Download the App!
show episodes
 
Let's explore the curious world of tiny synthesizers and music devices created by individuals with a deep desire to make something unique. Each episode focuses on an interview with an individual developer. We'll explore their history, experience and design philosophies through conversation and sound clips.
  continue reading
 
Join Rob and Joseph as they chronologically discuss all the notable albums of the punk/new wave movement. From the messy, anarchic noise of the early 70’s proto-punk rockers to the tired, polished death-rattles of the mid-80’s corporate synth-poppers, no stone goes unturned in their quest to fully examine the birth, life and death of “the wave” that produced some of the most beloved songs in modern popular music.
  continue reading
 
С 1996 - 2000 работал на 106.8 FM (впоследствии "Станция 2000"), в рамках передачи "The history of techno" (по четвергам с 21:00 до 23:00), которую мы вели вместе с моим другом DJ Smile (Москва) и рассказывали о Dark Electro/EBM и Industrial музыке. С 2000 - 2001 периодические диджей-сеты в различных московских клубах (Секстон, Гараж, Мастер, Республика Бифитер) и на паре open-эйров. С начала 2002 по настоящее время - выступления на вечеринках Russian Gothic Project, Industrial Music.ru, Rus ...
  continue reading
 
Artwork

1
Electronic Music

Sound On Sound

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Sound On Sound Electronic Music podcast. On this channel we feature some of the pioneers of the industry, interview musicians and talk about retro and current gear. More information and content can be found at https://www.soundonsound.com/podcasts | Facebook, Twitter and Instagram - @soundonsoundmag | YouTube - https://www.youtube.com/user/soundonsoundvideo
  continue reading
 
Artwork

1
Post-Punk Podcast

Post-Punk.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Post-Punk.com presents interviews and discussions about post-punk, goth, industrial, synth, and shoegaze, and more! Hosted by Editor in Chief Alex Baker, along with an assortment of contributing editors, the Post-Punk Podcast is an oral history of a thriving music scene that initially began during the late 70s. Support this podcast: https://podcasters.spotify.com/pod/show/postpunk/support
  continue reading
 
I specialize in Classic Alternative. From the late 1970's through to this very day. Playing classic New Wave, Synth Pop, New Romantic, Post Punk, Industrial, Punk, Ska, Reggae, Brit-Pop, Grunge, Trip Hop, Alternative, Electronic and much more! Tune in for DJ BK's Modern Rock #1's which is uploaded every week. On this series I chronicle every single song that has ever hit the #1 spot on Billboard's Modern Rock chart. The chart started in 1988 with Siouxsie and the Banshees taking the top spot ...
  continue reading
 
Artwork
 
Welcome to "The Synth Symphony," a mesmerizing audio journey through the ever-evolving landscape of electronic music, hosted by the charismatic and knowledgeable Rob Thomas. Whether you're a seasoned electronic music aficionado or a curious newcomer, this podcast is your ultimate guide to the latest and greatest in the world of electronic beats, rhythms, and melodies. Each episode of "The Synth Symphony" is a vibrant tapestry of sound, meticulously woven together by Rob Thomas, a true connoi ...
  continue reading
 
The history of the 1692 Salem Witch Trials told through music and story-telling in a format recalling an old time radio drama with a modern experimental prog-rock twist. Witch Hunt borrows freely from original sources of information from the time of the trials such as letters, books, poems, transcriptions of the trials themselves, as well as melodies from the Puritan hymn books. The music is highly original art-rock ranging from soft ambient soundscapes to heavy power riffs with many other s ...
  continue reading
 
Official podcast of UK one man prog doom band Infernal Symphony - The only podcast covering the UK's most prolific metal band. Covering the project's latest news and developments, insight into recording and songwriting, as well as covering varied topics such as satanism atheism and metal history, latest world metal news, politics, random thoughts, new releases from our peers in the Midlands, and more! Thanks for listening and head to infernalsymphonyuk.bandcamp.com and infernalsymphony.wordp ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This week in the enterprise security weekly news, we discuss funding and acquisitions Understanding the Semgrep license drama Ridiculous vulnerabilities everywhere: vulns to take down your entire city’s cell service vulns to mess with your Subarus vulns in Microsoft 365 authentication cybersecurity regulations are worthless Facebook is banning peop…
  continue reading
 
This week, we've added an extra news segment just on AI. Not because we wanted to, but because the news cycle has bludgeoned us into it. My mom is asking about Chinese AI, my neighbor wants to know why his stocks tanked, my clients want to know how to prevent their employees from using DeepSeek, it's a mess. First, a DeepSeek primer, so we can make…
  continue reading
 
Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in the cybersecurity field, as well as the progress made in recent years. Women bring exceptional skills and knowledge to cybersecurity; however, it is estimated that they make up only 20% to 25% of the cy…
  continue reading
 
Время истекло …и никто не сказал, что жалеет о том, что мало работал. Все жалели о совсем другом "мало". Что мало целовали любимых в губы, что мало играли с детьми в прятки, что мало встречали осознанных рассветов, что пропускали цветение сирени, мало встречались с друзьями, мало хохотали до слёз, мало пробовали новое, мало жили так, как хочется, а…
  continue reading
 
This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US G…
  continue reading
 
In the leadership and communications segment, How CISOs can elevate cybersecurity in boardroom discussions, Nearly half of CISOs now report to CEOs, showing their rising influence, Steve Jobs Shared 1 Crystal Clear Way You'll Spot an Exceptional Leader, and more! Show Notes: https://securityweekly.com/bsw-380…
  continue reading
 
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
  continue reading
 
An open source security project forks in response to license changes (and an echo of how we've been here before), car hacking via spectacularly insecure web apps, hacking a synth via spectacularly cool MIDI messages, cookie parsing problems, the RANsacked paper of 100+ LTE/5G vulns found from fuzzing, and more! Show Notes: https://securityweekly.co…
  continue reading
 
A lot of AI security boils down to the boring, but important, software security topics that appsec teams have been dealing with for decades. Niv Braun explains the distinctions between AI-related and AI-specific security as we avoid the FUD and hype of genAI to figure out where appsec teams can invest their time. He notes that data scientists have …
  continue reading
 
In this occasional series exploring modular synthesis and live performance, William Stokes talks to Tony Rolando, electronic musician and founder of modular company Make Noise. Tony talks about his beginnings in the industry and how Make Noise has relaunched in 2025 with a new team and a brand new module release, which he then showcases in an exclu…
  continue reading
 
In this week's enterprise security news, the first cybersecurity IPO in 3.5 years! new companies new tools the fate of CISA and the cyber safety review board things we learned about AI in 2024 is the humanless SOC possible? NGFWs have some surprising vulnerabilities what did generative music sound like in 1996? All that and more, on this episode of…
  continue reading
 
Let's talk with Maarten Janssen/Cheerful Electronic about 1980's computers, electronic crickets and old Yamaha FM sound chips. His creations include the OPL2 Audio Board and the OPL Studio. Cheerful Electronic Github https://github.com/DhrBaksteen Bluesky https://bsky.app/profile/cheerfulelectronic.bsky.social⁠ Store https://www.tindie.com/stores/c…
  continue reading
 
This interview is a bit different from our norm. We talk to the founder and CEO of OpenVPN about what it is like to operate a business based on open source, particularly through trying times like the recent pandemic. How do you compete when your competitors are free to build products using your software and IP? It seems like an oxymoron, but an ope…
  continue reading
 
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for …
  continue reading
 
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Trea…
  continue reading
 
Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess Burn, Principal Analyst, both from Forrester Research join Business Security Weekly to discuss the second part of The Future Of The CISO report. What if you don't like the future of the CISO role and want to get out? The report also provides guidance on what com…
  continue reading
 
Becoming a CISO is a lofty goal for many security and risk pros, and the role brings new sets of challenges. CISOs who accept the wrong opportunities will be forced to conform, rather than excel, and take on outsized liability for the scope of responsibilities. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess …
  continue reading
 
What’s in store for appsec in 2025? Sure, there'll be some XSS and SQL injection, but what about trends that might influence how appsec teams plan? Cody Scott shares five cybersecurity and privacy predictions and we take a deep dive into three of them. We talk about finding value to appsec from AI, why IoT and OT need both programmatic and technica…
  continue reading
 
I've been so excited to see the external attack surface management (EASM) market take off in the past few years. This market category focuses exclusively on security issues exposed to the public Internet - issues ANYONE can see. All organizations have exposure management problems, but industries that are traditionally underfunded when it comes to c…
  continue reading
 
Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigID's CEO and Co-Founder, Dimitri Sirota, to learn how organizations can adopt a holistic approach to their data security and compliance strategy to keep up with the revolution in data, transforming the…
  continue reading
 
Rob from ThreatLocker comes on the show to talk about how we can disrupt attacker techniques, including Zero Trust, privilege escalation, LOLbins, and evil virtualization. In the news we talk about security appliances and vulnerabilities, rsync vulnerabilities, Shmoocon, hacking devices, and more! This segment is sponsored by ThreatLocker. Visit ht…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play