Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
On each daily broadcast, Dr. Robert Jeffress provides practical application of God’s Word to everyday life through clear, uncompromised Biblical teaching. Join him today on the Pathway to Victory!
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
Consumer advocacy in application security
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
Nancy L. Cavey, a seasoned attorney with over thirty-nine years of experience, explains the complex world of filing for Social Security Disability benefits. Filing for disability can be a confusing, life changing event, so with her deft expertise, Nancy will guide you through: - The ins-and-outs of qualifying for Social Security Disability benefits (such as age and insurance requirements). - Information regarding the process and lifespan of a claim, from the initial application to the reques ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
…
continue reading
Software Architecture Insights is your go-to resource for empowering software architects and aspiring professionals with the knowledge and tools required to navigate the complex landscape of modern software design. SAI provides invaluable insights into crucial aspects of software architecture, including cloud computing, application security, scalability, availability, and more. Whether you're a seasoned architect looking to stay up-to-date with the latest industry trends or a prospective sof ...
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
NetScaler application delivery and security solutions are designed to ensure that business-critical applications perform well and remain secure. Centered around a comprehensive application delivery controller and advanced WAN, these solutions help companies succeed by ensuring an optimal user experience.
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The importance of application security in small businesses
1:10:52
1:10:52
Play later
Play later
Lists
Like
Liked
1:10:52The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
…
continue reading
1
ICE Minneapolis Shooting Sparks Anger; US Seizes Two More Tankers in Venezuela Campaign
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29On today's podcast: 1) An Immigration and Customs Enforcement officer fatally shot a woman during a confrontation in Minneapolis, sparking an uproar over the presence of ICE agents in the city and heightening political divisions around the Trump administration’s migrant crackdown. The Wednesday shooting — caught on video and shared widely on social…
…
continue reading
1
Choosing Perseverance Over Defeat – Part 2
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Few things are more inspiring than seeing Rocky reach the top of the stairs at the Philadelphia Art Museum or watching Rudy lead his team to victory. So how can we experience that same kind of victory in our own lives? Dr. Robert Jeffress teaches us to choose perseverance over defeat. To support Pathway to Victory, go to ptv.org/donate.…
…
continue reading
1
Standardizing Database Provisioning with AWS CLI and RDS
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43Standardizing Database Provisioning with AWS CLI and RDS https://knowledge.businesscompassllc.com/standardizing-database-provisioning-with-aws-cli-and-rds/ Manual database setup takes forever and leads to inconsistent configurations across environments. Standardizing database provisioning with AWS CLI and RDS solves this problem by creating repeata…
…
continue reading
1
How Enterprises Save on Generative AI with AWS Bedrock
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17How Enterprises Save on Generative AI with AWS Bedrock https://knowledge.businesscompassllc.com/how-enterprises-save-on-generative-ai-with-aws-bedrock/ Generative AI can drain enterprise budgets fast, but AWS Bedrock is changing how companies approach AI cost management. This podcast is designed for CTOs, AI project managers, and enterprise decisio…
…
continue reading
1
Governed AWS Credentials in GitHub Codespaces: Policies, Roles, and Auditing
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25Governed AWS Credentials in GitHub Codespaces: Policies, Roles, and Auditing https://knowledge.businesscompassllc.com/governed-aws-credentials-in-github-codespaces-policies-roles-and-auditing/ Managing AWS credentials securely within GitHub Codespaces is critical for development teams who need reliable cloud access without compromising security. Th…
…
continue reading
1
Enterprise AWS Automation: EC2 Name Generator Using Python
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57Enterprise AWS Automation: EC2 Name Generator Using Python https://knowledge.businesscompassllc.com/enterprise-aws-automation-ec2-name-generator-using-python/ Managing hundreds or thousands of EC2 instances across multiple AWS environments becomes a nightmare without proper naming conventions. This podcast shows DevOps engineers, cloud architects, …
…
continue reading
1
AWS IAM Fundamentals: How Access Control Works in AWS
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04AWS IAM Fundamentals: How Access Control Works in AWS https://knowledge.businesscompassllc.com/aws-iam-fundamentals-how-access-control-works-in-aws/ AWS Identity and Access Management controls who can access your AWS resources and what they can do with them. This podcast is designed for developers, cloud engineers, and IT administrators who want to…
…
continue reading
1
Building Serverless Analytics Pipelines with Athena and QuickSight
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Building Serverless Analytics Pipelines with Athena and QuickSight https://knowledge.businesscompassllc.com/building-serverless-analytics-pipelines-with-athena-and-quicksight/ Building serverless analytics pipelines transforms how organizations process and visualize data without managing infrastructure. This podcast is designed for data engineers, …
…
continue reading
In this episode, KJ announces the reimagined CDW Canada Tech Talks, outlining what’s ahead for 2026. You can expect more frequent episodes, new expert hosts and a broader range of topics, including AI, cybersecurity, cloud management and public sector innovation. Our mission remains clear: deliver timely insights and practical advice to help IT lea…
…
continue reading
1
Trump Says Venezuela to Send Up to $2.8 BN of Oil; US Won’t Rule Out Military Force to Acquire Greenland
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57On today's podcast: 1) President Trump said Venezuela would relinquish as much as 50 million barrels of oil to the US, worth roughly $2.8 billion at the current market price, announcing the cargoes would be sold with proceeds benefiting both countries. The announcement late on Tuesday, which came with few details, marked a significant step up for t…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
Choosing Perseverance Over Defeat – Part 1
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Everyone loves a good underdog story. But often, we never get to experience moments of triumph in our own lives because we quit partway through our endeavors. Dr. Robert Jeffress shows us how victory can be ours, as well, when we choose perseverance over defeat. To support Pathway to Victory, go to ptv.org/donate.…
…
continue reading
1
Production-Grade ETL Pipelines with AWS Glue
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Production-Grade ETL Pipelines with AWS Glue https://knowledge.businesscompassllc.com/production-grade-etl-pipelines-with-aws-glue/ Building robust AWS Glue ETL pipeline systems that can handle enterprise-scale data processing requires more than just basic setup knowledge. This podcast targets data engineers, DevOps professionals, and technical arc…
…
continue reading
1
Jenkins CI/CD Tool Explained: From Build to Deployment
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19Jenkins CI/CD Tool Explained: From Build to Deployment https://knowledge.businesscompassllc.com/jenkins-ci-cd-tool-explained-from-build-to-deployment/ Jenkins has become the go-to CI/CD tool for development teams who want to automate their software delivery process from code commit to production deployment. This podcast is designed for developers, …
…
continue reading
1
Public and Private Subnets in AWS: When and Why to Use Them
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Public and Private Subnets in AWS: When and Why to Use Them https://knowledge.businesscompassllc.com/public-and-private-subnets-in-aws-when-and-why-to-use-them/ AWS subnets form the backbone of your cloud network architecture, but choosing between public and private configurations can make or break your infrastructure security and performance. This…
…
continue reading
1
Flask Application Deployment on AWS EC2 with Amazon EFS Storage
17:45
17:45
Play later
Play later
Lists
Like
Liked
17:45Flask Application Deployment on AWS EC2 with Amazon EFS Storage https://knowledge.businesscompassllc.com/flask-application-deployment-on-aws-ec2-with-amazon-efs-storage/ Deploying a Flask application on AWS EC2 with Amazon EFS storage gives you a robust, scalable solution for production web applications that need reliable file storage. This podcast…
…
continue reading
1
Automating AWS EKS Infrastructure with Terraform
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Automating AWS EKS Infrastructure with Terraform https://knowledge.businesscompassllc.com/automating-aws-eks-infrastructure-with-terraform/ Managing AWS EKS infrastructure manually gets messy fast. Every cluster update, node group change, and security configuration becomes a time-consuming task that’s prone to human error. AWS EKS Terraform automat…
…
continue reading
1
Configuring Cloud-Native Applications: Service-by-Service Comparison
21:01
21:01
Play later
Play later
Lists
Like
Liked
21:01Configuring Cloud-Native Applications: Service-by-Service Comparison https://knowledge.businesscompassllc.com/configuring-cloud-native-applications-service-by-service-comparison/ Configuring cloud-native applications can feel like solving a puzzle with constantly changing pieces. This podcast breaks down the configuration complexities across major …
…
continue reading
1
Build a production-ready AI toolbox ft. Cat Weeks
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39While generative AI demos are flashy, moving those capabilities into a reliable, secure enterprise production environment is a different ballgame. In this episode of Technically Speaking, Red Hat CTO Chris Wright sits down with longtime Red Hatter and engineering leader Cat Weeks to dismantle the myth that you need a massive ""Frontier Model"" for …
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Quality at Scale: Engineering in an AI-Driven World.
20:45
20:45
Play later
Play later
Lists
Like
Liked
20:45This episode explores the rapid expansion of artificial intelligence in software, with a focus on how software engineering professionals and QA can keep pace. We discuss the quality of software generated by AI tools, and how to adapt mindsets to these new tech trends. 🔥 Like and Subscribe 🔥 💰 Sponsors If you are interested in sponsoring my content,…
…
continue reading
1
Navigating the DSOMM Roadmap and the DevSecOps Revolution
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01This episode focuses on how these principles fit into the DevSecOps Maturity Model (DSOMM), a structured framework that enables organisations to embed security practices from the start, ensuring that rapid delivery does not come at the cost of protection. Ready to take the first step? The Certified DevSecOps Professional (CDP) course is the ultimat…
…
continue reading
1
Shift left into runtime: Vibe coding and AI guardrails
20:35
20:35
Play later
Play later
Lists
Like
Liked
20:35Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules. But is faster better? While agentic AI unlocks game-changin…
…
continue reading
1
AI's Role in Advancing Embedded Programming
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44Unlocking AI Potential in Embedded Development with Eli Hughes | EdgeVerse Techcast Join co-hosts Bridgette Stone and Kyle Dando on the EdgeVerse Techcast as they welcome back embedded developer Eli Hughes. In this episode, Eli shares his hands-on experience with integrating AI tools like ChatGPT and Anthropic Claude into his workflow, highlighting…
…
continue reading
1
Maduro Pleads Not Guilty; Venezuela Regroups With New Leader
15:34
15:34
Play later
Play later
Lists
Like
Liked
15:34On today's podcast: 1) Ousted Venezuela President Nicolás Maduro pleaded not guilty on Monday to US charges in a narco-terrorism case against him, kicking off an extraordinary legal battle with major geopolitical ramifications. The US accused Maduro over the weekend of using his positions in government for a quarter of a century to enrich himself a…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
Our attitudes may have a profound effect on our lives right now—but it doesn’t end here! Dr. Robert Jeffress teaches that the way we respond to life’s circumstances will have consequences that extend all the way into eternity. To support Pathway to Victory, go to ptv.org/donate.By Dr. Robert Jeffress
…
continue reading
1
EKS Ingress Automation Using AWS Load Balancer Controller
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53EKS Ingress Automation Using AWS Load Balancer Controller https://knowledge.businesscompassllc.com/eks-ingress-automation-using-aws-load-balancer-controller/ Managing traffic routing in Amazon EKS clusters doesn’t have to be a manual headache. EKS ingress automation using AWS Load Balancer Controller streamlines how your Kubernetes applications han…
…
continue reading
1
BYOC in AWS ACM: Importing Custom SSL Certificates Securely
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26BYOC in AWS ACM: Importing Custom SSL Certificates Securely https://knowledge.businesscompassllc.com/byoc-in-aws-acm-importing-custom-ssl-certificates-securely/ AWS Certificate Manager’s Bring Your Own Certificate (BYOC) feature lets you import SSL certificates from external certificate authorities directly into your AWS environment. This podcast i…
…
continue reading
1
Real-World Kubernetes Lab Exercises for DevOps Engineers
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26Real-World Kubernetes Lab Exercises for DevOps Engineers https://knowledge.businesscompassllc.com/real-world-kubernetes-lab-exercises-for-devops-engineers/ DevOps engineers need practical kubernetes hands on practice to master container orchestration in real production environments. These real-world kubernetes lab exercises give you the hands-on ex…
…
continue reading
1
Choosing Between Amazon ECS and EKS for Containerized Applications
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Choosing Between Amazon ECS and EKS for Containerized Applications https://knowledge.businesscompassllc.com/choosing-between-amazon-ecs-and-eks-for-containerized-applications/ Amazon ECS vs EKS represents one of the most critical decisions DevOps engineers and cloud architects face when deploying containerized applications AWS. Both services offer …
…
continue reading
1
Implementing Teleport for Secure Infrastructure Access in AWS
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Implementing Teleport for Secure Infrastructure Access in AWS https://knowledge.businesscompassllc.com/implementing-teleport-for-secure-infrastructure-access-in-aws/ Managing secure access to AWS infrastructure can feel like juggling flaming torches while blindfolded. Traditional SSH keys and VPN solutions create security gaps and operational heada…
…
continue reading
1
Difference Between Public and Private NAT Gateway in AWS
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28Difference Between Public and Private NAT Gateway in AWS https://knowledge.businesscompassllc.com/difference-between-public-and-private-nat-gateway-in-aws/ AWS offers two distinct NAT Gateway options that can make or break your cloud networking strategy. This podcast is designed for cloud architects, DevOps engineers, and IT professionals who need …
…
continue reading
1
Ep. 126: Avoiding Panic and Misunderstandings with Proper Authentication Failure Reporting
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28Have you ever felt that feeling of thinking your account has been compromised? It can be a scary feeling. But what about when it didn't really happen? Instead it was just confusing messaging. That is what I talk about in this episode. The importance of proper messaging in the right context. Even the smallest thing can turn out to be a larger issue.…
…
continue reading
1
Stopping Lateral Movement with Zero Networks
16:53
16:53
Play later
Play later
Lists
Like
Liked
16:53All links and images can be found on CISO Series. In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaki…
…
continue reading