show episodes
 
Artwork

4
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
  continue reading
 
Artwork

1
Pathway to Victory

Dr. Robert Jeffress

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
On each daily broadcast, Dr. Robert Jeffress provides practical application of God’s Word to everyday life through clear, uncompromised Biblical teaching. Join him today on the Pathway to Victory!
  continue reading
 
Artwork

1
SMC Journal

SMC Journal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Nancy L. Cavey, a seasoned attorney with over thirty-nine years of experience, explains the complex world of filing for Social Security Disability benefits. Filing for disability can be a confusing, life changing event, so with her deft expertise, Nancy will guide you through: - The ins-and-outs of qualifying for Social Security Disability benefits (such as age and insurance requirements). - Information regarding the process and lifespan of a claim, from the initial application to the reques ...
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

4
FundraisingAI

Nathan Chappell, Scott Rosenkrans

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
  continue reading
 
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
  continue reading
 
Software Architecture Insights is your go-to resource for empowering software architects and aspiring professionals with the knowledge and tools required to navigate the complex landscape of modern software design. SAI provides invaluable insights into crucial aspects of software architecture, including cloud computing, application security, scalability, availability, and more. Whether you're a seasoned architect looking to stay up-to-date with the latest industry trends or a prospective sof ...
  continue reading
 
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
NetScaler application delivery and security solutions are designed to ensure that business-critical applications perform well and remain secure. Centered around a comprehensive application delivery controller and advanced WAN, these solutions help companies succeed by ensuring an optimal user experience.
  continue reading
 
Artwork

1
Security Architecture Podcast

Evgeniy Kharam & Dmitry Raidman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Loading …
show series
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
  continue reading
 
On today's podcast: 1) An Immigration and Customs Enforcement officer fatally shot a woman during a confrontation in Minneapolis, sparking an uproar over the presence of ICE agents in the city and heightening political divisions around the Trump administration’s migrant crackdown. The Wednesday shooting — caught on video and shared widely on social…
  continue reading
 
Few things are more inspiring than seeing Rocky reach the top of the stairs at the Philadelphia Art Museum or watching Rudy lead his team to victory. So how can we experience that same kind of victory in our own lives? Dr. Robert Jeffress teaches us to choose perseverance over defeat. To support Pathway to Victory, go to ptv.org/donate.…
  continue reading
 
Standardizing Database Provisioning with AWS CLI and RDS https://knowledge.businesscompassllc.com/standardizing-database-provisioning-with-aws-cli-and-rds/ Manual database setup takes forever and leads to inconsistent configurations across environments. Standardizing database provisioning with AWS CLI and RDS solves this problem by creating repeata…
  continue reading
 
How Enterprises Save on Generative AI with AWS Bedrock https://knowledge.businesscompassllc.com/how-enterprises-save-on-generative-ai-with-aws-bedrock/ Generative AI can drain enterprise budgets fast, but AWS Bedrock is changing how companies approach AI cost management. This podcast is designed for CTOs, AI project managers, and enterprise decisio…
  continue reading
 
Governed AWS Credentials in GitHub Codespaces: Policies, Roles, and Auditing https://knowledge.businesscompassllc.com/governed-aws-credentials-in-github-codespaces-policies-roles-and-auditing/ Managing AWS credentials securely within GitHub Codespaces is critical for development teams who need reliable cloud access without compromising security. Th…
  continue reading
 
Enterprise AWS Automation: EC2 Name Generator Using Python https://knowledge.businesscompassllc.com/enterprise-aws-automation-ec2-name-generator-using-python/ Managing hundreds or thousands of EC2 instances across multiple AWS environments becomes a nightmare without proper naming conventions. This podcast shows DevOps engineers, cloud architects, …
  continue reading
 
AWS IAM Fundamentals: How Access Control Works in AWS https://knowledge.businesscompassllc.com/aws-iam-fundamentals-how-access-control-works-in-aws/ AWS Identity and Access Management controls who can access your AWS resources and what they can do with them. This podcast is designed for developers, cloud engineers, and IT administrators who want to…
  continue reading
 
Building Serverless Analytics Pipelines with Athena and QuickSight https://knowledge.businesscompassllc.com/building-serverless-analytics-pipelines-with-athena-and-quicksight/ Building serverless analytics pipelines transforms how organizations process and visualize data without managing infrastructure. This podcast is designed for data engineers, …
  continue reading
 
In this episode, KJ announces the reimagined CDW Canada Tech Talks, outlining what’s ahead for 2026. You can expect more frequent episodes, new expert hosts and a broader range of topics, including AI, cybersecurity, cloud management and public sector innovation. Our mission remains clear: deliver timely insights and practical advice to help IT lea…
  continue reading
 
On today's podcast: 1) President Trump said Venezuela would relinquish as much as 50 million barrels of oil to the US, worth roughly $2.8 billion at the current market price, announcing the cargoes would be sold with proceeds benefiting both countries. The announcement late on Tuesday, which came with few details, marked a significant step up for t…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Production-Grade ETL Pipelines with AWS Glue https://knowledge.businesscompassllc.com/production-grade-etl-pipelines-with-aws-glue/ Building robust AWS Glue ETL pipeline systems that can handle enterprise-scale data processing requires more than just basic setup knowledge. This podcast targets data engineers, DevOps professionals, and technical arc…
  continue reading
 
Jenkins CI/CD Tool Explained: From Build to Deployment https://knowledge.businesscompassllc.com/jenkins-ci-cd-tool-explained-from-build-to-deployment/ Jenkins has become the go-to CI/CD tool for development teams who want to automate their software delivery process from code commit to production deployment. This podcast is designed for developers, …
  continue reading
 
Public and Private Subnets in AWS: When and Why to Use Them https://knowledge.businesscompassllc.com/public-and-private-subnets-in-aws-when-and-why-to-use-them/ AWS subnets form the backbone of your cloud network architecture, but choosing between public and private configurations can make or break your infrastructure security and performance. This…
  continue reading
 
Flask Application Deployment on AWS EC2 with Amazon EFS Storage https://knowledge.businesscompassllc.com/flask-application-deployment-on-aws-ec2-with-amazon-efs-storage/ Deploying a Flask application on AWS EC2 with Amazon EFS storage gives you a robust, scalable solution for production web applications that need reliable file storage. This podcast…
  continue reading
 
Automating AWS EKS Infrastructure with Terraform https://knowledge.businesscompassllc.com/automating-aws-eks-infrastructure-with-terraform/ Managing AWS EKS infrastructure manually gets messy fast. Every cluster update, node group change, and security configuration becomes a time-consuming task that’s prone to human error. AWS EKS Terraform automat…
  continue reading
 
Configuring Cloud-Native Applications: Service-by-Service Comparison https://knowledge.businesscompassllc.com/configuring-cloud-native-applications-service-by-service-comparison/ Configuring cloud-native applications can feel like solving a puzzle with constantly changing pieces. This podcast breaks down the configuration complexities across major …
  continue reading
 
While generative AI demos are flashy, moving those capabilities into a reliable, secure enterprise production environment is a different ballgame. In this episode of Technically Speaking, Red Hat CTO Chris Wright sits down with longtime Red Hatter and engineering leader Cat Weeks to dismantle the myth that you need a massive ""Frontier Model"" for …
  continue reading
 
This episode explores the rapid expansion of artificial intelligence in software, with a focus on how software engineering professionals and QA can keep pace. We discuss the quality of software generated by AI tools, and how to adapt mindsets to these new tech trends. 🔥 Like and Subscribe 🔥 💰 Sponsors If you are interested in sponsoring my content,…
  continue reading
 
This episode focuses on how these principles fit into the DevSecOps Maturity Model (DSOMM), a structured framework that enables organisations to embed security practices from the start, ensuring that rapid delivery does not come at the cost of protection. Ready to take the first step? The Certified DevSecOps Professional (CDP) course is the ultimat…
  continue reading
 
Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules. But is faster better? While agentic AI unlocks game-changin…
  continue reading
 
Unlocking AI Potential in Embedded Development with Eli Hughes | EdgeVerse Techcast Join co-hosts Bridgette Stone and Kyle Dando on the EdgeVerse Techcast as they welcome back embedded developer Eli Hughes. In this episode, Eli shares his hands-on experience with integrating AI tools like ChatGPT and Anthropic Claude into his workflow, highlighting…
  continue reading
 
On today's podcast: 1) Ousted Venezuela President Nicolás Maduro pleaded not guilty on Monday to US charges in a narco-terrorism case against him, kicking off an extraordinary legal battle with major geopolitical ramifications. The US accused Maduro over the weekend of using his positions in government for a quarter of a century to enrich himself a…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
EKS Ingress Automation Using AWS Load Balancer Controller https://knowledge.businesscompassllc.com/eks-ingress-automation-using-aws-load-balancer-controller/ Managing traffic routing in Amazon EKS clusters doesn’t have to be a manual headache. EKS ingress automation using AWS Load Balancer Controller streamlines how your Kubernetes applications han…
  continue reading
 
BYOC in AWS ACM: Importing Custom SSL Certificates Securely https://knowledge.businesscompassllc.com/byoc-in-aws-acm-importing-custom-ssl-certificates-securely/ AWS Certificate Manager’s Bring Your Own Certificate (BYOC) feature lets you import SSL certificates from external certificate authorities directly into your AWS environment. This podcast i…
  continue reading
 
Real-World Kubernetes Lab Exercises for DevOps Engineers https://knowledge.businesscompassllc.com/real-world-kubernetes-lab-exercises-for-devops-engineers/ DevOps engineers need practical kubernetes hands on practice to master container orchestration in real production environments. These real-world kubernetes lab exercises give you the hands-on ex…
  continue reading
 
Choosing Between Amazon ECS and EKS for Containerized Applications https://knowledge.businesscompassllc.com/choosing-between-amazon-ecs-and-eks-for-containerized-applications/ Amazon ECS vs EKS represents one of the most critical decisions DevOps engineers and cloud architects face when deploying containerized applications AWS. Both services offer …
  continue reading
 
Implementing Teleport for Secure Infrastructure Access in AWS https://knowledge.businesscompassllc.com/implementing-teleport-for-secure-infrastructure-access-in-aws/ Managing secure access to AWS infrastructure can feel like juggling flaming torches while blindfolded. Traditional SSH keys and VPN solutions create security gaps and operational heada…
  continue reading
 
Difference Between Public and Private NAT Gateway in AWS https://knowledge.businesscompassllc.com/difference-between-public-and-private-nat-gateway-in-aws/ AWS offers two distinct NAT Gateway options that can make or break your cloud networking strategy. This podcast is designed for cloud architects, DevOps engineers, and IT professionals who need …
  continue reading
 
Have you ever felt that feeling of thinking your account has been compromised? It can be a scary feeling. But what about when it didn't really happen? Instead it was just confusing messaging. That is what I talk about in this episode. The importance of proper messaging in the right context. Even the smallest thing can turn out to be a larger issue.…
  continue reading
 
All links and images can be found on CISO Series. In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaki…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play