show episodes
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. We cover JavaScript frameworks like React, Vue.js, and Svelte, tooling like webpack, Docker, Nginx, Next, Nuxt, etc. and CMS systems like Craft CMS.
 
Cascading Style Sheets (CSS) is the web’s core styling language. For web developers, It’s one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Adam Argyle, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
Loading …
show series
 
Today we look at two short posts from Live Happy - one about anxiety detoxing, and the other about friends with benefits. Episode 2063: Do the Anxiety Detox by Karen Cassiday AND Friends With Benefits by Meredith Knight with Live Happy Live Happy takes you on a journey to find your authentic happiness in life, at work and at home through inspiring …
 
What if the best thing you could do was nothing? Not indefinitely, of course - but often, we intervene in the world when the right choice is to do nothing. This is uncomfortable because it is unfamiliar, but might be the most critical change you can make in your thought process. ✨ Sponsor: Command Line Heroes Command Line Heroes is a podcast that t…
 
The transition to remote work in early 2020 was abrupt for everyone, but some found themselves thriving more than others, in many cases, thanks to their personality type. With work-from-home setups becoming the new norm in the age of COVID, many might assume that remote working environments are ideal for introverts, while extroverts are rearing to …
 
This year over 80,000 respondents took the time to share their feedback on the tools and trends that are shaping software development. We learned a lot about the way developers learn. For the rising cohort of coders under the age of 18, online resources like videos and blogs are more popular than books and school combined, a statistic that doesn’t …
 
When we started this show, we set out to create a stage for security leaders and practitioners to share their learnings and perspectives. It was our hope that we could all learn from one another and have open conversations that are not commonly had in the security community. So, to celebrate our 100th episode, we have compiled some incredible pearl…
 
In this Hasty Treat, Scott and Wes launch a new series called Git the Latest — New Things In Tech. Freshbooks - Sponsor Get a 30 day free trial of Freshbooks at freshbooks.com/syntax and put SYNTAX in the “How did you hear about us?” section. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance …
 
We dive into JetBrains’ findings after they recently released their State of the Developer Ecosystem for 2021 while Michael has the open down pat, Joe wants the old open back, and Allen stopped using the command line. The full show notes for this episode are available at https://www.codingblocks.net/episode164. Stop by, check it out, and join the c…
 
This week we’re talking with Nick Janetakis about modern unix tools, and the various commands, tooling, and ways we use the commmand line. Do you Bash or Zsh? Do you use cat or bat? What about man vs tldr? Today’s show is a deep dive into unix tools you know and love, or should know and maybe love. Discuss on Changelog News Join Changelog++ to supp…
 
Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Ou…
 
Relationships are work, hard work at times. Loving another person is more than a feeling, it’s a choice. The sense and feeling most books and movies ascribe to love is just an emotional reaction. Real love comes from choosing to be with that one person over all the others. Sometimes that choice is easy and other times it is difficult, but one that …
 
In this episode Matt and Mike sit down with Derek Duncan to discuss his company's recent move to a 4 day work week. After the interview, the duo sit down to discuss the matter further, putting their own ideas and opinions together with Derek's first-hand insight. The 4 day work week has been a topic of much discussion lately, giving workers 3 days …
 
We're chatting with Ian Frost who swapped out his meteorologist career to become a web developer alongside his brother Brad Frost. We talk about getting started learning HTML / CSS, and then Javscript, writing code as a team, navigating the front and back end in 2021, dictating tech stacks to clients, and dealing with turnover and tech changes with…
 
Picture of the Week. Mozilla's Firefox Monthly Active Users (MAU) slowly but steadily drops. Google to finally assume HTTPS. The evolution of "Initial Access Brokers". DarkSide Returns. "A Microsoft July 2021 Recap" Tailscale. Closing the Loop. SpinRite. The BlackMatter Interview. We invite you to read our show notes at https://www.grc.com/sn/SN-83…
 
On this week’s show Patrick Gray and Adam Boileau discuss recent security news, including: US President Joe Biden says next shooting war will result from cyber incident The Sun tabloid reports UK government weighing “cyber strike” against Iran Australia, UK and USA release list of most commonly used CVEs NSA drops Kubernetes security guide Much, mu…
 
2FA Issues https://isc.sans.edu/forums/diary/Three+Problems+with+Two+Factor+Authentication/27704/ Crazy Smishing https://isc.sans.edu/forums/diary/Is+this+the+Weirdest+Phishing+SMishing+Attempt+Ever/27706/ Google Chrome Update https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html https://www.bleepingcomputer.com/…
 
An apparent ransomware attack hits Italy’s online vaccine-scheduling service. A Chinese cyberespionage campaign hits Southeast Asian telcos enroute to high-value targets. Some strategic context for Beijing’s espionage. FatalRAT is spreading by Telegram. Crafty phishing spoofs SharePoint. Joe Carrigan has thoughts on HP's latest Threat Insights Repo…
 
Jason Meller, CEO and CTO of Kolide, discusses the strategies and heuristics for finding a tech stack for your next startup or project. Host Adam Conrad spoke with Meller on the basics of modern tech stacks, understanding trade-offs for these stacks as well as use cases for each choice, and then took a deep dive […]…
 
We’ve reached the end of season 2 of the CSS Podcast. In this closing episode, we recap every episode by sharing our favorite tips and learnings from the last few months! Episodes reminisced E30 → Lists E31 → @rules E32 → Page Media Queries E33 → Preference Media Queries E34 → Overflow E35 → Background E36 → Text & Typography E37 → Cursors & Pointe…
 
The Jester is a patriotic, pro-American Hacktivist that since 2010 wages a personal cyber-war against USA’s enemies – or at least, those he considers to be ‘the bad guys.’ But some the Jester’s so called “hacks” turned out to be little more than internet slight-of-hand. So, who is The Jester, and is a skilled hacker – or merely a sophisticated inte…
 
Blockchain protocols like Bitcoin and Ethereum have changed the cyber world dramatically in the last decade. They’ve created communities of like-minded developers, generated new financial markets, and popularized “decentralization” in computer networks. However, they require large resources to operate which makes scaling difficult and transactions …
 
APT targeting Microsoft IIS servers Pegasus spyware confirmed on journalist phones Someone is spoofing military ship locations Thanks to our episode sponsor, PlexTrac Gain a real-time view of security posture with PlexTrac by consolidating scanner findings, assessments, and bug bounty tools. Visualize your posture in the Analytics Module to quickly…
 
CIA operations work a lot like your everyday job. You can spend a lot of time plotting, planning, and waiting like everyone else... or you can do something different. In this episode, Andrew tells you a story about one of his current undercover CIA colleagues and how he plans to short-cut success the day he leaves CIA. If you are looking for the ul…
 
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it. Affiliate link for …
 
Melissa Camara Wilkins with Becoming Minimalist shares 10 things that minimalists don't do. Episode 2062: 10 Things Minimalists Don't Do by Melissa Camara Wilkins with Becoming Minimalist on Living Freely Joshua Becker and his family decided to live with fewer possessions after a conversation with his neighbor in 2008. As a result, they found a bet…
 
We cross to Perth and speak with Paul Haskell-Dowland, Associate Professor and Associate Dean (Computing and Security) at Edith Cowan University's School of Science. The Pegasus spyware episode saw more than 50,000 phone numbers, and 1,000 people in 50 countries reportedly under surveillance. The spyware was developed by the Israeli company NSO Gro…
 
Unsolicited DNS Queries https://isc.sans.edu/forums/diary/Unsolicited+DNS+Queries/27694/ Changing BAT Files on the Fly https://isc.sans.edu/forums/diary/Changing+BAT+Files+On+The+Fly/27700/ Empty NPM Package has Over 700,000 Downloads https://www.bleepingcomputer.com/news/software/empty-npm-package-has-over-700-000-downloads-heres-why/ Blocking Pet…
 
SVR may have compromised twenty-seven US Attorneys’ offices. Ransomware disruptions of a physical supply chain continue as South African ports reopen. EA hackers give up, and dump the source code they stole. Double extortion may not be paying off. A look at initial access brokers. Operation Top Dog yields indictments in an international fraud case.…
 
The D-d-d-d-discord's got threads! Are conferences a thing we're ready for? How was Dave's experience working on a Windows PC? Help Dave figure out his monitor issue on Mac. Are people writing websites without a build step? And what is a good CSS technique for displaying images that could be either horizontal or vertical?…
 
Today's show: How to Quit Your Job and Work on Open Source Full Time. This story has it all, balancing open source work and full-time employment, building up enough supporters and enough savings to leave your job. The hardest part to me which is explaining leaving your job to your significant other and to your family and friends. And also what do y…
 
Enterprise data warehouses store all company data in a single place to be accessed, queried, and analyzed. They’re essential for business operations because they support managing data from multiple sources, providing context, and have built-in analytics tools. While keeping a single source of truth is important, easily moving data from the warehous…
 
BlackMatter ransomware gang rises from the ashes of DarkSide, REvil Remote print server gives anyone Windows admin privileges on a PC Justice Department says Russians hacked federal prosecutors Thanks to our episode sponsor, PlexTrac PlexTrac is a powerful, yet simple, cybersecurity platform that centralizes all security assessments, pentest report…
 
Leo Babauta of Mnmlist offers us two short articles about how to let go of possessions and why we should stop complicating things. Episode 2061: How To Let Go of Possessions AND Stop Making It Complicated by Leo Babauta of Mnm List Leo Babauta created Zen Habits, which is about finding simplicity and mindfulness in the daily chaos of our lives. It’…
 
In this episode of Running in Production, Andy Ide goes over building aSAAS app for horses with Django and Python. It’s hosted on a single Linodeserver and has been running in production since May 2021. Andy talks about learning Django while building his app, using Django Unicorn,creating a Django monolith that’s broken up with Django apps, outsour…
 
In this sponsored edition of the Risky Biz Soap Box podcast VMRay’s VP of Products Uriel Cohen joins me to talk about its Email Threat Defender product. They’ve glued some automated sandbox analysis to their fancy phishing/link analysis/detection tech and they’re pitching it as a secondary control. That means no, they’re not trying to replace big s…
 
Infected With a .reg File https://isc.sans.edu/forums/diary/Infected+With+a+reg+File/27692/ Excessive Exchange Permissions (Patched) https://bugs.chromium.org/p/project-zero/issues/detail?id=2186 Node.JS July 2021 Security Releases https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ Malicious PyPi Packages https://jfrog.com/blog…
 
President Biden's Cyber Executive Order includes provision for a software bill of materials in government contracts. It's a critical and necessary first measure for protecting the software supply chain. To defend against cyber attacks like the ones that affected SolarWinds and Colonial Pipeline, organizations also need transparency about the way th…
 
Joshua Fields Millburn of The Minimalists shares why he doesn't own a TV. Episode 2060: Reasons I Don't Own a TV by Joshua Fields Millburn of The Minimalists on Minimalism & Creative Pursuits Joshua Fields Millburn & Ryan Nicodemus write about living a meaningful life with less stuff for 4 million readers. As featured on: ABC, CBS, NBC, BBC, TODAY,…
 
Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some per…
 
Jennifer of Simply Fiercely talks about finding the balance between rest and hustle Episode 2059: Finding the Balance Between Rest and Hustle by Jennifer of Simply Fiercely on Achieving Work Life Balance Jennifer is a traveller, minimalist and dream chaser. She grew up near Baltimore, Maryland but she caught a bad case of wanderlust at an early age…
 
Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data…
 
Cozy Bear’s active command-and-control servers are found, and people conclude that Moscow’s not too worried about American retaliation after all. Spyware found in an app for companies doing business in China. What to make (and not make) of the Iranian documents Sky News received. Phishing with Crimean bait. HTML smuggling may be enjoying a moderate…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login