Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Podcasts from Akamai's Security Team.
…
continue reading
As one of the longest-running podcasts, "Grumpy Old Geeks" discovers what went wrong on the Internet, and who's to blame. Every week they cut through the BS from big tech and tell you what's really going on. With wide-ranging topics, this show has something for everyone. There is a reason Elon Musk, Mark Zuckerberg, and that crowd all hate this podcast. Listen and find out for yourself!
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Hosted by Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
A weekly podcast about web design and development with a little zest from James Q Quick, Amy Dutton, Brad Garropy, and Bekah HW.
…
continue reading
Welcome to FrontEnd Frontier, where we explore the cutting edge of web development and dive deep into the technologies shaping the digital landscape. Join us as we decode the latest trends, discuss best practices, and interview the experts leading the charge in frontend innovation.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
National Security Law Today brings legal experts discussing the hot topics and current issues in the world of national security law right to your phone. Get information and advice for lawyers, law students or interested parties who want to dig deeper into the law that protects the country.
…
continue reading
The trusted partner in cloud, media, finance, web, and mobile every step of the way. We offer innovative products in finance, media, web and mobile. We offer Cloud and Robotics Services. Customers value us as a trusted partner in their cloud adoption journey. We specialize in Cloud, Media, Corporate Distress & Default, Web and Mobile. In Media, we offer managed services for live streaming and video on demand.
…
continue reading
A podcast about developer tools and the people who make them. Join us as we embark on a journey to explore modern developer tooling and interview the people who make it possible. We love talking to the creators front-end frameworks (React, Solid, Svelte, Vue, Angular, etc), JavaScript and TypeScript runtimes (Node, Deno, Bun), Languages (Unison, Elixor, Rust, Zig), web tech (WASM, Web Containers, WebGPU, WebGL), database providers (Turso, Planetscale, Supabase, EdgeDB), and platforms (SST, A ...
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
In a tech startup, how do you get from an idea on the back of a napkin to a fully functioning product? Code Story is a podcast featuring tech leaders, reflecting the roads they travelled and the products they created. On the show, we interview tech visionaries, digging into the critical moments of what it takes to change an industry, and build (and lead) a team that has your back.Hosted by Noah Labhart, this show is a window into the digital startup world. In their own words, tech veterans s ...
…
continue reading
1
DarkWeb.Today – Hackers & Cyber Security: Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
Actionable intelligence on emerging tech, financial markets, longevity research, and peak performance. Each episode is packed with valuable insights to fuel personal and professional growth, from technologists and scientists to Zen Masters and productivity hackers; this variety show will always provide you with an abundance of unconventional wisdom. Kevin has been recognized as one of Time Magazine's 'Top 25 Most Influential People on the Web' and a 'Top 25 Angel Investor' by Bloomberg, high ...
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Our mission at Liveplex is to be the catalyst for transformation in the digital landscape. We empower enterprises with the tools and expertise needed to embrace Web 3.0 effortlessly. Through our APIs and services, we enable efficiency, data-driven decision-making, personalization, security, and trust, allowing our customers to not only thrive in the digital age but also lead with innovation. We are dedicated to enhancing customer experiences, helping businesses evolve, and shaping the future ...
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
Conversations with industry pros on the latest cloud-first technologies and software development practices.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Welcome to the Digital Desperados Podcast featuring Dark Tales from the Web with Patrick McMurphy. Patrick brings his Irish story telling origins into the limelight as he highlights the Dark Tales of Digital Desperados from around the globe. Cyber Criminal masterminds who are world renowned. Listen in and be prepared to be amazed and intrigued. This podcast is Brought to you by SaferNet VPN.
…
continue reading
1
Bridging the Gap: Open Source Security and Web Development
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30
In this episode, Dan Applequist of Samsung explores the intersection of open source security and web development. Drawing from his extensive experience with the World Wide Web Consortium (W3C) and initiatives like Open Source Security Foundation (OpenSSF) and C2PA, Dan discusses the challenges and opportunities of uniting the open source security c…
…
continue reading
1
Advanced Web Threats: Data Leaks, Shadow IT, and AI
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48
On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from A…
…
continue reading
1
Putin’s Financial Web: Oligarchs, Shell Companies, and Global Sanctions with Stephanie Baker
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
As the world imposes economic sanctions on Russia, the effectiveness of these measures comes under scrutiny. This week, Elisa sits down with Bloomberg journalist Stephanie Baker to discuss her latest book, Punishing Putin: Inside the Global Economic War to Bring Down Russia. Together, they explore how Russia's oligarchs have managed to evade sancti…
…
continue reading
1
Web3 Transitions Summit 2024 | Restaking Revolution: Boosting Security
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57
Web3 Transitions SummitThe Web3 Transitions Summit, taking place alongside Token2049 in Singapore, brought together thought leaders across the verticals of cross-chain, scalability, modularity, zero-knowledge, restaking, gaming, social, and the intersection of web3 and artificial intelligence. It was a one-day summit to inspire a vision of what the…
…
continue reading
1
Ensuring Robust Security for Your AWS S3 Data
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53
Amazon S3 (Simple Storage Service) is a powerful tool for storing and retrieving data from anywhere. However, with great power comes great responsibility, especially regarding securing your data. In this podcast, we will delve into four critical aspects of AWS S3 security: Server-Side Encryption (SSE), Client-Side Encryption (CSE), Cross-Region Rep…
…
continue reading
1
Seamless Log Shipping: ECS to OpenSearch with FireLens A Step-by-Step Guide
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23
Shipping logs from Amazon ECS (Elastic Container Service) to OpenSearch (formerly Elasticsearch) can significantly enhance your ability to analyze, monitor, and troubleshoot your applications. By leveraging FireLens, you can seamlessly forward your ECS task logs to OpenSearch, making it easier to manage and visualize your log data. https://business…
…
continue reading
1
Terraform Outputs: Revealing Your Infrastructure's Secrets
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50
Terraform is a robust Infrastructure as Code (IaC) tool that enables you to define, provision, and manage infrastructure through code. One of its standout features is leveraging outputs to unveil essential information about your infrastructure. This podcast will delve into the various aspects of Terraform outputs, including accessing them via Terra…
…
continue reading
1
Deploying a Secure and Scalable Static Website on AWS: S3, CloudFront, ACM, and Route 53
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22
Deploying a static website on AWS offers a scalable, secure, and cost-effective solution for hosting web content. This podcast will walk you through the steps of securing your domain with AWS Certificate Manager (ACM), hosting static content on Amazon S3, configuring Amazon CloudFront for enhanced delivery, connecting your domain to CloudFront with…
…
continue reading
1
Streamlined Deployment: Deploying Your React App to AWS S3 with Travis CI
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02
Deploying a React application to AWS S3 can seem daunting, but with the power of Travis CI, it becomes a streamlined and automated process. This podcast will walk you through the steps to successfully deploy your React app to AWS S3, enhancing your deployment workflow with Travis CI. https://businesscompassllc.com/streamlined-deployment-deploying-y…
…
continue reading
1
Nate Wienert - Tamagui, One Stack, Zero, and Universal Apps
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36
This week Nate Wienert stop by for a second appearance. Nate is the creator of Tamagui, a framework for building universal apps with React Native. That work led him to create One Stack, a framework for building local first universal apps with React Native. https://onestack.dev/ https://x.com/one__js https://x.com/natebirdman Apply to sponsor the po…
…
continue reading
Cash App class action; Tesla camera-based FSD questioned; Trump Media stock swings; standing desks are the new eggs; Dropbox layoffs; OpenAI Whisper invents parts of transcriptions, frequently; ChatGPT search; post scarcity AI BS; AI coding ouroboros of confusion; Musk crypto scams; Underworld; The Cure; A Man on the Inside; the Diplomat; Instagram…
…
continue reading
1
Teens flip junk into $1M on Facebook Marketplace — Here's how
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44
Kirk and Jacob McKinney saw money in what others tossed out. They started flipping dump finds on Facebook Marketplace in high school, turning junk into serious cash. Now, they’re on track to becoming millionaires. Plus, news on Elon Musk’s new family compound, ChatGPT’s latest updates, and MrBeast’s pitch decks going public.…
…
continue reading
1
Mastering Network Load Balancer Configuration in AWS
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31
A Network Load Balancer (NLB) in AWS is designed to handle millions of requests per second while maintaining ultra-low latencies. It operates at the connection level (Layer 4) and is optimized to handle sudden and volatile traffic patterns. An NLB can distribute incoming traffic across multiple targets, such as Amazon EC2 instances, containers, and…
…
continue reading
1
7.5 - The Rootin’ Tootin’ Best of Wild West Hackin’ Fest
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55
Yeehaw 🤠 This week, Skyler is reporting from the ground in Deadwood, South Dakota at Wild West Hackin' Fest and sits down for an interview with Senior Security Consultant Travis Kaun about the talk he gave there. Our guest Senior Security Consultant Kelsey Segrue, who attended the conference for the first time, chats with Geoff and Skyler about he…
…
continue reading
1
Setting Up a Robust Kubernetes Development Environment on AWS with Infrastructure as Code
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50
In the rapidly evolving world of cloud computing and container orchestration, Kubernetes has become the go-to solution for managing containerized applications at scale. Combining it with Infrastructure as Code (IaC) tools like Terraform and Ansible can streamline the setup and management of your development environments. This podcast will walk you …
…
continue reading
1
Building a Scalable Website on AWS: Why DynamoDB Should Be Your Database Choice
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25
When building a scalable website, choosing the correct database is crucial. Your selected database can significantly impact your website’s performance, scalability, and success. For many developers working within the AWS ecosystem, Amazon DynamoDB emerges as a powerful contender. I’ll explain why DynamoDB is the ideal database choice, especially co…
…
continue reading
1
Mastering Real-Time Analytics with Kinesis Data Analytics: SQL and Apache Flink
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52
Real-time data processing is a game-changer for businesses in the fast-paced digital era. Amazon Kinesis Data Analytics offers two robust options for real-time analytics: Kinesis Data Analytics for SQL Applications and Kinesis Data Analytics for Apache Flink. This podcast delves into these two flavors, exploring their capabilities, benefits, and us…
…
continue reading
1
Configuring Amazon DynamoDB as a Database for AWS EC2 Instances using AWS CLI
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00
Amazon DynamoDB is a fully managed NoSQL database service that offers fast and predictable performance with seamless scalability. Integrating DynamoDB with your AWS EC2 instances can significantly enhance your application’s efficiency. This podcast will guide you through setting up Amazon DynamoDB as a database for your AWS EC2 instances using AWS …
…
continue reading
1
Master Cloud Computing with Free Resources from AWS Educate
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17
Cloud computing has become an essential skill in today’s tech-driven world. AWS Educate offers a fantastic opportunity to dive into this field without breaking the bank. In this podcast, we’ll explore what AWS Educate is, why you should consider using it, how to sign up, and the courses offered by AWS Educate. Let’s get started! https://businesscom…
…
continue reading
1
Building a Scalable E-Commerce Platform on AWS: Automating Deployment with Terraform and Ansible
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03
Building an e-commerce platform involves intricate steps that range from infrastructure setup to software deployment. This project aims to streamline the deployment process by leveraging DevOps principles and Infrastructure as Code (IaC) tools, ensuring a scalable, reliable, and efficient e-commerce MVP (Minimum Viable Product) on AWS. https://busi…
…
continue reading
1
Deploying Stan's Robot Shop: A Microservices Application on AWS
5:40
5:40
Play later
Play later
Lists
Like
Liked
5:40
Deploying a microservices application on AWS can be a complex journey, but it can become an exciting voyage with the proper guidance. This podcast will use Robotics Nerd’s Robot Shop, a microservices-based sample application, to demonstrate how to deploy and manage a microservices architecture on AWS. By the end of this guide, you’ll have a clear u…
…
continue reading
1
Streamlining User Migration and IAM Management in AWS
4:06
4:06
Play later
Play later
Lists
Like
Liked
4:06
Managing user identities and access in a growing AWS environment can become increasingly complex and time-consuming. Manual user migration and IAM (Identity and Access Management) management often lead to errors, security vulnerabilities, and inefficiencies. Automating these processes ensures consistency and security and significantly reduces admin…
…
continue reading
1
Building Mobile and Web Apps with Amazon Honeycode: A No-Code Approach
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04
In today’s fast-paced digital world, businesses need agile solutions to develop and deploy applications quickly. Amazon Honeycode offers a no-code platform that empowers users to build powerful mobile and web applications without writing a single line of code. This podcast will explore the benefits of Honeycode, how to build apps with it, its key f…
…
continue reading
1
AI can tell your political party from your face
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
Forget dinner debates — a new AI claims it can predict your politics from biometrics. Plus, brave Target shoppers confront an alleged peeping Tom, a distracted Tesla driver crashes on autopilot, and I’ve got three tips for snagging the lowest airfare. And don’t miss my chat with Kitboga, the internet’s top 'scam baiter,' on his latest takedowns.…
…
continue reading
1
Democratizing AI: Collaborative AI Development with InstructLab
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53
In this episode, we have an insightful discussion with Carol Chen from Red Hat at the All Things Open conference. Carol, who works in the Open Source Program Office at Red Hat, shares her experiences and insights on her ongoing project, InstructLab, a collaboration with IBM aimed at applying open source methods to building and training large langua…
…
continue reading
1
Ensuring Secure and Scalable AWS S3 Multipart Uploads: Best Practices and Strategies
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52
Amazon Simple Storage Service (Amazon S3) is a highly scalable and durable object storage service widely used for storing and retrieving data. When dealing with large files, AWS S3 Multipart Upload is a critical feature that allows you to upload large objects in parts, significantly improving upload speed and reliability. This feature is handy for …
…
continue reading
1
Automating AWS IAM User Migration and Management: A Comprehensive Guide
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43
Migrating and managing a significant number of AWS IAM (Identity and Access Management) users can be daunting, especially when dealing with an organization with more than 100 users. The manual process is time-consuming and prone to errors, which can lead to security vulnerabilities and operational inefficiencies. This podcast will explore how autom…
…
continue reading
1
ServiceNow’s AI, Platform Fuse Spurs Automation
42:18
42:18
Play later
Play later
Lists
Like
Liked
42:18
“What our customers are looking for is to move out of the pilot phase of projects and delivering enterprise value fast,” says ServiceNow Chief Commercial Officer Paul Smith. “The fastest we have seen from purchase to production is 60 days.” In this episode of the Tech Disruptors podcast, Smith and Bloomberg Intelligence senior technology analyst An…
…
continue reading
1
Advancing Your Career: Effective Strategies to Develop Cloud Computing Skills
4:31
4:31
Play later
Play later
Lists
Like
Liked
4:31
In today’s technology-driven world, cloud computing has become an essential skill for IT professionals. As businesses increasingly rely on cloud services, the demand for skilled cloud computing professionals is skyrocketing. Cloud computing skills enhance your employability and open doors to numerous career opportunities across various industries. …
…
continue reading
1
Simplified S3 File Management with Python: A Comprehensive Guide to the S3FileManager Class
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32
Managing files in AWS S3 can be simple with the right tools. The S3FileManager class simplifies this process, making it easier for developers to interact with S3 buckets and files using Python. In this podcast, we’ll explore the functionalities of the S3 File Manager class, how to set it up, and how to perform everyday S3 operations. https://busine…
…
continue reading
1
Proactive Monitoring with AWS CloudWatch Synthetics: A Comprehensive Guide to Real-Time URL Monitoring
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33
In today’s fast-paced digital landscape, ensuring the reliability and availability of your applications is paramount. Real-time URL monitoring can help detect and resolve issues before they impact users. AWS CloudWatch Synthetics offers a powerful solution for this need, allowing you to create canaries that monitor your application endpoints contin…
…
continue reading
1
Hospitals using AI tool that fakes medical records
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19
Watch out: an AI tool hospitals use is making up medical notes — 8 out of 10 transcripts had fake info, even meds that don’t exist. Plus, Robert Downey Jr. rips into AI, Elon Musk gets pulled into deepfake crypto ads, and Reddit finally sees a profit.By Kim Komando
…
continue reading
1
Growing Cybersecurity Threats in Healthcare: What to Prepare for in 2025 | Medcurity Live 068
4:36
4:36
Play later
Play later
Lists
Like
Liked
4:36
As we wrap up Cybersecurity Awareness Month, we are looking to the future. What lies beyond 2024 and how can you stay ahead? Tune in to learn more! Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA
…
continue reading
1
Optimizing Costs and Minimizing Downtime: How to Remove Public IPs from AWS EC2 Instances
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01
Public IP addresses on AWS EC2 instances can incur additional costs and expose your infrastructure to potential security risks. You can optimize costs and enhance security by removing auto-assigned public IPs and using Elastic Network Interfaces (ENIs) with Elastic IPs (EIPs). This podcast will walk you through eliminating public IPs from your AWS …
…
continue reading
1
Streamlining High Availability EC2 Infrastructure on AWS with Terraform and GitHub Actions
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29
Automating the provisioning and management of EC2 infrastructure on AWS is critical for achieving high availability, consistency, and scalability. By leveraging Infrastructure as Code (IaC) with Terraform and integrating it with a CI/CD pipeline using GitHub Actions, you can streamline the deployment process, enhance security, and minimize human er…
…
continue reading
1
Elevating Security and Efficiency in AWS EKS: A Guide to Cluster Management Policies
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29
In today’s cloud-driven world, managing security and efficiency in Kubernetes environments is crucial for organizations leveraging AWS EKS (Elastic Kubernetes Service). This podcast explores the challenges of traditional access management, introduces new cluster access management features, delves into approval modes for access control, and provides…
…
continue reading
1
Simplify AWS Resource Management with Resource Group Tagging API, Awk, and D3.js
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36
Managing and visualizing your AWS resources can be challenging due to the vast array of services and resources available. You can efficiently extract, aggregate, and visualize your AWS resources by leveraging the AWS Resource Group Tagging API, Awk, and D3.js. This podcast will guide you using these tools to streamline your resource management proc…
…
continue reading
1
Maximizing Cost Efficiency in AWS Glue Workloads
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
AWS Glue is a fully managed extract, transform, and load (ETL) service that simplifies data preparation and analysis. It allows engineers to efficiently move data between various stores and process it using Apache Spark. By providing a flexible and scalable environment, AWS Glue enables businesses to integrate and transform data from diverse source…
…
continue reading
1
Episode #29 – The Rise and Fall of a Cyber Jihadist
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02
Junaid Hussain, a quiet British teen with a knack for computers, morphed into a dangerous cyber jihadist. Initially drawn to hacking as a teenager, he joined groups like Team Poison, targeting perceived enemies of Islam. His skills grew, and he hacked high-profile individuals like Mark Zuckerberg and Tony Blair. A prison stint radicalized him furth…
…
continue reading
1
The Haunted House of APIs - A Portal to the Beyond with Allison Averill
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39
The Haunted House of API's Today, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API’s, sponsored by our friends at Traceable AI. In this series, we are building awareness around API’s, their security risks – and what you can do about it. Traceable AI is building One Platform to secur…
…
continue reading
1
Optimizing AWS Lambda Performance: Strategies for Cold Start and Warm Start
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23
AWS Lambda is a powerful serverless computing service that allows developers to run code without provisioning or managing servers. However, optimizing Lambda functions for performance is crucial to ensure that applications run efficiently and cost-effectively. This podcast delves into the intricacies of AWS Lambda performance, focusing on strategie…
…
continue reading
1
The Power of Inspiration: How Cloud Summits Can Transform Your Tech Team
3:18
3:18
Play later
Play later
Lists
Like
Liked
3:18
Many perceive cloud summits as mere sales pitches from vendors. However, these events are much more than that. They offer a rich tapestry of knowledge, innovation, and networking opportunities. Cloud summits bring together industry leaders, tech innovators, and thought leaders who share the latest trends, insights, and advancements in cloud computi…
…
continue reading
1
Creating and Attaching IAM Roles to EC2 Instances on AWS: A Step-by-Step Guide
3:32
3:32
Play later
Play later
Lists
Like
Liked
3:32
AWS Identity and Access Management (IAM) roles are essential for securely managing access to your AWS resources. Unlike IAM users, which are associated with specific individuals, IAM roles are meant to be assumed by entities such as applications, services, or other AWS resources. This allows for fine-grained control over permissions, ensuring that …
…
continue reading
1
Mastering AWS IPAM: Efficient IP Address Management for VPCs
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33
As cloud infrastructures grow, managing IP addresses becomes increasingly complex. AWS IP Address Manager (IPAM) offers a streamlined solution to this challenge. AWS IPAM provides comprehensive visibility and automated IP address management for your Virtual Private Clouds (VPCs), simplifying the allocation, tracking, and management of IP addresses …
…
continue reading
1
Building a Robust and Scalable Payment System with AWS Serverless Architecture
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
In today’s digital era, secure payment processing is crucial for businesses of all sizes. With the rise of e-commerce, mobile apps, and online services, the need for robust and scalable payment systems has never been more critical. This podcast will guide you through building a secure and scalable payment processing system using AWS serverless arch…
…
continue reading
In this episode, Amy and Brad dive into the top JavaScript frameworks, weighing their strengths and weaknesses. They discuss Svelte, Astro, Next, Remix, and Redwood, comparing their rendering processes, server-side vs. client-side preferences, routing systems, and developer experiences. Perfect for developers weighing options for their next app! Sp…
…
continue reading
1
Midnight in Moscow: An Event with Ambassador John Sullivan
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44
On October 15th, the ABA Standing Committee on Law and National Security hosted a luncheon event featuring remarks by Ambassador John Sullivan, former US ambassador to the Russian Federation from 2019 to 2022, and author of Midnight in Moscow: A Memoir From the Front Lines of Russia's War Against the West. Ambassador Sullivan shares his firsthand e…
…
continue reading
1
ONE WEEK LEFT: Everything You Need to Know Ahead of Election 2024
1:09:46
1:09:46
Play later
Play later
Lists
Like
Liked
1:09:46
Whoopi Goldberg claimed on The View that President Donald Trump will ban interracial marriages, Medhi Hassan and Ryan Girdusky got into an explosive argument on CNN NewsNight, Vice President Kamala Harris sat with Shannon Sharpe in an attempt to salvage black male votes & we’ve collected the best moments, all this and yet national polls are extreme…
…
continue reading
1
Rethinking Cybersecurity Hiring with Naomi Buckwalter
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth. In this episode, Naomi challenges why industry hiring norms fall short, shares candid st…
…
continue reading