Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A podcast about web design and development.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
The State and Popular Culture
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
next generation web podcast
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
Audio podcasts on software testing.
…
continue reading
A place for elite leaders and teams.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Anthony Eden, Founder & CEO of DNSimple, joins the show to talk about the world of managed hosting for DNS and more. Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – The low-code platform for developers to build internal tools — Some of the best teams out ther…
…
continue reading

1
SE Radio 664: Emre Baran and Alex Olivier on Stateless Decoupled Authorization Frameworks
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54Emre Baran, CEO and co-founder of Cerbos, and Alex Olivier, CPO and co-founder, join SE Radio host Priyanka Raghavan to explore “stateless decoupled authorization frameworks. The discussion begins with an introduction to key terms, including authorization, authorization models, and decoupled frameworks. They dive into the challenges of building dec…
…
continue reading

1
Mic Drop: Former Deputy DNI Sue Gordon: ‘it is conceivable that the world order has already been broken’
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18This week, as national security agencies brace for deep cuts and digital expertise is shed from their ranks, we talk to former Principal Deputy Director of National Intelligence Sue Gordon about what happens when intelligence is stuck in the past. She says the real danger isn’t what we don’t know—it’s what we stop trying to understand. Learn about …
…
continue reading

1
The Secret CISO: Insights and Reflections from Cybersecurity Leaders
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46In this episode of Cybersecurity Today titled 'The Secret CISO,' host Jim Love, along with guests Octavia Howell, Daniel Pinsky, and John Pinard, delves into the personal and professional experiences of Chief Information Security Officers (CISOs). They share their journeys into cybersecurity, discuss the challenges and pressures of their roles, and…
…
continue reading
Bit lets you generate composable software simplicity, speed and quality. Connect with Laly on LinkedIn. Congrats to Lifeboat badge winner and blog contributor Charlie Martin for their answer to How does this proof, that the halting problem is undecidable, work? .By Stack Overflow
…
continue reading

1
Computer Science for Kids with Jen Looper
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12By Scott Hanselman
…
continue reading
Microsoft issues emergency updates for Windows Server. Apple releases emergency security updates to patch two zero-days. CISA averts a CVE program disruption. Researchers uncover Windows versions of the BrickStorm backdoor. Atlassian and Cisco patch several high-severity vulnerabilities. An Oklahoma cybersecurity CEO is charged with hacking a local…
…
continue reading
Coder's Socials Mike on X Mike on BlueSky Mike's Blog Coder on X Coder on BlueSky Show Discord Alice Alice Forms TMB Earth Day 2025 CompetitionBy The Mad Botter
…
continue reading
In this episode Michael and Sarah talk with guest Amanda Minnich about securing agentic AI systems, the security challenges they face, and how to secure them. We also discuss Azure Security news about Azure File Sync, Docker support in Azure and a new series of Secure Future Initiative videos with appearances from Michael, Sarah, and various guests…
…
continue reading

1
Is the cyber talent ecosystem broken? [CISO Perspectives]
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits dow…
…
continue reading

1
Meet JASON HUGGINS, The Genius Behind Selenium!
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56Show notes: Meet JASON HUGGINS, The Genius Behind Selenium!By Testing Podcast
…
continue reading
IPv4 addresses are worth an awful lot of money, the serious dangers of a seemingly sensible deepfake law, Microsoft is 50 years old, and our thoughts on antivirus on Linux and Windows. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Accurate and Effective Storage Benchmarking News Your IPv4 stash can now be col…
…
continue reading

1
Vite, frontend tooling & the future with Evan You
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Founder of VoidZero and founder of Vue and Vite Evan You joins us to talk about the evolution of JavaScript tooling, the success of Vite, and what's coming next with VitePlus — a unified toolchain aiming to simplify dev workflows. We also touch on Nitro, multi-runtime support, and where AI might (or might not) fit into the mix. Links https://evanyo…
…
continue reading

1
Turing Award Special: A Conversation with Martin Hellman
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation for modern encryption protocols. Hellman has also contributed to cybersecur…
…
continue reading

1
Three Principles of Preparedness - Mitigate Risks and Capitalize On Opportunities
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02This episode delves into practical principles for navigating the unexpected in your life and career. Rather than attempting to predict specific events, the focus is on cultivating resilience and optionality by identifying vulnerabilities in your systems and adopting a proactive mindset to transform potential challenges into strategic advantages. • …
…
continue reading

1
570: Rolling for Initiative with Chad, Will and Sami
50:10
50:10
Play later
Play later
Lists
Like
Liked
50:10Chad, Will and Sami discuss life outside of thoughtbot and the hobbies that occupy them in their down time. Sami talks about taking the cold plunge, Will about his recent efforts with running, before Chad takes his co-hosts down the rabbit hole that is Dungeons and Dragons. — Watch the trailer for Chad’s upcoming production Thresher, a collaboratio…
…
continue reading

1
MITRE bailout, Krebs exits SentinelOne, Apple fixes zero-days
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09MITRE gets last-minute bailout from CISA Krebs exits SentinelOne after security clearance pulled Apple fixes two zero-days exploited in targeted iPhone attacks Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but w…
…
continue reading
Thoughtworks Technology Radar Vol.32 was published at the start of April 2025. Featuring 105 blips, it offered a timely snapshot of what's interesting and important in the industry. Through the process of putting it together, we also identify a collection of key themes that speak to the things that shaped our conversations. This time, there were fo…
…
continue reading
In this edition of Snake Oilers three vendors pitch host Patrick Gray on their tech: Pangea: Guardrails and security for AI agents and applications (https://pangea.cloud) Worried about your AI apps going rogue, being mean to your customers or even disclosing sensitive information? Pangea exists to address these risks. Fascinating stuff. Cosive: A t…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading

1
Audio-Video in .NET with Elias Puurunen
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00Can you integrate performant audio-video into your .NET application? Carl and Richard talk to Elias Puurunen about his work at Tractus Events, where he uses the NDI protocols to bring real-time audio and video streams into his C# application. Elias talks about the power of P/Invoke to access the underlying libraries for controlling video streams, i…
…
continue reading

1
SANS Stormcast Thursday April 17th: Apple Updates; Oracle Updates; Google Chrome Updates; CVE News;
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
…
continue reading
The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and ph…
…
continue reading
Testing Peers Show notes: StorytellingBy Testing Podcast
…
continue reading

1
ep175 Monthly Ecosystem 202504 | mozaic.fm
2:06:46
2:06:46
Play later
Play later
Lists
Like
Liked
2:06:46第 175 回のテーマは 2025 年 4 月の Monthly Ecosystem です。Show Note はこちら: https://mozaic.fm/episodes/175/monthly-ecosystem-202504.htmlBy Jxck
…
continue reading
CISA issued a statement that it execution an option on its contract with MITRE to continue funding the CVE program.
…
continue reading

1
WBIT #7: Exploring WebAssembly with the first SO user to get 10k rep
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28Kyle notes that his only experience with WebAssembly is Blazor. If you’re wondering about Blazor, we covered it on the blog in 2020. While Michael may have been the first user to get 10,000 rep, he’s not stopping there. His current employer, neuRealities, is still in stealth mode, shhhh. Find Michael on his blog and possibly elsewhere.…
…
continue reading

1
894: Open Source Matters w/ Chad Whitacre
1:01:15
1:01:15
Play later
Play later
Lists
Like
Liked
1:01:15Wes and Scott talk with Chad Whitacre, the newest member of the Syntax team, about all things open source—licenses, controversies, economics, and ethics. Chad breaks down what most people misunderstand, and how companies can support sustainable software development the right way. Show Notes 00:00 Welcome to Syntax! 00:39 Meet Chad Whitacre 03:39 Ch…
…
continue reading

1
Government CVE funding set to end, 4chan down following an alleged hack, China accuses US of launching advanced cyberattacks
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Government CVE funding set to end Tuesday 4chan, the internet's most infamous forum, is down following an alleged hack China accuses US of launching 'advanced' cyberattacks, names alleged NSA agents Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time vis…
…
continue reading
In 2009, a Pennsylvania high school accused sophomore Blake Robbins of dealing drugs—based on a photo secretly taken through his school-issued laptop. The image, captured without his knowledge in his own bedroom, turned out to show candy. But the real story wasn’t about what was in his hand—it was about how the school got the photo in the first pla…
…
continue reading

1
Identity Theft and Tax Records, Purchasing Fake IDs for Hacker Forums and more: Cyber Security Today for April 16, 2025
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20In this episode of Cybersecurity Today, hosted by Jim Love, the show salutes Katie Moussouris of Luta Security for her courage in speaking truth to power. The episode covers various significant news in the cybersecurity world: the explosion of identity theft in Canada’s tax system, Prodaft’s strategic purchase of hacker forum accounts for intellige…
…
continue reading

1
Risky Business #788 -- Trump targets Chris Krebs, SentinelOne
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35On this week’s show Patrick Gray talks to former NSA Cybersecurity Director Rob Joyce about Donald Trump’s unprecedented, unwarranted and completely bonkers political persecution of Chris Krebs and his employer SentinelOne. They also talk through the week’s cybersecurity news, covering: Mitre’s stewardship of the CVE database gets its funding DOGE’…
…
continue reading

1
SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK
3:14:37
3:14:37
Play later
Play later
Lists
Like
Liked
3:14:37Android to get "Lockdown Mode". What's in the new editions of Chrome and Firefox? Why did Apple silently re-enable automatic updates? My new iPhone 16, Chinese tariffs and electronics. Dynamic "hotpatching" coming to Win11 Enterprise & Edu. Why is it so difficult for Oracle to fess up? Another multi-year breach inside US Treasury. An Apple -vs- the…
…
continue reading

1
SANS Stormcast Wednesday Apr 16th: File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
…
continue reading
I'm Back Home; Perth Event Next Week; Partner Placement in Have I Been Pwned; The New UX is Looking *Amazing*! Sponsored by Malwarebytes https://www.troyhunt.com/weekly-update-447/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental…
…
continue reading
What’s the best strategy for an organization undergoing a very large Agile transformation to see tangible, sustainable results? Scaled Agile strategic advisor Travis Moorer shares his tips in this episode. Like what you hear? Connect with Travis on LinkedIn. Explore SAFe courses here.By Scaled Agile, inc.
…
continue reading
Brent Jensen and Alan Page Show notes: Episode 219: Mailbag and Goodbye For NowBy Testing Podcast
…
continue reading

1
Advancing AppSec With AI With Akira Brand
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Episode Summary In this episode of The Secure Developer, Danny Allan sits down with Akira Brand, AVP of Application Security at PRA Group, to explore the evolving landscape of application security and AI. Akira shares her unconventional journey from opera to cybersecurity, discusses why AppSec is fundamentally a customer service role and breaks dow…
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading

1
879: Serverless, Parallel, and AI-Assisted: The Future of Data Science is Here, with Zerve’s Dr. Greg Michaelson
1:07:14
1:07:14
Play later
Play later
Lists
Like
Liked
1:07:14Greg Michaelson speaks to Jon Krohn about the latest developments at Zerve, an operating system for developing and delivering data and AI products, including a revolutionary feature allowing users to run multiple parts of a program’s code at once and without extra costs. You’ll also hear why LLMs might spell trouble for SaaS companies, Greg’s ‘good…
…
continue reading

1
Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don’t Matter
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Mike D’Arezzo, executive director of infosec and GRC, Wellstar Health Systems. In this episode: The shift left myth Reconsidering CISO evaluations The power …
…
continue reading

1
Prometheus and Open-Source Observability with Eric Schabell
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
…
continue reading

1
The SECRET Message In Moby Dick's Final Chapter | Day 11
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Find your Spy Superpower: https://yt.everydayspy.com/4j4CPAZ I just finished reading Moby Dick, by Herman Melville, and I’m shocked by how much the ending of this book moved me. SPOILER ALERT: I share the ending of Moby Dick in detail as I deliver my analysis of the lessons, insights, and relevancy shared in the final chapters. In many ways, finish…
…
continue reading

1
Slopsquatting risks, Morocco leak, EC ups US-based staff security
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11AI code dependencies are a supply chain risk Morocco investigates social security leak European Commission increases security measures for US-bound staff Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading

1
USDS insider says DOGE’s audits are like nothing she’s ever seen
25:25
25:25
Play later
Play later
Lists
Like
Liked
25:25DOGE says it’s rooting out waste, fraud, and abuse. But in her first media interview, one insider at the U.S. Digital Service says DOGE’s “audit” felt more like a purge. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
A Conversation with Patrick Duffy from Material Security
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47➡ Secure what your business is made of with Martial Security: https://material.security/ In this episode, I speak with Patrick Duffy from Material Security about modern approaches to email and cloud workspace security—especially how to prevent and contain attacks across platforms like Google Workspace and Microsoft 365. We talk about: • Proactive S…
…
continue reading