show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Conversations with the hackers, leaders, and innovators of software development. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and developer at @Clearbit. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: developertea ...
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
We're Emma Bostian, Kelly Vaughn, and Ali Spittel - three seasoned software developers working in different sectors. Since there's a major lack of technical podcasts out there, we've decided to start one. Just kidding -- there's already a ton! But, we wanted to add our voices to the space and share our experiences and advice. We'll have great discussions around how to start coding, the hot technologies right now, how to get your first developer job, and more!
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
 
Loading …
show series
 
Development environments are brittle and hard to manage. They lack the kind of fungibility afforded by infrastructure-as-code. Gitpod is a company that allows developers to describe development environments as code to make them easier to work with, and enabling a more streamlined GitOps workflow. Johannes Landgraf and Sven Efftinge are creators of …
 
Has there ever been a gaming company that brought more joy to the world than Nintendo? They were making playing cards back in 1889 and continue to find ways to be different but fun with inventions like the Switch and Labo. Sara gives us some the scoop on Rimworld. Check out the trailer here and feel free to lend your skill to a new mod if you have …
 
Federated learning is machine learning without a centralized data source. Federated Learning enables mobile phones or edge servers to collaboratively learn a shared prediction model while keeping all the training data on device. Mike Lee Williams is an expert in federated learning, and he joins the show to give an overview of the subject and share …
 
Coté, Matt and Brandon discuss the latest news from the Cloud Foundry and OpenStack conferences, Docker alternatives, Google getting sued and the downfall of Quibi. The Rundown Cloud Foundry coalesces around Kubernetes It's Time to Forget About Docker The OpenStack Foundation becomes the Open Infrastructure Foundation Quibi Is Shutting Down as Prob…
 
We break down some thoughts on this issue, which came to light after a tweet from Tim Nolet. Later in the episode we talk about the debate raging right now around elections and technology. What role should software play and where is regulation appropriate? Last but not least, we consider what the next US administration might do with regards to regu…
 
BazarLoader Phishing Lures https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/ Stalled Reviews for Secure Boot Shim https://github.com/rhboot/shim-review/issues/120 https://github.com/rhboot/shim-review/issues/102#issuecomment-698963751 Cisco Advisories https://to…
 
This week, first we talk Enterprise News, discussing how Palo Alto Networks announces cloud native security platform, Akamai launches new API security tool, SentinelOne secures patent for unique approach to uncovering exploits in their initial payload stage, Splunk helps security teams modernize and unify their security operations in the cloud, and…
 
This week, Dr. Doug wraps up all the shows from this week, and talks about Twitter hacks, Oracle patches, Sandworm, Singapore facial recognition, and Donald Trump says we don't need security! Show Notes: https://securityweekly.com/swn76 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.c…
 
This week: the DOJ's attempt to reignite the Battle to Break Encryption; the story of the Russian hackers behind the Sandworm Team; a zero-day bug just patched in Chrome; and (oh no!) why your vocabulary needs the word "restore" even more than it needs "backup".With Kimberly Truong, Doug Aamoth and Paul Ducklin.https://nakedsecurity.sophos.com/us-d…
 
Scott talks to Huma Abidi, the Senior Director of AI Software Products at Intel. Huma leads a team of software engineers and today she sits down and gets deep with Scott on AI, machine learning, deep learning, optimization...and painting! What is the role of silicon and hardware instructions when doing AI and ML? How does Intel interact with the op…
 
Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek o…
 
In this podcast episode, Rob and Jake talk to Sara Vieira, author of Opinionated React, developer at Code Sandbox, and organizer of QueerJS and the Women of React Conference. Together, they discuss Sara's book, "Opinionated React," and how it provides value to teams looking for a more prescriptive approach to building React applications or simply l…
 
For all the advances in software development over the years, one area that has seen minimal improvement is the terminal. Typing commands into a black text interface seems antiquated compared to the dynamic, flashy interfaces available in web browsers and modern desktop applications. Fig is a visual terminal assistant with the goal of changing that.…
 
Logical fallacies are errors in reasoning that can invalidate an otherwise good discussion, formal argument, or debate. The fallacies discussed here have to do with misdirection or misinformation. Fallacies of Omission occur when important or even necessary information is left out of an argument. Fallacies of Ambiguity create confusion by using unc…
 
Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 million, The Catch of the Day is a gift card scam that includes references to National Treasure movie, and later in the show, later in the show, Dave's conv…
 
A new .NET Foundation board is elected - what does it mean for you? Carl and Richard talk to Layla Porter about her new role on the .NET Foundation board and the goals of the foundation to grow its membership, bring more open source projects into the fold, support the maintainers of those projects and to broaden the reach of .NET everywhere. Layla …
 
Shipping Dangerous Goods https://isc.sans.edu/forums/diary/Shipping+dangerous+goods/26702/ Chinese State-Sponsored Actors Exploit Same Vulnerablities as Others https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF URL Bar Spoofing Vulnerabilities https://thehackernews.com/2020/10/browser-address-…
 
In this (wholly sponsored) edition of the Snake Oilers podcast, three vendors will drop by to pitch their sweet, sweet snake oil: Gravwell pitches its “structure on read” approach to SIEM Plextrac describes its red team/pentest reporting platform ITProTV’s Don Pezet talks about trends in online training Show notes Gravwell PlexTrac - The Purple Tea…
 
This week, we welcome Steve Schlarman, Integrated Risk Management Strategist at RSA Security, to discuss Integrated Risk Management & Operational Resiliency! In our second segment, we welcome David Mundhenk, Principal Security Consultant at Herjavec Group, and Ivan Tsarynny, Co-Founder and CEO at Feroot Security, to talk about How Backdoors Lead To…
 
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan …
 
Supporting the show: I decided to stop taking sponsors for the show because I think advertisements are annoying and no one wants to listen to them.If you do want to support the show, the best way to do it is to check out our products: Tailwind UI, a collection of professionally designed, fully responsive HTML components built with Tailwind CSS. Sta…
 
In this episode of Syntax, Scott and Wes talk about spooky web dev stories — listener-submitted stories about web dev gone wrong. Netlify - Sponsor Netlify is the best way to deploy and host a front-end website. All the features developers need right out of the box: Global CDN, Continuous Deployment, one click HTTPS and more. Hit up netlify.com/syn…
 
Cloud resources can get out of control if proper management constraints are not put in place. Cloud Custodian enables users to be well managed in the cloud. It is a YAML DSL that allows you to easily define rules to enable a well-managed cloud infrastructure giving security and cost optimization. Kapil Thangavelu works on Cloud Custodian and he joi…
 
This week we update you on the Security Weekly 25 Index! In the Leadership and Communications segment, 96% of Cybersecurity Professionals are Happy With Their Roles, 4 Tips for Effective Virtual Collaboration, What’s Really Happening in Infosec Hiring Now?, 5 Signs That Point to a Schism in Cybersecurity, Tactical vs Strategic: CISOs and Boards Nar…
 
✨ Sponsor: Monday.com Thanks to Monday.com for supporting the show! Ever dreamt of building an app that impacts the daily lives of hundreds of thousands of people? Well now is your chance! Monday.com is an online teamwork platform that just launched a contest to develop apps for the 100,000 teams that use monday.com for their daily work. And the pr…
 
Mirai-alike Python Scanner https://isc.sans.edu/forums/diary/Miraialike+Python+Scanner/26698/ Google Chrome Update (actively exploited vulnerability fixed) https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html QNAP Fixes ZeroLogon Vulnerability https://www.qnap.com/en/security-advisory/qsa-20-07 GravityRat Going Mu…
 
Zoom end-to-end encryption, Windows 10 god mode, Manifest v3. Last Wednesday, Zoom announced that THIS week their 30-evaluation of end-to-end encrypted video conferencing would begin How to enable Windows 10 "God Mode" Edge to be updated with browser extensions "Manifest v3" Last Tuesday Microsoft issued fixes for 87 security vulnerabilities - so, …
 
On this week’s show Patrick and Adam discuss the week’s security news, including: US DoJ unseals indictments against Sandworm operators Twitter backtracks on “hacked materials” policy No consensus on Trickbot c2 status NSA publishes “most exploited” listicle that’s actually interesting Much, much more Cmd Security is this week’s sponsor. Its CEO Ja…
 
Danny Akacki discusses how do we, as a NDR product company with an emphasis on user outreach and education, continue not only to keep our product effective for distributed workforce's but also continue to beat the drum on education and knowledge share? It's not easy but we've come up with a few ways both to stay connected to our clients and help th…
 
America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from …
 
This episode features an interview with Ronald Deibert, Professor of Political Science, and Director of the Citizen Lab at the Munk School of Global Affairs & Public Policy, University of Toronto. We talk about his new book, “Reset: Reclaiming the Internet for Civil Society.” We also talk about the unique Canadian talent for debate that is both bar…
 
This week, we welcome Taylor McCaslin, Security Product Manager at GitLab, to discuss current trends in the application security testing industry! In the Application Security News, Patch Your Windows - “Ping of Death” bug revealed, 800,000 SonicWall VPNs vulnerable to remote code execution bug, T2 Exploit Team Creates Cable That Hacks Mac, Zoom Rol…
 
Predicting the spread of COVID-19 is not easy. The best methods we have available require us to extrapolate trends from a large volume of data, and this requires the construction of large-scale models. Because of the expertise needed for developing these models, Silicon Valley engineers were brought in to help develop a maintainable model. Two of t…
 
As remote work gains more traction, we have to find the best ways to communicate from a distance, so today on the show we discuss our favorite screen sharing and remote collaboration apps. From pair programming and code sharing software to video chat applications boasting drawing functionality and cool screen widgets, you’ll hear our take on the la…
 
1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security …
 
You can find Kelsey on Twitter here. His Github is here. His personal journey with Kubernetes is detailed in a nice piece here. Kelsey has an interesting role at Google. He sits at the director level but is an independent contributor with no direct reports. Instead he works to help galvanize interest in particular tools and topics, driving adoption…
 
Out of Band MSFT Patches https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-17022 https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-17023 Adobe Magento Patches https://helpx.adobe.com/security/products/magento/apsb20-59.html Attacks against SS7 https://www.haaretz.com/israel-news/tech-news/.premium…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login