Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A podcast about web design and development.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
next generation web podcast
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Join our weekly discussion about how to build top end Angular applications and become an Angular expert. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-angular--6102018/support.
…
continue reading
Technical interviews about software topics.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
1
SE Radio 647: Praveen Gujar on Gen AI for Digital Ad Tech Platforms
52:01
52:01
Play later
Play later
Lists
Like
Liked
52:01
Praveen Gujar, Director of Product at LinkedIn, joins SE Radio host Kanchan Shringi for a discussion on how generative AI (GenAI) is transforming digital advertising technology platforms. The conversation starts with a look at how GenAI facilitates scalable ad content creation, using self-attention mechanisms for customized ad generation. They expl…
…
continue reading
1
Week in Review: Flax Typhoon sanctioned, French military ransomware, ICAO breach claims
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bil Harmer, operating partner and CISO, Craft Ventures Thanks to our show sponsor, Nudge Security Nudge Security helps you mitigate security risks stemming from SaaS sprawl by discovering every SaaS account ever created by anyone in y…
…
continue reading
1
Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. - SWN #441
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03
Bad Cameras, Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-441
…
continue reading
1
Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. - SWN #441
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03
Bad Cameras, Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-441
…
continue reading
New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organizatio…
…
continue reading
Mat Ryer is back! He plays the piano, we tell each other truths/lies, we pay homage to the 8” floppy disk, Mat accepts an open source medal, and so much more. It’s a real circus. MatGPT! Join the discussion Changelog++ members get a bonus 11 minutes at the end of this episode and zero ads. Join today! Sponsors: Sentry – Use the code CHANGELOG when …
…
continue reading
1
Worldwide Proton outage, Baymark Health breach, Treasury breach update
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28
Proton recovers from worldwide outage BayMark Health Services announces data breach U.S. Treasury breach linked to Silk Typhoon group Huge thanks to our sponsor, Nudge Security Are you struggling to secure your exploding SaaS footprint? With Nudge Security, you can discover all SaaS apps and accounts, manage access, ensure secure configurations, ve…
…
continue reading
1
90 Percent of Free VPNs Have Security Weaknesses: Cyber Security Today for Friday, January 10, 2025
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53
Cybersecurity Alert: Free VPN Risks, Packers' Data Breach, and SonicWall Vulnerability In this episode, host Jim Love delves into critical cybersecurity issues including the hidden dangers of free VPNs, a payment skimmer attack on the Green Bay Packers’ online pro shop, and a severe vulnerability in SonicWall’s SonicOS firmware. Learn why 90% of fr…
…
continue reading
Bret and Nirmal reunite for their traditional annual Holiday Special episode of breaking down the most significant developments in cloud native from 2024 and sharing predictions for 2025. 💥 This episode is brought to you by our valued sponsor and friends at Aikido!💥 Aikido is a no-nonse platform that helps developers get security done. It consolida…
…
continue reading
This week, we dive into the state of SBOMs, what’s going on with Harness, and the ongoing collision of tech and politics. Plus, Coté finds himself a stranger in the Texas he once called home. Watch the YouTube Live Recording of Episode 501 Runner-up Titles Who knows what’s going to happen on that side of the planet? There are no hacks in The Nether…
…
continue reading
1
“Data is the key”: Twilio’s Head of R&D on the need for good data
28:31
28:31
Play later
Play later
Lists
Like
Liked
28:31
Twilio, a communication platform as a service (CPaaS), allows developers to build voice, video, and messaging capabilities into their apps. Devs can get started with their docs. Find Inbal on LinkedIn. Kudos to Stack Overflow user Wesos de Queso for explaining how to Prevent a toggle group from not having a toggle selected - Java FX. AI, Twilio, In…
…
continue reading
1
Mic Drop: Russia’s unexpected wartime real estate boom
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04
Russia’s military spending has propped up the economy, made some military families rich and set off a housing boom. But some worry the center will not hold.By Recorded Future News
…
continue reading
1
Threat Actors With A Thousand Names - PSW #856
2:07:18
2:07:18
Play later
Play later
Lists
Like
Liked
2:07:18
DNA sequencer vulnerabilities, threat actor naming conventions, new CNAs and problems, backdoors are not secrets (again), The RP2350 is hacked!, they know where your car is, treasury department hacked, what if someone hacked license plate cameras? Tenable CEO passes away, and very awkwardly, a Nessus plugin update causes problems, who needs fact-ch…
…
continue reading
1
Biden’s final cyber order tackles digital weaknesses.
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37
The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple vulnerabilities in its retired migration tool. Fake exploits for Micro…
…
continue reading
1
Take hold of your own performance with Ash Coleman Hynie
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33
Ash Hynie created CountrPT as to bridge the gap between manager perception and employee impact. Folks are tired, folks feel micro-managed, there's all this talk about return to office (RTO). Did we hire grown adults or not? What's the right way to manage technical teams, remote or other wise? How do we build relationships within our teams and with …
…
continue reading
Jim and Allan explain the benefits of a lithium iron phosphate “UPS”, whether it’s possible to delete every single copy of a file, and using Bluetooth in a Windows 11 VM. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes Discussion Anker SOLIX C300 Anker SOLIX F3800 Free Consulting We were asked about using Blueto…
…
continue reading
1
8 things you should know about microfrontends with Florian Rappl
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12
Florian Rappl, solutions architect at smapiot GmbH, joins the podcast to give insights on micro frontends, discussing the misconceptions, architectural patterns, challenges, and exciting benefits of using micro frontends over traditional monolithic applications. Links https://florian-rappl.de https://github.com/FlorianRappl https://x.com/FlorianRap…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLock…
…
continue reading
1
AI Developer Tools at Google with Paige Bailey
37:28
37:28
Play later
Play later
Lists
Like
Liked
37:28
Over the years, Google has released a variety of ML, data science, and AI developer tools and platforms. Prominent examples include Colab, Kaggle, AI Studio, and the Gemini API. Paige Bailey is the Uber Technical Lead of the Developer Relations team at Google ML Developer Tools, working on Gemini APIs, Gemma, AI Studio, Kaggle, Colab and Jax. She j…
…
continue reading
1
AI Developer Tools at Google with Paige Bailey
37:28
37:28
Play later
Play later
Lists
Like
Liked
37:28
Over the years, Google has released a variety of ML, data science, and AI developer tools and platforms. Prominent examples include Colab, Kaggle, AI Studio, and the Gemini API. Paige Bailey is the Uber Technical Lead of the Developer Relations team at Google ML Developer Tools, working on Gemini APIs, Gemma, AI Studio, Kaggle, Colab and Jax. She j…
…
continue reading
1
PowerSchool hacked, Cyber Force study, EC gets GDPR fine
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23
PowerSchool hacked Lawmakers expected to revive attempts for new Cyber Force study European Commission receives first GDPR fine Huge thanks to our sponsor, Nudge Security Nudge Security is the only solution for SaaS security and governance that can discover up to two years of historical SaaS spend along with usage insights so you can uncover wasted…
…
continue reading
1
Exploring the intersections of software architecture
43:32
43:32
Play later
Play later
Lists
Like
Liked
43:32
Software architecture necessarily intersects with a diverse range of critical things, including implementation, infrastructure, data and engineering practices. All these elements require serious consideration and reflection if you're to architect effectively. To discuss these various intersections, Thoughtworks' Neal Ford and his long-time collabor…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diam…
…
continue reading
1
Architectural Intelligence with Thomas Betts
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00
How is your architectural intelligence? Carl and Richard talk to Thomas Betts about his thoughts on implementing AI-related technologies into applications. Thomas talks about stripping the magic out of AI and focusing on the realities - in the end, it's just another API you can call. The conversation digs into what useful implementations of large l…
…
continue reading
1
The power of the button (Interview)
1:12:33
1:12:33
Play later
Play later
Lists
Like
Liked
1:12:33
Rachel Plotnick joins us for the first show of 2025 to discuss her book “Power Button” and the research she did, and why we love/hate buttons so much. We also discuss her upcoming book “License to Spill” as well as the research she’s doing on energy drinks. Join the discussion Changelog++ members save 9 minutes on this episode because they made the…
…
continue reading
1
Honey in hot water, and reset your devices
37:16
37:16
Play later
Play later
Lists
Like
Liked
37:16
Ever wonder how those "free" browser extensions that promise to save you money actually work? We dive deep into the controversial world of Honey, the coupon-finding tool owned by PayPal, and uncover a scheme that might be leaving you with less savings and your favorite YouTubers with empty pockets. Plus, we take a look at Kagi, the search engine yo…
…
continue reading
Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFace. A PayPal phishing scam exploits legitimate platform functionality.…
…
continue reading
Scott and Wes look into their crystal ball to predict what’s coming in web development next year. From the rise of on-device AI to the vanilla CSS comeback, Bun’s big moves, and React’s evolution, this episode is packed with bold predictions and hot takes! Show Notes 00:00 Welcome to Syntax! 02:00 Brought to you by Sentry.io. 03:09 The agenda. 03:4…
…
continue reading
1
DOP 297: Streamline Access Control Using Cerbos
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42
#297: In today's digital landscape, ensuring secure and efficient access to systems is crucial. Authorization plays a vital role in granting the right access levels — but how can businesses implement it effectively? In this episode, we speak with Alex Olivier, co-founder & CPO at Cerbos, about how Cerbos presents an adaptable solution that streamli…
…
continue reading
1
Game Emulation on the Carbon Engine with Dimitris “MVG” Giannakis
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05
Video game emulation is the process of using software to replicate the functionality of gaming hardware. It’s a fundamental approach to making older games accessible on modern devices. The Carbon Engine is a tool developed internally at video game publisher and distributor Limited Run Games. It allows a variety of emulators to interface with modern…
…
continue reading
1
Game Emulation on the Carbon Engine with Dimitris “MVG” Giannakis
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05
Video game emulation is the process of using software to replicate the functionality of gaming hardware. It’s a fundamental approach to making older games accessible on modern devices. The Carbon Engine is a tool developed internally at video game publisher and distributor Limited Run Games. It allows a variety of emulators to interface with modern…
…
continue reading
1
602: Dude, You're Getting a Dell Pro Max Micro Plus!
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30
CES 2025 Secrets Revealed: A developer’s dream or just more hype? Plus, NVIDIA flexes its AI muscles, and we're admittedly impressed. Then, our thoughts on Dell's historic rebrand. Sponsored By: Bitcoin Well: Bitcoin sent directly to your wallet is the safest way to buy Bitcoin. Immediate settlement, direct to self-custody. Supports the Lightning N…
…
continue reading
1
Organizations Must Adapt To Safeguard Data In Evolving Environments - Lamont Orange - BSW #377
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45
Data is the fastest growing enterprise attack surface, and is projected to surpass 181 Zettabytes in 2025. Couple data growth with the growing demands of Artificial Intelligence, and the attack surface expands even more. How should organizations adapt their security programs to safeguard their data? Lamont Orange, Chief Information Security Officer…
…
continue reading
1
North Korean Hackers Targeting MacOS: Cyber Security Today for Wednesday, January 8, 2025
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47
Cybersecurity Updates: New US Cyber Trust Mark & Rising Threats In this episode of Cyber Security Today, host Jim Love discusses the launch of the US Cyber Trust Mark, a new cybersecurity safety label for smart devices. The episode also covers increasing Mac OS attacks by North Korean hackers, including the discovery of the Spectral Blur backdoor, …
…
continue reading
1
Cyber Trust label, UK deepfake laws, Treasury attack details
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28
Cyber Trust marks to roll out in 2025 UK to criminalize sexually explicit deepfakes CISA says government hack limited to Treasury Huge thanks to our sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, and Google Workspace. With Nudge, you’ll be alerted of identity security risks like weak or…
…
continue reading
1
Failing fast at scale: Rapid prototyping at Intuit
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
To learn more about technology or careers at Intuit, visit intuit.com/technology. Want to read more about rapid prototyping at Intuit? To connect with Himanshu, find him on LinkedIn.By Stack Overflow
…
continue reading
1
SN 1007: AI Training & Inference - Unencrypted Email, Doom Captcha
2:46:51
2:46:51
Play later
Play later
Lists
Like
Liked
2:46:51
The consequences of Internet content restriction. The measured risks of 3rd-party browser extensions. The consequences of SonicWall's unpatched 9.8 firewall severity. The incredible number of still-unencrypted email servers. SonicWall vulnerability patching Shadowserver Foundation & eMail Encryption Salt Typhoon Evicted HIPAA gets a long-needed cyb…
…
continue reading
1
SE Radio 650: Robert Seacord on What's New in the C Programming Language
50:00
50:00
Play later
Play later
Lists
Like
Liked
50:00
Robert Seacord, the Standardization Lead at Woven by Toyota, the convenor of the C standards committee, and author of The CERT® C Coding Standard, Effective C, and Secure Coding in C and C++, speaks with SE Radio host Gavin Henry about What's New in the C Programming Language. They start with a review of the history of C and why it has a standard, …
…
continue reading
1
Ättestupa, Moxa, Typhoons, WordPress, Likert Scales, Algol, Josh Marpet, and more... - SWN #440
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11
Ättestupa, Moxa, Typhoons, WordPress, Likert Scales, Algol, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-440
…
continue reading
1
Ättestupa, Moxa, Typhoons, WordPress, Likert Scales, Algol, Josh Marpet, and more... - SWN #440
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11
Ättestupa, Moxa, Typhoons, WordPress, Likert Scales, Algol, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-440
…
continue reading
1
DefectDojo and Bringing Quality Appsec Tools to Small Appsec Teams - Greg Anderson - ASW #312
1:07:10
1:07:10
Play later
Play later
Lists
Like
Liked
1:07:10
All appsec teams need quality tools and all developers benefit from appsec guidance that's focused on meaningful results. Greg Anderson shares his experience in bringing the OWASP DefectDojo project to life and maintaining its value for over a decade. He reminds us that there are tons of appsec teams with low budgets and few members that need tools…
…
continue reading
1
U.S. sanctions spark cyber showdown with China.
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17
China criticizes U.S. sanctions. School districts face cyberattacks over the holiday season. The U.N.’s International Civil Aviation Organization (ICAO) is investigating a potential data breach. Eagerbee malware targets government organizations and ISPs in the Middle East. A major New York medical center notifies 674,000 individuals of a data breac…
…
continue reading
1
Securing The Future: How AI Is Transforming Vulnerability Detection With Berkay Berabi
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45
Episode Summary Imagine if AI could detect and fix vulnerabilities in your code faster and with greater precision than ever before. That future is already here! In today’s episode, we’re joined by Berkay Berabi, an AI researcher and Senior Software Engineer at Snyk, to dive into the cutting-edge world of AI-powered vulnerability detection. Berkay o…
…
continue reading
1
Ewww! How Long Has This Router Been in the Fridge?
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Yabing Wang, VP and CISO, Justworks. In this episode: Building a path to action Cracking the EOL conundrum The burning platform question…
…
continue reading
1
What is Command Query Responsibility Segregation (CQRS) with Derek Comartin - .NET 213
50:14
50:14
Play later
Play later
Lists
Like
Liked
50:14
In this episode of Adventures in .NET, guest Derek Comartin talks to us about Command Query Responsibility Segregation. He explains CQRS benefits, downsides and usage in real world situations. Links MediatR Brighter CodeOpinion Jimmy Bogard Picks Shawn - A First Look at Unreal Engine 5 Caleb - DragonHumpers Wai - Ring Fit Adventure Derek - Build St…
…
continue reading
1
Going Serverless in Financial Services with Brian McNamara
37:58
37:58
Play later
Play later
Lists
Like
Liked
37:58
Serverless computing is a cloud-native model where developers build and run applications without managing server infrastructure. It has largely become the standard approach to achieve scalability, often with reduced operational overhead. However, in banking and financial services, adopting a serverless model can present unique challenges. Brian McN…
…
continue reading