 20 years immersed in the world of cutting-edge technology.
  continue reading
 
Artwork

1
Securiosity

Scoop News Group

Unsubscribe
Unsubscribe
Monthly
 
Securiosity is a weekly cybersecurity podcast from Scoop News Group. Greg Otto and Jen O’Daniel will spend each week answering the overarching questions from the latest in security and privacy news. They’ll also talk to leaders in both the public and private sector on how they view the ever-changing cybersecurity landscape. Policy, research, venture capital…they’ll examine it all. If you’re curious like us, like and subscribe now. Securiosity. You have questions. So do we.
  continue reading
 
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
  continue reading
 
Artwork

1
CodingCat.dev Podcast

CodingCat.dev Podcast

Unsubscribe
Unsubscribe
Monthly+
 
CodingCat.dev Podcast is a development podcast made by developers for developers. Learning how to be a developer is hard, CodingCat.dev will show you how to grow as a developer bit by bit. We continue this journey of building up purrfect peeps, by also including courses on https://codingcat.dev Links 🎥 YouTube: https://youtube.com/codingcatdev 🌎 Site: https://codingcat.dev/ 📦 GitHub: https://github.com/CodingCatDev 🎓Courses: https://codingcat.dev/courses Support this podcast: https://podcast ...
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Artwork

1
TestGuild Automation Testing Podcast

Test Automation with Joe Colantonio. TestGuild Automation Podcast covers Se

Unsubscribe
Unsubscribe
Weekly
 
TestGuild (Formally TestTalks) Automation Testing Podcast is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers and test automation thought leaders. During the interviews, the spotlighted engineer will sh ...
  continue reading
 
Artwork
 
A podcast for developers about building great products. Join us in discussing engineering excellence with top experts and sharpening your coding skills with technical tips from the Semaphore team. Your host is Semaphore’s co-founder, Darko Fabijan.
  continue reading
 
A podcast about developer tools and the people who make them. Join us as we embark on a journey to explore modern developer tooling and interview the people who make it possible. We love talking to the creators front-end frameworks (React, Solid, Svelte, Vue, Angular, etc), JavaScript and TypeScript runtimes (Node, Deno, Bun), Languages (Unison, Elixor, Rust, Zig), web tech (WASM, Web Containers, WebGPU, WebGL), database providers (Turso, Planetscale, Supabase, EdgeDB), and platforms (SST, A ...
  continue reading
 
Loading …
show series
 
In this podcast with Jeremy Snyder, CEO and Founder of Firetail.io, we discussed the evolution of software development, particularly with the shift from on-premise to cloud-based systems, and the growing significance of API security. Jeremy shared his career journey, highlighting how he transitioned from hands-on IT roles to cloud computing, partic…
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
Send us a text Can API gateways really be the ultimate shield against cyber threats? Prepare to uncover the secrets of API security as we dissect CISSP Domain 8.5 in this episode of the CISSP Cyber Training Podcast. We'll walk you through practice questions that decode the most common API vulnerabilities and why denial of service isn't always the p…
  continue reading
 
The way we use browsers has changed, so has the way we need to secure them. Using a secure enterprise browser to execute content away from the endpoint, inside a secure cloud browser is a dramatically more effective and cost-effective approach to protect users and secure access. This segment is sponsored by Menlo Security. Visit https://securitywee…
  continue reading
 
This week in the enterprise security news, we've got: Torq, Tamnoon, and Defect Dojo raise funding Checkmarx acquires ZAP Commvault acquires Clumio Would you believe San Francisco is NOT the most funded metro area for cybersecurity? Auto-doxxing Smart glasses are now possible Meta gets fined $100M for storing plaintext passwords AI coding assistant…
  continue reading
 
Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabilities. Meanwhile, Supermicro's BMC firmware is giving away root access like it's going out of style. If you thought your Kia was safe, think again - all it takes is a license plate and 30 seconds to turn your car into a hacker's joyride.…
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
These automated testing beliefs might be sabotaging your tests! In this episode, Nikolay debunks the seven biggest myths about automated testing. From the misconception that “more tests mean better quality” to the fallacy of “automation replacing manual testing,” Nikolay shares hands-on experiences and examples from his 16 years of experience. You’…
  continue reading
 
Segment description coming soon! Segment Resources: - https://www.huntress.com/blog/the-hackers-in-the-arena-the-huntress-ctf-retrospective - https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabili…
  continue reading
 
Steven Tey is Founder & CEO of Dub.co, the open source link management infrastructure platform for modern marketing teams. Their open source project, also called dub, has almost 18K stars on GitHub and is used by teams at companies like Vercel, Raycast, and Perplexity. In this episode, we dig into starting Dub.co as a side project and how it ultima…
  continue reading
 
Send us a text Crack the code of security architecture and engineering with this episode of the CISSP Cyber Training Podcast! Ever wondered how different security models apply to real-world scenarios? We'll give you the insights and knowledge you need to discuss these models confidently with senior leaders and implement robust security controls. We…
  continue reading
 
MongoDB Atlas is a managed NoSQL database that uses JSON-like documents with optional schemas. The platform recently released new vector search capabilities to facilitate building AI capabilities. Ben Flast is the Director of Product Management at MongoDB. He joins the show to talk about the company’s developments with vector search. This episode i…
  continue reading
 
MongoDB Atlas is a managed NoSQL database that uses JSON-like documents with optional schemas. The platform recently released new vector search capabilities to facilitate building AI capabilities. Ben Flast is the Director of Product Management at MongoDB. He joins the show to talk about the company’s developments with vector search. This episode i…
  continue reading
 
MongoDB Atlas is a managed NoSQL database that uses JSON-like documents with optional schemas. The platform recently released new vector search capabilities to facilitate building AI capabilities. Ben Flast is the Director of Product Management at MongoDB. He joins the show to talk about the company’s developments with vector search. This episode i…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
To make secure software by design a reality, engineers must intentionally build security throughout the software development lifecycle. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Timothy A. Chick, technical manager of the Applied Systems Group in the SEI’s CERT Division, discusses building, designing, …
  continue reading
 
#283: Moving beyond the usual suspects in observability, today's focus shifts towards mobile—a relatively unexplored domain for OpenTelemetry. The integration of OpenTelemetry with mobile applications opens new avenues for mobile app observability. In this episode, Darin and Viktor talk with Austin Emmons from Embrace about the need for educating d…
  continue reading
 
Darío and Wiseguy are Nintendo 64 hackers and modders. They are the creators of multiple projects, including RT64 which is an N64 graphics renderer for enhancing games in emulators and native ports. This year, they released N64: Recompiled, which is a tool to statically recompile N64 binaries into C code that can be compiled for any platform. The a…
  continue reading
 
Darío and Wiseguy are Nintendo 64 hackers and modders. They are the creators of multiple projects, including RT64 which is an N64 graphics renderer for enhancing games in emulators and native ports. This year, they released N64: Recompiled, which is a tool to statically recompile N64 binaries into C code that can be compiled for any platform. The a…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Beth Johnson’s talk at MacAdmins this year was all about bringing Compliance routines to her organization, and we wanted to spend some time getting her to share more about the process, the tools, and most importantly, the philosophy behind her efforts. And we’ll get into her incredibly beautiful slides, also. Hosts: Tom Bridge - @tbridge@theinterne…
  continue reading
 
The Stack Overflow Developer Survey is an annual survey conducted by Stack Overflow that gathers comprehensive insights from developers around the world. It offers a valuable snapshot of the global developer community, covering a wide range of topics such as preferred programming languages, tools, and technologies. Erin Yepis is a Senior Analyst an…
  continue reading
 
The Stack Overflow Developer Survey is an annual survey conducted by Stack Overflow that gathers comprehensive insights from developers around the world. It offers a valuable snapshot of the global developer community, covering a wide range of topics such as preferred programming languages, tools, and technologies. Erin Yepis is a Senior Analyst an…
  continue reading
 
The Stack Overflow Developer Survey is an annual survey conducted by Stack Overflow that gathers comprehensive insights from developers around the world. It offers a valuable snapshot of the global developer community, covering a wide range of topics such as preferred programming languages, tools, and technologies. Erin Yepis is a Senior Analyst an…
  continue reading
 
In the leadership and communications segment, Underfunding And Leadership Gaps Weaken Cybersecurity Defenses, A Self-Care Checklist for Leaders, Senate bill eyes minimum cybersecurity standards for health care industry, and more! Show Notes: https://securityweekly.com/bsw-366
  continue reading
 
Loading …

Quick Reference Guide