Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A podcast about web design and development.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
next generation web podcast
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Technical interviews about software topics.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Audio podcasts on software testing.
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
Vibe coding is the new vibe, AI engineers are all taking about MCP, Tom Usher wants you to kill your algorithmic feeds, Curiositry shares his troubleshooting expertise, Nikola Ðuza thinks we should keep blogging for the LLMs & James Stanier answers the question, should managers still code? View the newsletter Join the discussion Changelog++ members…
…
continue reading

1
SE Radio 658: Tanya Janca on Secure Coding
1:11:40
1:11:40
Play later
Play later
Lists
Like
Liked
1:11:40Tanya Janca, author of Alice and Bob Learn Secure Coding, discusses secure coding and secure software development life cycle with SE Radio host Brijesh Ammanath. This session explores how integrating security into every phase of the SDLC helps prevent vulnerabilities from slipping into production. Tanya strongly recommends defining security require…
…
continue reading

1
Vercel’s Developer Frameworks with Ary Khandelwal and Max Leiter
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25The availability of high-quality AI model APIs has drastically lowered the barriers developing AI applications. These tools abstract away complex tasks such as model deployment, scaling, data retrieval, natural language processing, and text generation. Vercel has developed a complementary set of tools for building AI web applications, including the…
…
continue reading

1
Episode 448: Title over salary and from figure skater to software developer
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01In this episode, Dave and Jamison answer these questions: A listener named Steven says, Long-time listener of the podcast here—it always brings me so much joy! Should I prioritize title over salary? I’m currently based in Europe, working as a Senior Engineer at a big company that pays really well. The problem is, there’s almost no chance for promot…
…
continue reading

1
SANS Stormcast Tuesday Mar 11th: Shellcode as UUIDs; Moxe Switch Vuln Updates; Opentext Vuln; Livewire Volt Vuln;
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Shellcode Encoded in UUIDs Attackers are using UUIDs to encode Shellcode. The 128 Bit (or 16 Bytes) encoded in each UUID are converted to shell code to implement a cobalt strike beacon https://isc.sans.edu/diary/Shellcode%20Encoded%20in%20UUIDs/31752 Moxa CVE-2024-12297 Expanded to PT Switches Moxa in January first releast an update to address a fr…
…
continue reading
PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI a…
…
continue reading
The Pentagon’s Hollywood offices claim that they don’t pitch, they don’t try to push certain content into the culture industries.... The post ClandesTime 280 – How the US Military Pitches Hollywood first appeared on Spy Culture.By Tom Secker
…
continue reading

1
DevOps Culture and Practice with Tim Beattie
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20Show notes: DevOps Culture and Practice with Tim BeattieBy Testing Podcast
…
continue reading
Nick's Socials Nick on LinkedIn Nick's Youtube Nick's Book NexBotix Coder's Socials Mike on X Mike on BlueSky Coder on X Coder on BlueSky Show Discord AliceBy The Mad Botter
…
continue reading

1
Episode 451: Un-collaborative architect and who is my boss?
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this episode, Dave and Jamison answer these questions: A listener named Scot asks, A new architect was hired at my company 6 months ago. I’m an engineer one rung lower on the hierarchy and have been here for 3.5 years. He hasn’t done much to learn about any of us who have been here for a while, so he is constantly undermining my skills and sugge…
…
continue reading
What are Web Vitals, and why should you care? Scott and Wes break down metrics like LCP, FCP, CLS, and INP, explaining what they measure, how they impact your site’s performance, and how to track them yourself. Show Notes 00:00 Welcome to Syntax! 03:26 What each web vital means. Web Vitals Playground. 03:38 LCP - Largest Contentful Paint. 05:04 FCP…
…
continue reading

1
655: Conspiracy Theory Theories, View Transitions vs CSS Animations, and Autocomplete
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50Show Description It's a speed run meeting edition episode and we're talking conspiracy theories, getting hypnotized, disinformation on TikTok vs the news, view transitions vs CSS animations vs the web animation API, follow ups on font-weight and attire, and classic autocomplete vs AI autocomplete. Listen on Website → Links SubwayTakes (@subwaytakes…
…
continue reading

1
ONCD consolidates power, undocumented Bluetooth commands, Japan NTT Breach
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58ONCD set to consolidate power in U.S. cyber Undocumented commands found in Bluetooth chip used by a billion devices Japanese telecom NTT breach affects 18,000 companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but whe…
…
continue reading

1
New Ransomware As A Service Threats: Cyber Security Today for March 10, 2025
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19This episode also covers recent ransomware as a service (RaaS) trends, including the rise of SpearWing and Akira groups, advanced ransomware techniques exploiting IoT vulnerabilities, and issues with the ESP32 microcontroller's hidden commands. Additionally, Signal President Meredith Whitaker warns about privacy risks in agentic AI systems. Tune in…
…
continue reading

1
SANS Stormcast: Webshells; Undocumented ESP32 Commands; Camera Used For Ransomware Distribution
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Commonly Probed Webshell URLs Many attackers deploy web shells to gain a foothold on vulnerable web servers. These webshells can also be taken over by parasitic exploits. https://isc.sans.edu/diary/Commonly%20Probed%20Webshell%20URLs/31748 Undocumented ESP32 Commands A recent conference presentation by Tarlogic revealed several "backdoors" or undoc…
…
continue reading

1
Defensive Security Podcast Episode 299
1:07:40
1:07:40
Play later
Play later
Lists
Like
Liked
1:07:40Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee’s mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX hypervisors, and a developer’s sabotage of their ex-employer. They also explore the implications of GitH…
…
continue reading

1
Peter Baumann: Adding value to data. [CEO] [Career Notes]
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14Please enjoy this encore of Career Notes. CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, P…
…
continue reading

1
UL NO. 471 | STANDARD EDITION: Cyber Standing Down, China's Innovation Burst, PC vs. NPC, Why AI Can't Understand, and more...
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40STANDARD EDITION: Cyber Standing Down, China's Innovation Burst, PC vs. NPC, Why AI Can't Understand, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member for the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Subscribe to the new…
…
continue reading
Keith Klain Show notes: Show notes: QR Podcast – ISO29119 Roundtable Podcast Site: QR PodcastBy Testing Podcast
…
continue reading
Riding Cyclone Alfred; Backfilling and Cleaning Stealer Logs; Phishing for X Credentials; HIBP UX Soft Launch Next Week; Sponsored by Report URI https://www.troyhunt.com/weekly-update-442/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Botnet’s back, tell a friend. [Research Saturday]
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure…
…
continue reading

1
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from innocent mistakes to malicious actors, and how companies can effectively…
…
continue reading

1
TRAILER | Andrew Bustamante Releases His SPY JOURNAL
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55Welcome to the Spy Journal! CIA teaches officers to use radical transparency to combat the confusion that can come from living and working in multiple names, places, and operations. While some officers keep diaries, I’m choosing to practice my radical transparency with this video journal. I’ll share my thoughts, my challenges, and my breakthroughs …
…
continue reading

1
Week in Review: Hegseth orders stand down, ransomware by snailmail, Mark Cuban’s lifeline
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guest Brett Perry, CISO, Dot Foods Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocke…
…
continue reading
Law enforcement shutters Garantex crypto exchange. NTT discloses breach affecting corporate customers. Malvertising campaign hits nearly a million devices. AI’s role in Canada’s next election. Scammers target Singapore’s PM in AI fraud. Botnets exploit critical IP camera vulnerability. In our International Women's Day and Women’s History Month spec…
…
continue reading

1
Friendly Feud: JS Party Edition (Friends)
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34Our award-winning JS Party game show is back with a new name, a new channel, and the same ol’ survey-response-guessing fun! The JS Party crew join us to see who knows y’all best. Survey says! Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Augment Code – Developer AI …
…
continue reading

1
Antirez returns to Redis! (Interview)
1:33:59
1:33:59
Play later
Play later
Lists
Like
Liked
1:33:59Antirez has returned to Redis! Yes, Salvatore Sanfilippo (aka Antirez), the creator of Redis has returned to Redis and he joined us to share the backstory on Redis, what’s going on with the tech and the company, the possible (likely) move back to open source via the AGPL license, the new possibilities of AI and vector embeddings in Redis, and some …
…
continue reading
Alex’s server meets a tragic end—but its replacement is shaping up to be a beast. Meanwhile, Chris experiments with budget CO₂ detectors, sirens, and smart integrations. Plus some surprises! Sponsored By: Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Tailscale: Tailscale is a Z…
…
continue reading

1
Equifax Reports Rising Fraud In Canada: Cyber Security Today for Friday, March 7, 2025
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Cybersecurity Today: Rising Fraud in Canada and Major Cyber Crime Crackdowns Welcome to another episode of Cybersecurity Today with your host, Jim Love. As fraud prevention month begins, we delve into the rising fraud rates in Canada, with new data from Equifax revealing Canadians' growing concerns about data protection, particularly among seniors …
…
continue reading

1
Company hacked via webcam, Toronto Zoo update, federal contractor obligations
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Ransomware gang bypasses EDR via a webcam Toronto Zoo updates January 2024 attack damage House bill requires federal contractors to implement vulnerability disclosure policies Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day…
…
continue reading

1
Episode 224: Flux Updates & Internal Iteration
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19In this episode, Conor and Ben chat with Tristan Brindle about recent updates to Flux, internal iteration vs external iteration and more. Link to Episode 224 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Ben Deane: Twitter | BlueSky Abo…
…
continue reading
Aidan Raney does threat analysis for Farnsworth Intelligence, a company he founded. When one of his clients got caught up in a North Korean IT worker scheme, Aidan set out on a little mission: to infiltrate one of these operations and understand how it worked. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
Postgres is an open-source database. EDB offers enterprise-grade features and support for Postgres from self-managed to fully-managed, cloud-based DBaaS. Find Jezz on LinkedIn. Shoutout to Stack Overflow user Jonny, who won a Populist badge with their exceptional answer to quantile function for a vector of dates.…
…
continue reading

1
SANS Stormcast Friday Mar 7th: Chrome vs Extensions; Kibana Update; PrePw0n3d Android TV Sticks; Identifying APTs (@sans_edu, Eric LeBlanc)
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53Latest Google Chrome Update Encourages UBlock Origin Removal The latest update to Google Chrome not only disabled the UBlock Origin ad blocker, but also guides users to uninstall the extension instead of re-enabling it. https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html https://www.reddit.com/r/youtube/comments/1j2…
…
continue reading
Video is here: https://youtube.com/live/7bF8l31hLmYBy Yegor Bugayenko
…
continue reading
US Justice Department charges employees of Chinese IT contractor i-Soon. Silk Typhoon targets the IT supply chain for initial access. Chrome extensions that change shape. Attackers target airflow misconfigurations. LibreOffice vulnerability opens the door to script-based attacks. NSO group leaders face charges in spyware case. Today, our own Dave B…
…
continue reading

1
Big Migrations with Louis Beaudoin-Allaire
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Today we delve into the process of migrating data to the cloud with Louis Beaudoin-Allaire, Principal Developer at ShareGate. Scott learns about the benefits of cloud migration and the best practices for a successful transition. Louis shares his expertise on how to move with performance and data integrity. Fanning out and moving huge amounts of dat…
…
continue reading
HP was forcing people to wait on hold for 15 minutes to get support, the DOGE site was embarrassingly insecure, setting up encrypted offsite backups, and mixing SATA and NVMe in a server. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Why FreeBSD is the Right Choice for Embedded Devices News/discusison HP ditc…
…
continue reading
Roy Derks, Developer Experience at IBM, talks about the integration of Large Language Models (LLMs) in web development. We explore practical applications such as building agents, automating QA testing, and the evolving role of AI frameworks in software development. Links https://www.linkedin.com/in/gethackteam https://www.youtube.com/@gethackteam h…
…
continue reading

1
StackHawk and Shift-Left API Security with Scott Gerlach
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08APIs are a fundamental part of modern software systems and enable communication between services, applications, and third-party integrations. However, their openness and accessibility also make them a prime target for security threats, and this makes APIs a growing focus on software teams. StackHawk is a company that scans and monitors source code …
…
continue reading

1
StackHawk and Shift-Left API Security with Scott Gerlach
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08APIs are a fundamental part of modern software systems and enable communication between services, applications, and third-party integrations. However, their openness and accessibility also make them a prime target for security threats, and this makes APIs a growing focus on software teams. StackHawk is a company that scans and monitors source code …
…
continue reading

1
564: Making humans more valuable, not less with Andrei Oprisan
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08Chad talks with Andrei Oprisan, head of engineering at Agent.AI, about his new approach to making AI tools and agents accessible to everyone. Hear how the community are helping to shape and build on Agent.AI in ways the team never thought of, the road blocks of developing such an accessible market place, and the desire to make every AI agent as eas…
…
continue reading

1
Probationary firing protest, hacker names frustration, conversational scam detector
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Former top NSA cyber official protests probationary firings Differing names for hackers hinders law enforcement, says security agent Google releases AI scam detection for Android to fight conversational fraud Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to…
…
continue reading

1
How fitness functions can help us govern and measure AI
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01AI is inherently dynamic: that's true in terms of the field itself, and at a much lower level too — models are trained on new data and algorithms adapt and change to new circumstances and information. That's part of its power and what makes it so exciting, but from a business and organizational perspective, that can make governance and measurement …
…
continue reading
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who s…
…
continue reading

1
The path forward for mergers and monopolies.
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23Please enjoy this encore episode of Caveat. This week on the show, Dave and Ben are excited to welcome N2K's very own Ethan Cook, a trusted policy expert, who will be joining regularly for a new segment. Starting this month, Ethan will be contributing every second week to dive deep into the world of law, privacy, surveillance, and more, offering in…
…
continue reading
React version 19 has been released! Carl and Richard talk to Aurora Scharff about the long-awaited version of React that incorporates React Server Components and many other features. Aurora talks about the rethink involved in switching to a server-first implementation of a React website, which is best suited for greenfield implementations. For exis…
…
continue reading

1
US Cyber Security Confusion: Cyber Security Today for Wednesday, March 5, 2015
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37US Cybersecurity Confusion, Massive ISP Cyber Attack, and Talent Shortages In this episode of 'Cybersecurity Today,' host Jim Love discusses the mounting confusion over the US cybersecurity stance on Russia, following conflicting reports about potential policy changes and operational directives. The show also covers a massive cyber attack that comp…
…
continue reading

1
SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45DShield Traffic Analysis using ELK The "DShield SIEM" includes an ELK dashboard as part of the Honeypot. Learn how to find traffic of interest with this tool. https://isc.sans.edu/diary/DShield%20Traffic%20Analysis%20using%20ELK/31742 Zen and the Art of Microcode Hacking Google released details, including a proof of concept exploit, showing how to …
…
continue reading