Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Training Podcasts

show episodes
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
cyberoctet

cyberoctet

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cyber Octet Pvt. Ltd. is an IT Solution, Security, Training and Services Company providing best solution to its clients for any development solution to Securing data. We have end to end expertise and have served several Government, Institutions, and Private Sectors. https://cyberoctet.com/
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
GovCIO Media & Research Podcasts

GovCIO Media & Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
TechVets: creates new opportunities for 'tech-curious' UK veterans through partnerships. In this series, hosted by Charlie Jacoby we discuss the latest tech issues and industry trends plus we discuss how to make a career in the tech and cyber security world.
  continue reading
 
Artwork
 
We do IT differently! Providing small-to-mid-sized business with tailored IT strategies, management and support that enables them grow faster. We make IT the competitive advantage of SMBs in Atlanta, Birmingham, and Greenville; providing cyber-security and compliance.
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Welcome to “Swift Chats” in the Financial Services Industry, a podcast brought to you by Impact Communications, where your hosts Marie Swift and Jonny Swift speak with interesting people in the financial services industry and the financial planning profession. Our podcast spotlights independent financial advisory firms, allied financial services institutions, and “fintech” companies that we think are adopting "Best Practices" in the industry. We also share our own tools and ideas aimed at he ...
  continue reading
 
Artwork

1
Secure Ninja TV

secureninja.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

4
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
  continue reading
 
The DevLab Podcast (brought to you by hackajob) is a deep dive into the lives, tips and tricks of the world's best developers working in the UK and US' best tech companies. So if you're an engineer or someone with an interest in tech, get ready to level up in your skills, knowledge and career. Every week we’ll invite experts to share their journeys and provide you with technical know-how, new skills, and career insights.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
Silicon Curtain

Jonathan Fink

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
  continue reading
 
Explore the secrets of career success through insightful conversations with STEM leaders at the top of their game. In each episode, we meet senior professionals who have the coolest jobs in tech, life sciences and engineering and ask them to share how they’ve got to the top of their career. Expect conversations with global experts including cyber security leaders, directors of data, chief technology officers and AI specialists.
  continue reading
 
Artwork

1
MAD Warfare Podcast

STP Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the “weaponization of everything.” But don’t worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady “bad actors” (who’d be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it’s too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
  continue reading
 
The ASVAB Domination podcast is designed for anyone desiring motivation, direction, and focus in reaching their ASVAB goals. Host Mickey Gamonal has helped dozens of students raise their GT and ST scores to get better jobs, bonuses, and contracts across all branches of the military. In this podcast, Mickey blends classical teaching with real world military experience to deliver explanations on making the most of your military career. If you’re ready to take your scores to the next level, or ...
  continue reading
 
Artwork

1
The Naked Scientists Podcast

The Naked Scientists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Naked Scientists flagship science show brings you a lighthearted look at the latest scientific breakthroughs, interviews with the world's top scientists, answers to your science questions and science experiments to try at home.
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
  continue reading
 
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
  continue reading
 
Artwork

1
The Web Usability Podcast

Lucy Collins from Web Usability

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Lucy Collins, Director of Web Usability, as we explore what it takes to make the web a more accessible and enjoyable place for everyone. Whether you're a website owner, developer, or just a curious mind, we're here to share insights, tips, and stories that can help you improve the user experience of your digital world. Web Usability is an established User Experience (UX) agency. We are UX specialists. We provide inclusive UX research and advice to optimise your digital services. If you ...
  continue reading
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
  continue reading
 
Mark Divine is the founder of SEALFIT and Unbeatable Mind. Mark is a Retired Navy SEAL Commander, NYT Best Selling author, speaker and entrepreneur. The podcast deals with a wide variety of subjects, from philosophical, emotional and meta-physical to self defense, fitness and elite physical performance. They all form a part of Mark's 5 mountain training path to develop your Mental, Physical, Emotional, Intuitive, and Kokoro (Heart) self. Find out more at unbeatablemind.com.
  continue reading
 
Artwork
 
Welcome to Calavista Conversations. If you’re responsible for delivering software on time and on budget - or at least wish *someone* were responsible for doing that - then this podcast might be for you. Some 2/3 of software projects don’t deliver as promised. If you want to be in the successful minority - if you believe that you studied computer science, and not computer arts - then join us as we talk about best practices and how people have tuned their development processes for success. And ...
  continue reading
 
Artwork

1
Governance Matters

Governance Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Governance Matters podcast provides listeners with insight into the cutting-edge issues of the day for corporate secretaries, general counsel and all governance professionals. Produced by Governance Intelligence, this monthly podcast will look at how the role of the corporate secretary and the board has evolved over time, as well as how the governance landscape continues to change.From ESG to entity management, shareholder engagement to technology, we’ll hear from award-winning governanc ...
  continue reading
 
Artwork
 
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
  continue reading
 
Artwork

1
Raw Data

Stanford and PRX

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We’ve entered a new era. The creation and collection of information play an ever-increasing — yet often hidden — role in our lives. Algorithms filter all sorts of experiences, from the mundane to the monumental. The fuel that powers and curates these experiences is…data. Data are the new oil; whoever controls data has power. Is this making things better? Worse? Raw Data is a show about how information becomes power. What are the implications for all of us, now that mountains of data are more ...
  continue reading
 
Loading …
show series
 
Send us a text Ethical leadership lies at the heart of effective cybersecurity practice. In this episode, we dive deep into Domain 1.1 of the CISSP certification, exploring professional ethics and their critical importance for security professionals. The episode opens with a sobering look at the current landscape of cyber warfare, examining how Isr…
  continue reading
 
What if everything we’ve been doing in cybersecurity awareness training is not just outdated — but harmful? In this episode of Reimagining Cyber, Rob Aragao, Chief Security Strategist at OpenText, talks with Craig Taylor, co-founder and CISO at CyberHoot, who makes a bold claim: punishment-based training is not only ineffective — it’s counterproduc…
  continue reading
 
Cybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the …
  continue reading
 
Edition No166 | 23-06-2025 - This is a horrific story, which stands out eve amongst the slew of horrific stories we churn through each day. Apparently, a Russia soldier, now killed, has been accused of eating a comrade. It is emblematic of the brutality of Russia’s war, but perhaps also symbolic of how the country is both destroying its neighbour, …
  continue reading
 
As Reservists Day approaches, TechVets sat down with Jason, a seasoned service manager in the civil nuclear sector and an Army reservist with 13 Signal Regiment. His story is a compelling example of how tech professionals can bring critical skills into the Armed Forces—while also growing as individuals and leaders. Jason’s route into the reserves b…
  continue reading
 
Anna Danylchuk has been creating a war diary since the early days of the full-scale invasion of Ukraine by Russia in 2022. Anna Danylchuk aims to tell the truth about Ukraine and Russia’s war and cut through the noise and propaganda. Anna is passionate about the beauty and independence of her country, and communicates this powerfully in her videos,…
  continue reading
 
In this podcast, Michael Stiefel spoke with Rashmi Venugopal about two topics. The first is how the middle-tier creates the application from the raw materials in the back-end, and how the front-end uses the middle-tier to present a meaningful workflow to the user. The second is how to manage the usually inevitable software migration that results fr…
  continue reading
 
Edition No165 | 22-06-2025 - TACO no more? Trump has taken decisive action. Was it from a strategic assessment of the risk posed by Iran’s nuclear ambitions, or was he manipulated into it by a forceful Netanyahu, exuding macho aggression and decisiveness? Was Trump perhaps driven to action by a sense of inevitability, once the bombers and refuellin…
  continue reading
 
A while ago, I found a curious little processor and starting reverse-engineering it. Join me as I retell my journey through the Amlogic Video Decoder, from staring at bits over running hand-written instructions, to my own emulator and architecture manual.Disclaimer: "28-bit" isn't quite correct, but you'll see.Project homepage / Git repo: https://c…
  continue reading
 
So schnell ist es auch wieder vorbei. Hier gibt es ein kleines Rewind mit Daten und Fakten zur diesjährigen GPN.Vielen Dank, dass Du mitgemacht hast!<3Zahlen, Daten, Fakten, Graphen.Aaaaahhhhh. Ooooooohhhhhhh. Uuuuuuuuuuhhhhhhhh.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://cfp.gulas.ch/gpn23/tal…
  continue reading
 
Wir wollen in unserem Projekt Menschen mit ALS unterstützen, indem wir Eye-Tracking als Kommunikationshilfe zugänglicher und günstiger machen, und das in gemeinnützig und Open-Source. In unserem Vortrag werden wir unser Projekt, die Erkrankung sowie Eye-Tracking als Technologie vorstellen.ALS und MS sind Krankheiten, die Betroffenen nach und nach d…
  continue reading
 
A short session for even shorter talks.Language: English or German-- english --Wanna say something? The stage is yours. You have 10 minutes to talk about anything. A short talk about the mating behaviour of jellyfish; promoting your new open-source project; a small hack that you found; social commentary ... anything goes.Available infrastructure: A…
  continue reading
 
In diesem Vortrag möchte ich _"Lichtung"_ vorstellen -- eine kleine Server/Client-Anwendung, die einen simplen Micorblogging-Service zur Verfügung stellt und somit eine Lichtung in den dichten Internet-Wald schlägt.Sie ist entworfen, um innerhalb eines IP-Netzwerks einen deterministischen Feed von Beiträgen und verschlüsselte Chatrooms zwischen je …
  continue reading
 
Der Traum der grenzenlosen Eisenbahn in Europa heißt SERA. Durch technische Standards für die Interoperabilität sollen Züge in Zukunft in jedem Land Europas fahren können. Ich versuche zu erklären, wie das klappen soll und warum es dabei auch um Security geht.Auf der GPN21 habe ich über das Problem grenzüberschreitender Zugfahrten berichtet. [1] Di…
  continue reading
 
Wenn man nur einen Hammer hat, sieht alles aus wie ein Nagel – so fühlt es sich manchmal an, wenn man die Begeisterung rund um „KI“ betrachtet. Gemeint ist dabei fast immer nur der Teilbereich generativer KI, die mit stochastischen Methoden plausible Ergebnisse produzieren soll. Links liegen bleibt dagegen „Good Old-Fashioned AI“, also regel- und l…
  continue reading
 
KISS (Keep it Simple, Stupid!) ist ein Prinzip der Software- und Systemarchitektur, nach welchem Systeme möglichst einfach gehalten werden sollen. In diesem Talk möchte ich an dieses Prinzip erinnern, Positiv- und Negativbeispiele aufzeigen, und ein Plädoyer dafür halten, Systeme so einfach wie möglich zu gestalten.Diese Idee der Einfachheit hat au…
  continue reading
 
Der Vortrag zeigt, wie man zur eigenen Marke kommt. Mit etwas IT-Know-How und Grundlagenwissen aus diesem Vortrag steckt ein geneigter Nerd* so manche juristische Dienstleister bei der Recherche in die Tasche und hat anschließend eine Marke.Eine unklare Markenrechtslage ist für Vereine und auch freie Software öfter ein Problem, als man denkt. Der F…
  continue reading
 
In our daily life, we often think of PDF documents as static and immutable. This mental model is wrong.In this presentation, we give a brief overview of PDF (in-)security and describe a novel kind of attack where a malicious PDF document can* change its displayed content with time (while the file stays the same)* display different content to differ…
  continue reading
 
Having looked at multiple implementations of DRAM initialization code for different platforms, both in binary and source form, I have started to see certain patterns occur. In this talk, we will focus on the binary form, since it is how that code is often distributed these days, and thus useful to gain an understanding of how modern DRAM controller…
  continue reading
 
Früher wurde Strom vor allem aus Kohle-, Gas- und Kern-kraftwerken erzeugt. Da das aber extrem schädlich für Umwelt und Klima ist, setzen wir inzwischen deutlich mehr auf nachhaltig erzeugten Strom, wie Wind- und Sonnenenergie. Diese stehen jedoch leider nicht immer zur Verfügung. Bisher ist gerade mal die Hälfte der Stromerzeugung in Deutschland e…
  continue reading
 
Edition No164 | 21-06-2025 - Next up, is the world about to open the Pandora’s Box of Assassination Escalation? There has been extensive discussion this week of whether it’s going too far to remove a leader from the stage to end a war. In this case, the focus is on Ali Hosseini Khamenei, the second supreme leader of Iran since 1989. Before we dive …
  continue reading
 
A short session for even shorter talks.Language: English or German-- english --Wanna say something? The stage is yours. You have 10 minutes to talk about anything. A short talk about the ultimate Tschunk recipe; promoting your new open-source project; a small hack that you found; social commentary ... anything goes.Available infrastructure: A micro…
  continue reading
 
Ever wondered how PC demos are made? What technologies are used and how people are working together in such a loose environment? Let's have a look together at how the demo "Grow Beyond", the invitation for Revision 2025 was made.In September 2024 a handful of people came together to create the invitation to the biggest demoscene event of the year. …
  continue reading
 
Ein Spot-Roboterhund von Boston Dynamics ist euch zu teuer oder passt nicht in euren Hackerspace? Probiert es doch mit [dieser handlichen kleinen Roboterkatze](https://github.com/Windfisch/robocat) für unter 50 Euro Materialkosten. Bastel~~spass~~bedarf garantiert! :DIch stelle mein Projekt eines vierbeinigen Roboters vor: Vom mechanischen Entwurf …
  continue reading
 
Caolan Robertson is a journalist, film maker, political writer and social commentator. He is a director at Byline TV and now lives in "beautiful Ukraine".https://www.youtube.com/@CaolanReports ----------Directed by Caolan Robertson, The Eastern Front is the first major Western documentary to focus on the harrowing reality of the war in Ukraine.http…
  continue reading
 
Augen zu und durch, begleiten Sie mich weiter auf dem Weg zur elektronischen Patientenakte (ePA). Es ist nicht so, dass die Welt auf die ePA gewartet hätte. Auch haben wir keine Notlage, die drastische Maßnahmen erforderte. Aber die EU-Kommission hat die Datenökonomie im Gesundheitsdatenraum (EHDS) nun einmal beschlossen. Die ePA bildet dafür die z…
  continue reading
 
Ich wollte meine Wählscheibentelefone an eine moderne Telefonanlage anschließen und brauchte dazu einen Konverter, der das Impulswahl- auf Mehrfrequenzwahlverfahren umsetzt. Die etwas ungewöhnliche Design-Entscheidung dabei: das Teil in Relaistechnik zu bauen! Freut euch auf blinkende Lichter und atmosphärisches Klackern. 😊Licensed to the public un…
  continue reading
 
I’ll show you how I use Go to run my entire home, including not just home automation but also tiny single-purpose appliances (with my gokrazy appliance platform, using a Raspberry Pi Zero 2W or larger), hosting private web services on mini PC servers, going all the way to a powerful 25 Gbit/s FTTH internet router which now serves all my web sites!S…
  continue reading
 
In diesem Vortrag stelle ich vor, wie atomare/immutable Linux-Desktops wie Fedora Silverblue und Bluefin durch ihre schreibgeschützte Systemarchitektur einen stabileren, sichereren und wartungsarmen Alltag ermöglichen. Basierend auf 1,5 Jahren praktischer Erfahrung zeige ich, wie ich mit dieser Technologie in Kombination mit Chezmoi für Konfigurati…
  continue reading
 
eBPF is transforming Linux system capabilities, enabling the extension of the kernel with custom process schedulers, firewalls, and more. Thanks to Java's recent native integration and a bit of compiler magic, we can now create these extensions directly in Java and use it to create Linux schedulers that create sound and schedulers that emit sound. …
  continue reading
 
In diesem Vortrag möchte ich zum einen zeigen, wie man (kleine) Large Language Models bei sich auf dem Laptop oder Smartphone laufen lassen kann, zum anderen, warum Large Language Models und deren Integration in alle möglichen Produkte eine eher nicht so gute Idee ist (freundlich formuliert: Wir setzen uns kritisch mit LLMs auseinander).Während des…
  continue reading
 
Infrastruktur - beispielsweise Brücken, Schienen, Glasfasern bis hin zu Servern - ist für viele ein (un)ausgesprochenes Problem: Zu wenig, zu schlecht, zu kaputt, zu teuer.In diesem Talk geht es um IT-Infrastruktur, mit besonderem Fokus auf Netzwerk.Ich baue und betreibe seit ca. 10 Jahren IT-Infrastruktur, und habe mit der Zeit festgestellt, dass …
  continue reading
 
Mit dem Wunsch weniger Social Media und wieder mehr Blogs zu lesen, bin ich auf das IndieWeb gestoßen.IndieWeb ist eine Gemeinschaft von Menschen welche persönliche Websites zum verwalten von Inhalten im Internet verwenden, statt dies in zentralisierten sozialen Netzwerken zu tun. Neben Prinzipien wie POSSE (Publish (on your) Own Site, Syndicate El…
  continue reading
 
Flash-Speicher sind mehr als nur passive Datencontainer – sie können aktive Sicherheitskomponenten sein. Dieser Vortrag zeigt, wie Maker und Profis gleichermaßen Flash-Technologien nutzen können, um Sicherheitsziele von der Verschlüsselung bis zum Secure Boot zu erreichen – selbst bei Systemen, die nicht für hohe Sicherheit konzipiert wurden.Flash-…
  continue reading
 
Die Anzeigetafeln an den Straßenbahnstationen sind sehr praktisch. Leider sieht man sie erst, wenn man schon an der Station ist.Ich zeige, wie man sich aus einem ESP8266-Mikrocontroller und einem E-Paper-Display eine eigene kleine Anzeige für den Hausflur baut und so schon früh weiss, dass man sich sputen sollte, wenn man die nächste Bahn noch erre…
  continue reading
 
Europarecht und auch Recht in Deutschland enthalten mehrere Möglichkeiten, an verschiedene Arten von Daten zu kommen: Der Data Act für IoT-Daten für jedes Wesen oder das Umweltinformationsgesetz für ... naja, Umweltinformationen oder auch so obskure Dinge wie das Geodatenzugangsgesetz. Neben dem bekannten Informationsfreiheitsgesetz gibt es eben vi…
  continue reading
 
Digital cameras are black-boxes during use: "you press the button, we do the rest". In this media archaeology project, I open this black box by disassembling an off-the-shelf DSLR camera as a case-study. I extract the image sensor, reverse engineer its interface, and build a new camera-apparatus around it. This lays technical groundwork for artists…
  continue reading
 
Livestream with Greg Terry - Covering Middle East and Ukraine.----------Car for Ukraine has once again joined forces with a group of influencers, creators, and news observers during this summer. Sunshine here serves as a metaphor, the trucks are a sunshine for our warriors to bring them to where they need to be and out from the place they don't.htt…
  continue reading
 
In theory, full disk encryption (FDE) just works. You just have to enable it. But in practice, cops get access to a lot of devices, even when they are encrypted. I want to summarize the current state of full disk encryption. I will explain conceptional weaknesses/attacks, practical physical attacks (videos of live demos) and give recommendations. I…
  continue reading
 
Wolltet ihr schon immer mal einen Zug selbst steuern? Kein Problem!In diesem Talk schauen wir uns einen Angriff auf das europäische Zugbeeinflussungssystem ETCS an, mit dem es theoretisch möglich ist, Steuerungsnachrichten an einen Zug zu fälschen. Dabei betrachten wir die verschiedenen Protokollschichten in der Kommunikation zwischen Zug und Strec…
  continue reading
 
Digital tickets from traffic associations are often stuck inside their proprietary walled garden apps. But the neat thing about digital tickets, is that the barcode can be shown anywhere, and still be valid. This talk documents my efforts to reverse engineer various traffic association's apps, and my work on [Zügli](https://zügli.app) to make ticke…
  continue reading
 
Der Faschismus ist zurück, überall auf der Welt. Trump, Modi, Orban, AfD. Aber es gibt auch eine neue Form des Faschismus, der uns viel näher ist: Der Tech-Faschismus. Doch es greift zu kurz auf Elon Musk oder Peter Thiel zu blicken. Tech-Faschismus durchsetzt unseren technischen wie auch politischen Stack von oben bis nach ganz unten.Was genau cha…
  continue reading
 
A short session for even shorter talks.Language: English or German-- english --Wanna say something? The stage is yours. You have 10 minutes to talk about anything. A short talk about the aerodynamics of ducks; promoting your new open-source project; a small hack that you found; social commentary ... anything goes.Available infrastructure: A microph…
  continue reading
 
Nachdem git dieses Jahr 20 geworden ist, wird es langsam Zeit zu schauen, wie es unter der Haube funktioniert, und was es besonders macht. (Spoiler: alles ist ein blob ist ein blob ist ein blob)Was muss man wissen, um git-Befehle per Hand ausführen zu können?* Elementare Datenstrukturen ** hash ** blob ** tree ** commit* .git Verzeichnis* Algorithm…
  continue reading
 
Ich zeige, wie mit dem Plugin netbox-prometheus-sd automatisch Prometheus-Scrape-Targets aus einer gepflegten NetBox-Dokumentation entstehen. Ohne manuelle Pflege oder externe Tools wird Dokumentation so zur Grundlage eines dynamischen, aktuellen Monitorings.Dokumentation wird oft als Pflichtübung gesehen – dabei kann sie ein mächtiges Werkzeug sei…
  continue reading
 
Im Laufe der letzten zwei Jahre haben wir einen Compiler für die eigentlich interpretierte Programmiersprache Lua entwickelt. In diesem Vortrag zeigen wir was man Stand heute damit machen kann.Lua ist eine kleine Scripting-Programmiersprache.. _oder kann man damit auch mehr machen?_Unbekannt ist die Sprache aus Umfeldern wie Neovim, löve2d oder Com…
  continue reading
 
Ostap Kryvdyk is Royal College of Defence Studies member, MA (King’s College London) and Chair, Ukrainian Strategic Initiative think tank, Kyiv Mohyla Academy, Ukraine. ----------LINKS:https://x.com/ostapkryvdykhttps://www.linkedin.com/in/kryvdyk/https://cepa.org/author/ostap-kryvdyk/https://fpc.org.uk/three-years-on-what-peace-should-be/https://ce…
  continue reading
 
Sie stecken in Laptops, baumeln an Schlüsselbunden, verstecken sich in Kreditkarten oder Personalausweisen und thronen in Serverracks: Trusted Platform Modules, USB-Hardware-Token wie Nitrokeys oder Yubikeys, Smartcards und ihre großen Geschwister, die Hardware Security Module. Die Hersteller versprechen uns die kryptographische Erlösung – endlich …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play