show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Legacy Code Rocks explores the world of modernizing existing software applications. Hosts Andrea Goulet and M. Scott Ford of Corgibytes are out to change the way you think about legacy code. If you’re like a lot of people, when you hear the words “legacy code” it conjures up images of big mainframes and archaic punch card machines. While that’s true — it only tells a small part of the story. The truth is, the code you leave behind is your legacy, so let's make it a good one.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. * ITSPmagazine is a free online publication that focuses on technology and the influence that it has ...
 
Streaming Audio is a podcast from Confluent, the team that built Apache Kafka®️. Host Tim Berglund (Senior Director of Developer Experience, Confluent) and guests unpack a variety of topics surrounding Apache Kafka, event stream processing and real-time data. The show also features the segment "Ask Confluent," in which Gwen Shapira (Engineering Manager, Confluent) and guests respond to a handful of questions and comments about the Confluent and Kafka ecosystems—from Kafka connectors, to dist ...
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are. Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
The ThoughtWorks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
 
We're not talking dentistry here; FLOSS all about Free Libre Open Source Software. Join host Doc Searls and his rotating panel of co-hosts every Wednesday as they talk with the most interesting and important people in the Open Source and Free Software community. Records live every Wednesday at 12:30pm Eastern / 9:30am Pacific / 16:30 UTC.
 
A podcast interested in the how's and why's of user experience research. Through interviews with industry experts and hands-on trial and error, we indulge and celebrate curiosity. Expect to test assumptions, examine methods, and engage in some old fashion experiments.
 
Wireframe reveals the stories behind user experience design, for UX/UI designers, graphic designers, and the design-curious. Hosted by Khoi Vinh, principal designer at Adobe and one of Fast Company’s 100 Most Creative People in Business, the podcast explores unexpected ways that user experience design helps technology fit into our lives.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
#ProdMgmtTalk Professionals forwarding the movement for product excellence by design. Discussions about the art, craft and discipline required for products that contribute value. All aspects of customer development, user experience, product innovation, design, development, marketing and scaling. @ProdMgmtTalk Founded by @CindyFSolomon talking with thought leaders from Silicon Valley and beyond. @StartupProduct @ProductSummit Syndicating The Everyday Innovator with Chad McAllister.
 
Loading …
show series
 
Today's Heavy Networking jumps into the Free Range Routing (FRR) project, including features of the latest release, what's on the roadmap, and use cases and platform support. Our guest is Donald Sharp, a longtime FRR contributor and Principle Engineer at NVIDIA. The post Heavy Networking 541: An Update On Free Range Routing appeared first on Packet…
 
Today's Heavy Networking jumps into the Free Range Routing (FRR) project, including features of the latest release, what's on the roadmap, and use cases and platform support. Our guest is Donald Sharp, a longtime FRR contributor and Principle Engineer at NVIDIA. The post Heavy Networking 541: An Update On Free Range Routing appeared first on Packet…
 
Today's Heavy Networking jumps into the Free Range Routing (FRR) project, including features of the latest release, what's on the roadmap, and use cases and platform support. Our guest is Donald Sharp, a longtime FRR contributor and Principle Engineer at NVIDIA. The post Heavy Networking 541: An Update On Free Range Routing appeared first on Packet…
 
Thie week's tools, tips and tricks talks about Scam Bunkers. This website I found, after the fact, from my little scam incident I talked about in Episode 836. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five R…
 
Recently, I had the opportunity to be part of the official launch of Cyber Ireland in Cork. Following the event, I was able to spend a few minutes with Dr. Eoin Byrne, Cyber Ireland’s cluster manager, along with a couple of the cluster’s board members — Jacky Fox, Cyber & IT Forensic Lead at Deloitte, and Pat Larkin, CEO at Ward Solutions. During o…
 
In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke to Nishant Bhajaria about security, data privacy, ethics and privacy by design.Curated transcript and more information on the https://bit.ly/2G36qNwFollow us on Facebook, Twitter, LinkedIn, Youtube: @InfoQ Follow us on Instagram: @infoqdotcomStay informed on emerging trends, pee…
 
This week we talk about watch face design, homescreen customization and another app Kevin's never going to actually ship. Sponsor Webflow: Webflow empowers designers to build professional, custom websites in a completely visual canvas. Use code LAYOUT for 10% off on annual plans with a new account. Show Notes U1 chip on Series 6 The Problem with Ti…
 
Evolutionary Ethics for AI means that the “Success of AI and AI Ethics requires a new approach. One that harmonizes the partnership between the destiny of humanity and artificial intelligence.” - M. J. Bailey In this episode of The Future Of The Future, we had the honor to discuss the book Inventing World 3.0 with the author, right before it is pub…
 
This episode talks about a scam website that I, unfortunately, fell for and made a purchase from. It can happen to anyone, even security professionals and experts. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In F…
 
A thriller about a Silicon Valley pioneer who joins forces with a Special Agent to stop the A.I. he created from destroying humanity. Starting October 6th, NEXT airs every Tuesday at 9/8c on FOX. On this episode of Cyber, in partnership with FOX, we sit down with the show’s creator Manny Coto to talk about the inspiration for this thriller A.I. Cot…
 
Nowadays, we have some significant cybersecurity scenarios to deal with at a national level. These challenges require top-level leadership and a response that must also be supported at a national level. This is precisely what Chris Krebs, Director of the U.S. Cybersecurity and Infrastructure Security Agency, is focused on, leading a team to identif…
 
Greg Nokes is a Master Technical Architect at Heroku, and he's interviewing a returning guest, Ryan Townsend, the CTO of SHIFT Commerce. SHIFT Commerce is an e-commerce PaaS that provides an online space for businesses to host their websites and sell their goods. Their customers aren't exclusively virtual; some of them have brick-and-mortar shops w…
 
User freedom, consent & rights. What are the rights users have when using technology built by big tech? Doc Searls and Dan Lynch talk with Molly De Blanc and Karen Sandler, and discuss their Declaration of Digital Autonomy. The declaration was created to build awareness and ideally change people's rights and freedoms when it comes to technology. Th…
 
Today's Tech Bytes podcast, sponsored by Dell Technologies, examines an Azure Stack HCI offering from Dell EMC. Dell worked with Intel and Microsoft to optimize the performance and scale of the Azure Stack platform, including the use of Intel Optane's persistent memory. Our guests are Jayanth YK, Sr. Cloud Architect - Microsoft Hybrid Cloud at Dell…
 
Today's Tech Bytes podcast, sponsored by Dell Technologies, examines an Azure Stack HCI offering from Dell EMC. Dell worked with Intel and Microsoft to optimize the performance and scale of the Azure Stack platform, including the use of Intel Optane's persistent memory. Our guests are Jayanth YK, Sr. Cloud Architect - Microsoft Hybrid Cloud at Dell…
 
Prologue This week we welcome Greg Foss to the show - Greg has some experience in security operations and managing SOCs and such. He dishes, we laugh, we learn, and hopefully you'll enjoy. Lots of topics covered including my personal favorite: "tools in the SOC" - in which we discuss how tools are actually hurting SOC efficiency and such. Guest Gre…
 
Contact tracing apps have been developed to help health officials study the spread of the Covid pandemic. There are privacy concerns around the type of data, specifically location, that these apps participate in. Thie episode goes through the types of location collection methods. I encourage to read the full article for all the details - https://bi…
 
What apps belong in the cloud and which are better on premises? Dave Wagner, Senior Manager, Product Marketing at SolarWinds, joins Day Two Cloud to develop a strategy and find the right tooling to help you make the best decision. SolarWinds is the sponsor for today's episode. The post Day Two Cloud 067: Choosing The Right Applications For The Clou…
 
What apps belong in the cloud and which are better on premises? Dave Wagner, Senior Manager, Product Marketing at SolarWinds, joins Day Two Cloud to develop a strategy and find the right tooling to help you make the best decision. SolarWinds is the sponsor for today's episode. The post Day Two Cloud 067: Choosing The Right Applications For The Clou…
 
Supporting the show: I decided to stop taking sponsors for the show because I think advertisements are annoying and no one wants to listen to them.If you do want to support the show, the best way to do it is to check out our products: Tailwind UI, a collection of professionally designed, fully responsive HTML components built with Tailwind CSS. Sta…
 
My latest essay on the timeless debate on SSH ports and Security by Obscurity. I talk about why changing your port is not usually obscurity, and give what I believe to be an airtight method of how you can tell the difference between regular security and Security by Obscurity. Support the show: https://danielmiessler.com/support/ See omnystudio.com/…
 
iOS 14 & Android 11 security features, DuckDuckGo gets big. The most important iOS 14 privacy & security features All of Android 11's new privacy & security features DuckDuckGo usage growth goes exponential LAN attack bug fixed in Firefox 79 for Android Goodbye Forever Firefox Send and Notes... Oh, how we loved ye Microsoft's catastrophic Zerologon…
 
Zero Trust sounds impressive and futuristic, but it isn't really a new concept — and what does it actually mean? It is not that different from past trust models such as Trust But Verify and Least Privilege. So, here we are once again, stating the obvious: if we don't think differently about the problems we face, we're not going to be able to solve …
 
Today's Full Stack Journey podcast explores AWS Controllers for Kubernetes (ACK). Currently available as a developer preview, the ACK project lets customers manage their AWS services directly from Kubernetes. Our guide to ACK is Justin Garrison, a container advocate at AWS and author. The post Full Stack Journey 046: Understanding AWS Controllers F…
 
Today's Full Stack Journey podcast explores AWS Controllers for Kubernetes (ACK). Currently available as a developer preview, the ACK project lets customers manage their AWS services directly from Kubernetes. Our guide to ACK is Justin Garrison, a container advocate at AWS and author. The post Full Stack Journey 046: Understanding AWS Controllers F…
 
Today's Full Stack Journey podcast explores AWS Controllers for Kubernetes (ACK). Currently available as a developer preview, the ACK project lets customers manage their AWS services directly from Kubernetes. Our guide to ACK is Justin Garrison, a container advocate at AWS and author. The post Full Stack Journey 046: Understanding AWS Controllers F…
 
iOS14 is now available and if you haven't upgraded to it yet you should. This episode talks about the details of one of the new privacy features you should know about and how to control it when it comes to your camera and microphone. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security I…
 
Global Product Management Talk is pleased to bring you the next episode of... The Everyday Innovator with host Chad McAllister, PhD. The podcast is all about helping people involved in innovation and managing products become more successful, grow their careers, and STANDOUT from their peers. About the Episode: In this discussion we visit two topics…
 
“Agile is a devastated wasteland. The life has been sucked out of it.” Those are the words of Kent Beck, creator of Extreme Programming, and co-signer of the Agile Manifesto. According to Kent, many development teams have adopted Agile methodologies without understanding their purpose. In today’s episode, we’ve recruited Aaron Foster Braylin and St…
 
On this episode Jenny chats to Diversity and Inclusion advocate and male ally of the year Nathan Chung, about his career in infosec, his belief in the power of technology to overcome global challenges, and his continued support for women in leadership and in tech. Thanks to Nathan for a great interview. Guest(s) Nathan Chung This Episode’s Sponsors…
 
We asked our co-host, Theresa Payton, to bring a fantastic guest; she got one of the most badass guests you could ever find: Alison Levine. We tried to summarize in a few paragraphs the stories she recounted, but they are just too many — Furthermore, unless you hear them from her, you wouldn't believe us. Here, to get the story started, are some fa…
 
It's a baker's dozen of tech news in today's Network Break episode. We analyze Nvidia's $40 billion bid for Arm, Broadcom's banishment of Cumulus, vSphere's Kubernetes injection via Tanzu, a new hardware strategy from Extreme, new products from Palo Alto and Juniper, and more! The post Network Break 302: Nvidia Bids Billions For Arm; VMware Melds K…
 
It's a baker's dozen of tech news in today's Network Break episode. We analyze Nvidia's $40 billion bid for Arm, Broadcom's banishment of Cumulus, vSphere's Kubernetes injection via Tanzu, a new hardware strategy from Extreme, new products from Palo Alto and Juniper, and more! The post Network Break 302: Nvidia Bids Billions For Arm; VMware Melds K…
 
Our Legacy Code Rocks community is turning five this year. To mark this exciting milestone, we decided to catch up with Woody Zuill, our frequent guest, and a person who always manages to teach us something new and exciting. Woody is best known for introducing mob programming to the world, and so we kick-off the show by discussing mob programming i…
 
A survey done by TrendMicro shows how employees are using personal devices to access business apps and data. This episode goes through the results and talks about how this new threat needs to be handled by security teams. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————…
 
Did you know that a team of 900 developers at Wix is using Apache Kafka® to maintain 1,500 microservices? Tim Berglund sits down with Natan Silnitsky (Backend Infrastructure Engineer, Wix) to talk all about how Wix benefits from using an event streaming platform. Wix (the website that’s made for building websites) is designing a platform that gives…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login