The newest sermons from First RPC of Cambridge on SermonAudio.
…
continue reading
The HR Investigations Podcast: Exploring the Issues, Challenges, Strategies, and Solutions New episodes available bi-weekly
…
continue reading
RPC Ramblings is a Podcast by Richhill Presbyterian Church. Over the next few weeks, we'll be chatting about responding to, living in, and life after Covid-19, seeing what God has to say about it all through His Word. Grab your coffee and join us for a chat.
…
continue reading
Navigate the complexities of the tax world with RPC’s Taxing Matters podcast. This is a monthly podcast series designed for professionals and business leaders seeking insights into the often-complex world of tax. Whether you’re a seasoned professional, a business owner, or just curious about tax, our podcast brings you expert insights into the ever-changing tax landscape. Join our podcast host and Senior Associate in RPC's Tax Disputes team, Alexis Armitage, alongside monthly special guests, ...
…
continue reading
This is Huddy At the RPC Podcast! I talk about life challenges, mortgages, debt, finance, credit and a whole other world of topics including mixed martial arts, books I've read, and kids in the world today! I'm a variety, mixed bag and full of Irish blood! Support this podcast: https://podcasters.spotify.com/pod/show/huddy-at-the-rpc/support
…
continue reading
A podcast brought to you by the roleplay community, for the roleplay community. We deal in rants, anon hate, rec's, trends and anything else related to rp.
…
continue reading
Latest sermons preached in Stranraer RPC - a church with a heart for people in the heart of Stranraer
…
continue reading
Credit expert / nerd chatting about credit, mortgage loans, real estate. Educate and inspire from a dude that's lives it and breaths it! 20 years of experience not just in business but life.
…
continue reading
A podcast all things RPC Authority since there are already too many SCP Podcasts. What this podcast will be about: As previously stated all things RPC. Just like some of you might be I'm fairly new to the Authority myself. So let us explore this anomalous world together while drawing comparisons to the older universes of weirdness.
…
continue reading
In this series, 39 Essex Chambers’ barristers, Katherine Apps KC and David Mitchell interview each other and guests exploring the legal issues raised by artificial intelligence including what sort of legal regulation is needed, how AI will impact on the legal profession, discrimination challenges, data protection, intellectual property and ownership, contracting issues and the impact on legal education in the future. Guest include: Baroness Shami Chakrobarti CBE, former shadow Attorney Gener ...
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
When the clutter, motherhood, relationships, and life seem too overwhelming. When you have resentment and frustration every day – this is a sign you have been living on auto-pilot- letting life happen to you instead of living it ON PURPOSE. I’ve been there. Three kids under 4 and I decided to declutter my home and realized I was living my whole life on autopilot. I wanted more. I wanted to take action, be more present, have more fun! Enjoy my kids! I’m Shawna, You might know me as your Nerdy ...
…
continue reading
Join hosts James and Frank for a humorous and informative podcast about the world of software and development. In each episode, we discuss the latest trends and challenges in the tech industry, sharing our own experiences and insights as software engineers. We cover a wide range of topics, including testing, best practices, microservices, monorepos, cloud computing, devops, infrastructure as code, and more. Tune in to "Unruly Software" for a fresh perspective on the world of software enginee ...
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
Learn the latest programming updates in the tech world.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Joins us in the trenches of web3. Deep dive in technical topics. Look behind the marketing curtain. Reports & interview with people building in the trenches of web3. Unhinged rants about culture & politics, economics, philosophy. Stories of founders whose achievement are beyond believe. Weekly news & markets update. Little bit of this, little bit of that and whole lotta fun! LFG !
…
continue reading
Gospel-Centered, Encouraging, and Challenging Sermons
…
continue reading
Web3 and crypto are taking the world by storm. Keeping up-to-date can feel impossible. Dev3 solves this with technical conversations. Learn about Ethereum, DeFi, and the newest tech from the web3 builders making it happen.
…
continue reading
Welcome to The Fearfic Podcast, where talking Basement goo Slimebeast, inebriated interstellar traveler Abysmii, and irritable ghostly creep Dead Palette, read all stories horror and Internet related, paragraph by paragraph, and mess around while they do it. From adolescent revenge fantasies to subtle post modern narratives about real life events, and everything in between, we read it and critique.
…
continue reading
Aspiring to succeed in finance? Danny Camm spent 6 years working in finance and now operates as a specialist finance recruiter in London. Each week, Danny will speak to guests ranging from middle management up to the C-suite to establish what it takes to achieve success in finance. www.successinfinance.co.uk
…
continue reading
A must listen for those interested in gaining unique insight into comprehensive M&A. Unlike the competition, Mergermarket provides market-leading proprietary intelligence with a focus on origination. This actionable information enables firms to track the strategic intentions of potential and existing clients, and be the first to know of any relevant M&A developments. Tune in to listen to professionals speak about the latest information on the biggest movers and shakers in the industry!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-402
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Last Mile of Blockchains: RPC and Node-as-a-Service
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22
This story was originally published on HackerNoon at: https://hackernoon.com/last-mile-of-blockchains-rpc-and-node-as-a-service. This paper surveys methods for accessing blockchains, comparing full nodes and third-party services based on integrity, availability, and privacy. Check more stories related to programming at: https://hackernoon.com/c/pro…
…
continue reading
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-402
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-402
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-402
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Keyword-Based Anomaly Detection in Log Files
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45
This story was originally published on HackerNoon at: https://hackernoon.com/keyword-based-anomaly-detection-in-log-files. Spring-based suites are utilized to build a log anomaly detection system. This is a three-part series, with the foundation components covered in the first part. Check more stories related to programming at: https://hackernoon.c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why Open Source AI is Good For Developers, Meta, and the World
13:11
13:11
Play later
Play later
Lists
Like
Liked
13:11
This story was originally published on HackerNoon at: https://hackernoon.com/why-open-source-ai-is-good-for-developers-meta-and-the-world. Open source will ensure that more people around the world have access to the benefits and opportunities of AI, that power isn’t concentrated in the hands of a Check more stories related to programming at: https:…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A CISO's Perspective on AI, Appsec, and Changing Behaviors - Paul Davis - ASW #293
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A CISO's Perspective on AI, Appsec, and Changing Behaviors - ASW #293
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Evolving Role of the CISO - Allan Alford - BSW #358
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Security Posture Management - Dor Fledel - BSW #358
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Security Posture Management - Allan Alford, Dor Fledel - BSW #358
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Importance of Understanding Compliance When Managing a Global Team with Special Guest Daniela Uribe
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57
In today’s show we spend time with Daniela Uribe, a global entrepreneur, shoe designer, and content creator who launched her own namesake luxury footwear brand, Daniela Uribe. The Daniela Uribe line embodies her distinctive style along with her electrifying personality and her striking designs that incorporate technological comfort with a sensual, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CSS Positions: Real Examples to Help You Learn
3:29
3:29
Play later
Play later
Lists
Like
Liked
3:29
This story was originally published on HackerNoon at: https://hackernoon.com/css-positions-real-examples-to-help-you-learn. Let's start with even do you need CSS positions aren't the other properties enough to make you faint? Why CSS positions?Say you want to create an navigation.. Check more stories related to programming at: https://hackernoon.co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The 6 (Six) Side-Projects I Created Over This Weekend 😮💨
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23
This story was originally published on HackerNoon at: https://hackernoon.com/the-6-six-side-projects-i-created-over-this-weekend. Open to learn why and how I built it and what is my growth plan for them. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content about #web-development, #…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/augmented-tree-data-structures. Data structures are a serious tool to store data conveniently. Modern applications have the flexibility to organize the data in the memory or on disk using vari Check more stories related to programming at: https://hackernoon.com/c/programmi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can the latest wave of AI innovation deliver for security operations teams? - ESW #369
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch, Edward Wu - ESW #369
1:58:49
1:58:49
Play later
Play later
Lists
Like
Liked
1:58:49
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch - ESW #369
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to Build a Request Access Approval System Using Next.js
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-build-a-request-access-approval-system-using-nextjs. Learn how to build an efficient Request Access Approval System using Next.js and Permit.io for managing permissions securely and effectively Check more stories related to programming at: https://hackernoon.com/c/p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
10 LeetCode Patterns to Solve 1000 LeetCode Problems
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56
This story was originally published on HackerNoon at: https://hackernoon.com/10-leetcode-patterns-to-solve-1000-leetcode-problems. Ever wondered how to master 1000 LeetCode problems in six months? You have a shortcut. By learning these ten patterns, you can solve LeetCode easily. Check more stories related to programming at: https://hackernoon.com/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crowdstrike: The Aftermath - PSW #836
1:59:49
1:59:49
Play later
Play later
Lists
Like
Liked
1:59:49
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Code Review Culture: Why You Need to Have One
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09
This story was originally published on HackerNoon at: https://hackernoon.com/code-review-culture-why-you-need-to-have-one. Code review culture is important to avoid friction in your team and bugs in code. As reviewers, you want to avoid personal style comments (aka nitpicks) Check more stories related to programming at: https://hackernoon.com/c/pro…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Event Bus in Microservice Architecture With RabbitMQ and Python
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59
This story was originally published on HackerNoon at: https://hackernoon.com/event-bus-in-microservice-architecture-with-rabbitmq-and-python. An “Event bus” is a design pattern that enables different parts of a software system to communicate with each other by publishing and subscribing events. Produc Check more stories related to programming at: h…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing - Douglas McKee - PSW #836
1:05:12
1:05:12
Play later
Play later
Lists
Like
Liked
1:05:12
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing. - Douglas McKee - PSW #836
3:04:36
3:04:36
Play later
Play later
Lists
Like
Liked
3:04:36
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AOSP and Linux Cross Border Convergence! Look at OpenFDE, New Open Source Linux Desktop Environment
3:16
3:16
Play later
Play later
Lists
Like
Liked
3:16
This story was originally published on HackerNoon at: https://hackernoon.com/aosp-and-linux-cross-border-convergence-look-at-openfde-new-open-source-linux-desktop-environment. Open Fusion Desktop Environment is a new Linux desktop environment design exploration project, similar to KDE and GNOME. Check more stories related to programming at: https:/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to Build Your Own TODO-list Service With Golang and MongoDB
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-build-your-own-todo-list-service-with-golang-and-mongodb. Many have wondered how a simple task sheet or applications that provide such functionality work. In this article, we will write a small TODO service. Check more stories related to programming at: https://hack…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SAPwned, Squarespace Domain Hijacks, AIs Fixing Code, Infosec Investments - ASW #292
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
SAPwned demonstrates tenets of tenant isolation, a weak login flow puts Squarespace domains at risk, how AIs might (or might not) be useful for fixing code, getting buy-in for infosec investments, and more! Show Notes: https://securityweekly.com/asw-292
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Farshad Abasi, Allie Mellen - ASW #292
1:05:00
1:05:00
Play later
Play later
Lists
Like
Liked
1:05:00
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Allie Mellen, Farshad Abasi - ASW #292
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-400
…
continue reading