show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
How does design impact the world around you? Discover how graphic designers, UX designers, illustrators, typographers, artists, activists and other creatives empower creativity for all. Can the design of an app, a logo, a graphic, a sound effect, or an illustration make your life better? Find out with Adobe’s Khoi Vinh, one of Fast Company’s Most Creative People in Business.
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Loading …
show series
 
This week, Rickard Carlsson, CEO at Detectify, joins us to talk about collaboration as the modern approach application security. In the Enterprise News for this week: HackerOne Enhances Security Testing Platform, Palo Alto Networks Expands Unit 42 Cybersecurity Consulting Group, Thoma Bravo to take cyber security firm Proofpoint private, BlackRock,…
 
In this interview Jenny speaks to Krystyna Lennon an amazing coach and hypnotherapist who gained fame with her notorious "hypnodog" act on Britain's got Talent and globally. They discuss all things hypnosis and how these methods of influence and persuasion can be used for ethical purposes as well as for impressing us all on TV. Thanks to Krystyna f…
 
This week we discuss the Rackspace-Platform9 partnership, Microsoft buying Kinvolk and the commodification of DevOps. Plus, some hot takes on Zoom’s new immersive view. Rundown Zoom launches Immersive View to unify participants in the same virtual room M&A Rackspace Technology Announces Strategic Investment in Platform9 and Launches Rackspace Manag…
 
You can check out Frontend Mentor here. Try a few challenges or join their Slack, where thousands of students are chatting about how they are approaching the projects. You can follow Matt on Twitter here. If you want to read about how he made the jump from personal trainer to web developer, he did a nice interview with Indie London. Our lifeboat of…
 
From Python to .Net https://isc.sans.edu/forums/diary/From+Python+to+Net/27366/ PHP Composer Vulnerability https://blog.sonarsource.com/php-supply-chain-attack-on-composer Microsoft Identifies Several Integer Overflow Vulnerablities https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04By Johannes B. Ullrich, Ph.D.
 
Customer Empathy is a powerful human resource for positively impacting customer experience excellence. Alex Allwood outlines her customer-centric framework, methods and tools to switch on and scale customer empathy that can be used to solve the common customer experience management problems of low organizational commitment, poor alignment of cross-…
 
An API bug may have exposed credit ratings. A study offers advice for the new anti-ransomware task forces emerging in the US and elsewhere. Israelis warned to keep their cyber-guard up on Quds Day next week. Russia says it would spot any US cyberattack before it hit. The US Congress considers establishing surge cyber response capacity. Dinah Davis …
 
In today's episode, we welcome back to the show Ali Spittel! Ali is a developer advocate at AWS Amplify. So, naturally in this episode, we discuss topics around what it means to be a developer advocate! Ali has a passion for making code accessible and fun, and you'll hear that in this episode. ✨ Sponsor: Linode Thank you to long time sponsor and fr…
 
For years, Apple has claimed its devices are the most secure in the world, poo-pooing PC and Android devices for being as clean as a public swimming pool. But just this week, Motherboard’s very own Lorenzo Franceschi-Bicchierai reported on what is being described as one of the biggest security flaws of Apple products exploited by hackers ever, and …
 
You’ll often hear about developers (including both of us) who regularly use pair programming. The practice of pair programming can be very helpful for sharing knowledge across the team, working through a difficult chunk of code, or simply showing how your team approaches their daily workflow (especially when working with a new hire). Pair programmi…
 
Guest Stacey Nash, Head of Fraud and Central Operations at USAA, joins Dave to discuss romance or sweetheart scams, Joe and Dave share some listener follow-up, Joe's got a story about emails sent to British awards organizers asking them to transfer prize money to a PayPal account, Dave's story is about a Rolling Stones tribute band targeted in a bo…
 
How do you do smarter testing? Carl and Richard talk to Simon Cropp about Verify, Simon's open source project to add snapshot testing capabilities to many of your favorite testing stacks. Simon talks about how snapshots can help you look at the output of code, rather than the code itself, to test its validity. And as code changes, the new snapshots…
 
Stopping Google FLoC https://github.blog/changelog/2021-04-27-github-pages-permissions-policy-interest-cohort-header-added-to-all-pages-sites/ https://amifloced.org RotaJakiro Backdoor https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/ F5 Big IP Kerberos Spoofing Vulnerablity https://support.f5.com/csp/article/K51213246…
 
Mike has a few stories to share, but more importantly a very hard lesson he's going to make sure you damn sure you learn. And Chris has a breakthrough after spending the weekend with WSL's GUI Linux apps. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a…
 
We investigate whether AirDrop is really as dangerous as researchers claimed. We discuss the pestiferous problem of fake Linux bugs submitted as an academic exercise. We review the latest Sophos Ransomware Report and uncover uncomfortable truths about paying up.https://nakedsecurity.sophos.com/apple-airdrop-has-significant-privacy-leakhttps://naked…
 
Richard Struse, Director of The Center for Threat-Informed Defense from MITRE Engenuity joins the SCW crew for a two part interview! -What is threat-informed defense and how does it relate to other aspects of cybersecurity? -The importance of ATT&CK as a lens through which you can view your security posture. -Center for Threat-Informed Defense R&D …
 
Ghostwriter is back, and has moved its “chaos troops” against fresh targets in Poland and Germany. The Naikon APT has a new secondary backdoor. FluBot, temporarily inhibited by police raids, is back, and expanding its infection of Android devices across Europe. Microsoft is rethinking how much, and with whom, it wants to share vulnerability informa…
 
Cloud computing provides tools, storage, servers, and software products through the internet. Securing these resources is a constant process for companies deploying new code to their cloud environments. It’s easy to overlook security flaws because company applications are very complex and many people work together to develop them. Wyze Labs, for ex…
 
In this episode of Syntax, Scott and Wes continue their discussion of TypeScript Fundamentals with a deeper diver into more advanced use cases. Deque - Sponsor Deque’s axe DevTools makes accessibility testing easy and doesn’t require special expertise. Find and fix issues while you code. Get started with a free trial of axe DevTools Pro at deque.co…
 
#105: The following quote is attributed to Mark Twain, "History does not repeat itself, but it rhymes." Does this sound familiar? VMs. LXC. Containers. They are all (roughly) the same thing. So why do we keep recreating things that already exist? Transcript: https://www.devopsparadox.com/episodes/does-history-repeat-itself-105/#transcript YouTube c…
 
Eric returns to the Clean Coders podcast to discuss a talk he gave to a bunch of developers at Spotify. He talks about the differences between the mobile development paradigm and the web and other paradigms to set the stage for the different measures and practices involved in evaluating mobile development code. He also gives some practices mobile t…
 
Cyber accountability is often overlooked by Board of Directors and the C-Suite. They tend to turn a blind eye to their cyber security mandates or avoid the issue. But as Solarwinds, MS Exchange and many other security incidents prove it, it’s not a strategy. In the Leadership and Communications section, Outgunned CISOs navigate complex obstacles to…
 
Diving into a Singapore Post Phihsing E-Mail https://isc.sans.edu/forums/diary/Diving+into+a+Singapore+Post+Phishing+Email/27356/ Two in Five Victims of Online Scam Adverts Do Not Report to Host Platforms https://www.which.co.uk/news/2021/04/two-in-five-victims-of-online-scam-adverts-dont-report-to-host-platforms/ Microsoft Defender Blocks Cryptoja…
 
Remembering Dan Kaminski. Week before last was Patch Tuesday. Google's Project Zero responds to today's patch latency reality. Baking security into IoT UNethical security research. CloudFlare refuses to knuckle under to Patent Trolls. Closing The Loop. The Mystery of AS8003. We invite you to read our show notes at https://www.grc.com/sn/SN-816-Note…
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: USA imposes sanctions over SolarWinds campaign Enterprise border devices being attacked everywhere by all and sundry Malvertising is coming back Ultra professional criminal attackers are ascendant All the latest ransomware, supply chain and other infosec …
 
Modern applications are increasingly built as large, distributed systems. A distributed system is a program where its components are located on different machines that communicate with one another to create a single cohesive app. Components may exist as multiple instances across “nodes,” the computers hosting them, which form clusters of nodes that…
 
This week in the Security Weekly News: Dirty emojis, Nvidia zero-days, Shlayer, Cozy Bear, Emotet, Babuk, iOS 14.5, and Jason Wood returns for Expert Commentary! Show Notes: https://securityweekly.com/swn117 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on …
 
We start with the article about "Researchers Secretly Tried To Add Vulnerabilities to Linux Kernel, Ended Up Getting Banned" and explore its range of issues from ethics to securing huge, distributed software projects. It's hardly novel to point out that bad actors can attempt to introduce subtle and exploitable bugs. More generally, we've also seen…
 
Jeffery D Smith, author of Operations Anti-Patterns, DevOps Solutions, discusses anti-patterns in software development organizations and how they can be fixed. Host Robert Blumen spoke with Smith about why he chose to focus on what can go wrong; fixing things that are broken in your organization; information hoarding; why important information abou…
 
FBI, CISA, detail SVR cyber activities. Nine US Combatant Commands see declassification as an important tool in information warfare. A convergence of OPSEC and privacy? Apple fixes a significant Gatekeeper bypass flaw. Babuk ransomware hits DC police. A new twist in credential harvesting. Ben Yelin considers the FTCs stance on racially biased algor…
 
Prairie Home Companion Zettlekasten Obsidian https://taio.app/ iA Writer Collector's Fallacy https://zettelkasten.de/posts/dont-rely-on-source-have-faith-in-yourself/ http://mng.bz/j4M9 Grokking Simplicity, promo code: podnocompute21 Join the Community Join dnccast each Thursday at 6 pm Pacific for the live recordings of each episode! We also have …
 
In today's episode, we welcome back to the show Ali Spittel! Ali is a developer advocate at AWS Amplify. So, naturally in this episode, we discuss topics around what it means to be a developer advocate! Ali has a passion for making code accessible and fun, and you'll hear that in this and the next episode. ✨ Sponsor: Linode Thank you to long time s…
 
This week we’re talking about NFTs — that’s right, non-fungible tokens and we’re joined by Mikeal Rogers, who’s leading all things InterPlanetary Linked Data at Protocol Labs. We go down the NFT rabbit whole on a very technical level and we come out the other side with clarity and a compelling use of NFTs. Discuss on Changelog News Join Changelog++…
 
Back in the 1990’s, Cyberwarfare was a word rarely used in the West – and definitly unheard of in China, which was just taking it’s first steps in the Internet. Two Chinese military officers, veterns of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond. The post China’s Unrestricted Warfare, Part 1 …
 
You can follow David on Twitter here and read his blog here. Check out more about Dapper Labs and it's work with the NBA and NFTs here. David has written some influential pieces on the world of digital music and the role of software platforms. Check out a few of his pieces here. Read about David's adventure's setting up a Minecraft server for his k…
 
CAD: .DGN and .MVBA Files analyzed with oledump https://isc.sans.edu/forums/diary/CAD+DGN+and+MVBA+Files/27354/ MacOS 0-Day Bug Patched https://objective-see.com/blog/blog_0x64.html https://support.apple.com/en-us/HT201222 Emotet Uninstaller Triggered https://blog.malwarebytes.com/threat-analysis/2021/01/cleaning-up-after-emotet-the-law-enforcement…
 
Zoom prankers deceive European members of parliament with a deepfake video call. A password manager is compromised. Europol took a good whack at Emotet yesterday, removing the botnet’s malware from infected machines. US response to the Holiday Bear campaign receives cautious good reviews. A cyberattack interferes with cancer treatments. Caleb Barlo…
 
New Logo, CISA Pulse Secure VPN Orders, Ransomware Gangs + Stock Shorter Scams, Japanese NASA Hacked by China, Dan Kaminsky, LinkedIn Brittons and China/Russia, Codecov Fallout, Technology News, Content, Ideas & Analysis, Notes, Discovery, Recommendations, and the Aphorism of the Week… Support the show: https://danielmiessler.com/support/ See omnys…
 
Kevin and the CYBER.ORG team are currently finalizing nationwide K-12 cybersecurity learning standards with the goal of having all 50 states adopt them. Expected in the fall, these standards will ensure that all students have equal access to standardized K-12 cybersecurity education. This conversation will introduce Wickr to the PSW listeners. Joel…
 
Show Description Adam Argyle chats with us about CSS features from risky and never in any browser to stable and available in many browsers that are available in 2021. Listen on Website → Links ShopTalk Show 374: VisBug with Adam Argyle ShopTalk Show 400: Talking with Jen & Adam about Firefox & Chrome What’s New in CSS in 2021 Sponsors Netlify An in…
 
In this Hasty Treat, Scott and Wes talk about Git Rebase — what it is and how and when to use it! Sanity - Sponsor Sanity.io is a real-time headless CMS with a fully customizable Content Studio built in React. Get a Sanity powered site up and running in minutes at sanity.io/create. Get an awesome supercharged free developer plan on sanity.io/syntax…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login