show episodes
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
The term "hacker" came out of the earliest of computer enthusiasts such as the ARPAnet experiments for programmers and networking wizards. It's people like these that gave us the Internet, Unix, and every other life changing technology. Hackers are not the ones breaking into systems, stealing credit cards, and causing havoc. If you love open source, decentralization, Linux, or want to learn tech. This podcast is for you. Support this podcast: https://anchor.fm/hackerculture/support
 
The AWS Podcast is the definitive cloud platform podcast for developers, dev ops, and cloud professionals seeking the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Jeff Barr for regular updates, deep dives and interviews. Whether you’re building machine learning and AI models, open source projects, or hybrid cloud solutions, the AWS Podcast has something for you.
 
The Sudo Show covers topics ranging from Enterprise Open Source to Cloud Management, but we don't just talk about the technology. We discuss methodologies like DevOps and how to change your team and company cultures to build and grow your people! Need to get more done? Join us as we share our years of experience working from home including our tips and tricks for better productivity!
 
The Cloudcast is the industry's leading, independent Cloud Computing podcast. Since 2011, co-hosts Aaron Delp & Brian Gracely have interviewed technology and business leaders that are shaping the future of computing. Topics will include Cloud Computing | Open Source | AWS | Azure | GCP | Serverless | DevOps | Big Data | ML | AI | Security | Kubernetes | AppDev | SaaS | PaaS | CaaS | IoT. Also available, the "Cloudcast Basics" podcast (@cloudcastbasics), for anyone new to Cloud Computing.
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
Contrast Security provides the industry’s only DevOps-Native AppSec Platform using instrumentation to continuously analyze and protect software from within the application. This enables businesses to see more of the risks in their software and less development delays and AppSec complexity. The Contrast platform integrates seamlessly into development pipelines, enabling easier security bug and vulnerability fixes that significantly speed release cycles. The Contrast Inside AppSec Podcast feat ...
 
The most-watched woman in the history of cable news takes her trademark no-holds barred political and cultural commentary to the world of podcasting with "The Laura Ingraham Show," a part of the Quake Media network. A bestselling author, a breast cancer survivor, and the mother of three internationally-adopted children, Laura was the most listened-to woman in talk radio before making the move to podcasting. Laura has been a trailblazer across multiple media platforms, and she brings a unique ...
 
Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies. Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way. The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own pro ...
 
Loading …
show series
 
Stop forcing security and engineering to collaborate! Security and engineering must collaborate in a seamless approach to protecting customer data. We’ve tried silos for the past twenty years, and that hasn’t worked. Let’s try collaboration for five and see who wins.​ The top open-source tools to secure your app sec pipeline Open-source provides a …
 
The World of Open Source How do you know that the open source you are using is secure? This episode, Robby is joined by Daniel Wisenhoff to talk about open source management. Daniel is the CEO & Co-Founder of Debricked, a Swedish company aiming to help organisations use open source securely in their own software development. During their conversati…
 
Much attention has been given to the software supply chain over the past several months due to the SolarWinds hack. Open-source libraries are a critical part of the software supply chain, and they can pose serious risk if they are not monitored and managed appropriately. Legacy software composition analysis tools equate third-party vulnerabilities …
 
What does a day in the life of a Solution Architect look like at AWS? Simon speaks with four SA’s from around the globe to discuss exactly that, and takes a look at how they go about assisting their customers with interesting challenges. We have also included some fun bonus content at the end, so be sure to tune in. Have a question about solution a…
 
CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pen…
 
The docker project evolved out of the PaaS movement, unlocking polyglot cloud-native applications. But it was only a piece of the puzzle to enable platforms, applications and a broader ecosystem. What lessons can be learned from the docker ecosystem? SHOW: 507 SHOW SPONSORS: CBT Nuggets: Expert IT Training for individuals and teams Sign up for a CB…
 
CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pen…
 
A decentralized exchange, usually referred to as a DEX, is a platform for exchanging cryptocurrencies. Depending on trading volume for different coins, some DEXs are more liquid than others. On the one hand you can freely swap unlisted tokens and maintain full control over your private keys and wallet information. On the other hand, without the rig…
 
Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often …
 
The European Union expresses solidarity with the US over the SolarWinds incident. The UK joins the US in attributing the incident to Russia. Russia objects to US sanctions and hints strongly that it intends to retaliate. IBM discloses new cyber threats to the COVID-19 vaccine cold chain. Iran says Natanz is back in business. Kevin Magee from Micros…
 
In this episode: U.S. walks back intel on Russian bounties in Afghanistan; U.S. will not send ships to Black Sea; Japanese PM in DC for talks with Biden; Macron & Merkel meet with Ukrainian President Zelensky today; Beijing warns Canada; France tells its citizens to leave Pakistan and Iran nuclear talks resume in Vienna.…
 
This week I discuss the offense (investigations) and defense (privacy tactics) surrounding the aftermath of the Capitol siege, plus the latest privacy news.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorseme…
 
This week’s podcast is all about the advancements in voice technology. Laurent Pilati (NXP) joins me to discuss the challenges surrounding machine learning for voice tech, the details of NXP’s Voice Intelligent Technology (VIT), and what benchmark metrics are involved for the qualification for a voice design. Also this week, I take a closer look at…
 
Katherine Druckman chats with Petros Koutoupis and Kyle Rankin about FOSS (Free and Open Source Software), the benefits of contributing to the projects you use, and why you should be a FOSS fan as well. Subscribe to our newsletter. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guests: Kyle Rankin and Pet…
 
A data warehouse is a data management system that often contains large amounts of historical data and is used for business intelligence activities like analytics. It centralizes customer data from multiple sources to be an organization’s single source of truth. Getting the data from your data warehouse into the different applications used by your o…
 
In this episode of DevNews, we cover companies rescinding job offers after they have been accepted. Then we speak with Nikolas Guggenberger, executive director of the Yale Information Society Project, about Justice Clarence Thomas arguing for categorizing some digital platforms as utilities and why this is a huge deal for the tech world. Finally, w…
 
The US announces a broad range of retaliatory actions designed to “impose costs” on Russia for its recent actions in cyberspace, prominently including both the SolarWinds supply chain compromise and attempts to influence elections. More reports on the Natanz incident suggest that a buried bomb was remotely detonated. David Dufour from Webroot has a…
 
This week we cover a basic introduction to password cracking with hashcat. We cover why rainbow tables are no longer useful, password salts, identifying hash types, wordlists, attack modes, the rules language, secure hashing algorithms, password safes and more. For more information, including the show notes check out: https://breachsense.io/podcast…
 
On this episode, Eric has a chat with Emily Omier, a startup consultant and public speaker. Hear Emily's thoughts positioning, open source, and what bad positioning can do to your community. Plus, get a sneak peak at what the Destination Linux Network is up to! Destination Linux Network Sudo Show Website Sponsor: Bitwarden Sponsor: Digital Ocean Su…
 
IT infrastructure are the components required to operate IT environments, like networks, virtual machines or containers, an operating system, hardware, data storage, etc…. As companies build out different deployment environments with infrastructure configurations, they must maintain the different environments, replicate them, and update them. The m…
 
Updates on Natanz, where the nature of the sabotage remains unclear--it happened, but there are conflicting explanations of how. Electrical utilities on alert for cyberattack, especially after the SolarWinds incident. The US Government takes extraordinary steps to fix the Microsoft Exchange Server compromise. Joe Carrigan analyses effective phishin…
 
Learn more about Puppet Relay: https://puppet.com/products/relay/Puppet announced the general availability of Relay recently. We hosted Deepak Giridharagopal, CTO of Puppet to learn more about the project. He said that Relay is based on a couple of core hypotheses. If you are an ops type of person, you would find that automation in this kind of mod…
 
The ability to move Bitcoin on other chains isn't a new idea, and many are trying to overcome the technical limitations which make this a technically challenging feat. The latest representation of Bitcoin on Ethereum is tBTC, a fully-backed ERC-20 token representing bitcoin collateral. tBTC is fully decentralized and relies on Keep Network, a decen…
 
101st Airborne Division D&G 189: Marlie Moxinspike The battle inside Signal See also: Can WhatsApp stop spreading misinformation without compromising encryption? What You Should Know Before Leaking a Zoom Meeting The ‘Batman Effect’: How having an alter ego empowers you Cutting Room Floor DIY latex glove bagpipes Bagpipe swing with Gunhild Carling …
 
Decentralized applications, termed “dApps,” are applications that feel like normal apps but are actually deployed (mostly) on the Ethereum blockchain. This means dApps can’t be taken down, can’t be censored or blocked, typically use Ethereum accounts as identity, and would only experience downtime if Ethereum itself went down. There are a lot of th…
 
Paige Hinckley, (Sr. Director Global Alliances & GTM @Qumulo) talks about the evolution of scalable file and unstructured data in the public cloud. SHOW: 506 SHOW SPONSOR LINKS: CBT Nuggets: Expert IT Training for individuals and teams Sign up for a CBT Nuggets Free Learner account and enter to win a 6-month Premium subscription. Datadog Security M…
 
Updates on the sabotage at Natanz--whether it was cyber or kinetic, Iran has vowed to take its revenge against Israel. NAME:WRECK vulnerabilities affect DNS implementations. Tax season scammers are phishing for credentials. If you liked the investment opportunities those Nigerian princes used to offer, you’re going to love their loaded ATM cards. B…
 
Prologue This week, the show is back after a brief spring break, and we have with us Dmitri Alperovitch - who has taken on a new venture in his latest role. We discuss cybersecurity policy, government's role in private enterprise defense, and why you should probably never run your own MS Exchange Server. Lots of great content from the always inform…
 
In this episode: Russia warns United States to stay out of the Black Sea, as two U.S. warships are expected to arrive there this week; China sends largest contingent of PLA aircraft into Taiwan airspace one day after Blinken warns China on Taiwan; U.S. and Iran plan to continue nuclear talks despite weekend attack on Natanz.…
 
Summary One of the great promises of computers is that they will make our work faster and easier, so why do we all spend so much time manually copying data from websites, or entering information into web forms, or any of the other tedious tasks that take up our time? As developers our first inclination is to "just write a script" to automate things…
 
This week we’re talking with Daniel Stenberg about 23 years of curl. Daniel shares how curl came to be, what drives and motivates him, maintaining a good cadence of an open source product, what to expect from http3, how many billions of users curl has, and Daniel also shares some funny stories like the “Spotify and Instagram hacking ring.” Discuss …
 
Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos…
 
In this off-season mini episode we talk about what it looks like when you start coding very early in life, with Opemipo Disu, 15-year-old developer advocate at urspace. Opemipu talks about what got him into coding so young, the resources and tools he enjoys using, and what his life looks like juggling high school and his coding projects. Show Links…
 
CCATP #680 – Gregg Vanderheiden on 50 Years in Accessibility EV Owners Roundtable – DTNS Special – Daily Tech News Show Fun Automation Project - Moving Blog Post Links to the Podcast Feed Apple Beats Flex Wireless Bluetooth Earphones, by Kurt Liebezit Wyss Institute Multi-Segment Displays at CSUN - Michael Karpelson Interview Transcript allison@pod…
 
Josh and Kurt talk to Emil Wåreus from Debricked about the future of security scanners. Debricked is doing some incredibly cool things to avoid relying on humans for vulnerability identification and cataloging. Learn what the future of security scanning is going to look like. Show Notes Debricked Emil's Linkedin…
 
Projects are often classified as cost-cutting measures or innovation initiatives that improve customer experiences. But cloud contact center service Amazon Connect is shifting that either-or mentality. With out of the box AI / ML capabilities, Amazon Connect is being leveraged by customers across industries to reach people in new ways. And the cust…
 
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
 
The docker project evolved out of the PaaS movement, unlocking polyglot cloud-native applications. But it was only a piece of the puzzle to enable platforms, applications and a broader ecosystem. What lessons can be learned from the docker ecosystem? SHOW: 505 SHOW SPONSORS: See how O’Reilly online learning can help your tech teams. Request a free …
 
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
 
Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login