Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Api Security Podcasts
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Hosted by Viktor Gamov and Kaitlyn Barnard, we interview software developers and technology leaders at the top of their game every other week. We’ll also give you the tools, tactics and strategies you need to take your cloud native architecture to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you can tackle your biggest connectivity challenges.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
We believe that digital transformation efforts make companies and communities more resilient. In the API Resilience podcast you'll listen to guests from industry leading API teams sharing their views about the current trends of the API economy. We also bring you insights that your API team will be able to use, and even explain to your management on how APIs can help your company cope, resurge, and thrive during and after this pandemic. The host is Kristof Van Tomme.
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
…
continue reading
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
…
continue reading
India's first and leading cybersecurity podcast
…
continue reading
Building a successful API requires more than just coding. It starts with collaborative design, focuses on creating a great developer experience, and ends with getting your company on board, maintaining consistency, and maximizing your API’s profitability. In the API Intersection, you’ll learn from experienced API practitioners who transformed their organizations, and get tangible advice to build quality APIs with collaborative API-first design. Jason Harmon brings over a decade of industry-r ...
…
continue reading
The two TypeScript Fools, Kamran Ayub and Erik Onarheim, get together weekly to bring you news, community highlights, and deep dives into the TypeScript ecosystem. Stay up-to-date on what's happening and learn new things to make you a better TypeScript developer along the way!
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
Welcome to MessageBot, the podcast that explores how Indian businesses are transforming communication using Bulk SMS, Voice Calls, WhatsApp Business API, and RCS Messaging. Each episode dives into real-world use cases, automation strategies, and the latest updates in India’s messaging ecosystem. Whether you’re a startup, developer, or enterprise, you’ll learn how to send secure OTPs, automate campaigns, and stay TRAI-compliant — all while delivering messages that truly connect.
…
continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
continue reading
A weekly podcast that welcomes you to explore technology with an insightful interview every two weeks and topic-deep dives every other two weeks. If you're interested in deep and creative technology and conversations with some of its most interesting practioners, this is the show for you. Come in and get yourself comfortable. Show notes can be found at - chrischinchilla.com/podcast Formerly known as "Chinchilla Squeaks"
…
continue reading
Buzzword Bingo explores top-of-mind topics in enterprise tech. Each topic is examined from multiple perspectives through in-depth interviews with industry leaders and aficionados. Powered by Rubrik.
…
continue reading
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
For 20 years the cloud computing revolution has been transforming how organizations operate and innovate. But the revolution is not yet complete. The final areas of transformation are networking and security, which have remained grounded in on-premises thinking and technologies. No longer. A majority of enterprises are planning to increase spending on network modernization. Join us as we discuss what this new, cloud-oriented network should look like.
…
continue reading
A podcast covering socio-technical themes, concepts, and technologies that matter to the modern enterprise
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Trust us we are Systems Engineers
…
continue reading
Cloud Talk brings you discussions on topics like digital transformation, Kubernetes, IoT, edge computing and multicloud, as told through the perspectives of the people and the companies who are living this transformation on a daily basis. In Cloud Talk, host Jeff DeVerter interviews some of the most influential figures on the frontlines of cloud technology, helping you stay connected. Jeff is CTO at Rackspace and has spent over 20 years immersed in the world of cutting-edge technology.
…
continue reading
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Owning an Unraid server gives you the ultimate control over your data and reduces your dependence on The Cloud. Join host Ed Rawlings to learn how to get the most out of your Unraid server, stay up to date on relevant news and topics, and get to know members of the Unraid community!
…
continue reading
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Private equity, venture capital and alternative investments - long-form podcasts with industry leaders Dive into in-depth conversations with industry leaders and gain exclusive insights into the world of private capital. 🎙️Fund Shack is dedicated to providing thought-provoking, authentic discussions with the most respected private capital managers, asset managers, professional advisers, & thought leaders. Our long-form interviews are unscripted, ensuring genuine & enriching conversations. Ho ...
…
continue reading
1
"SleepyDuck" uses Ethereum, SesameOp abuses OpenAI API, cybercrooks steal physical cargo
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36"SleepyDuck" uses Ethereum to keep command server alive SesameOp abuses OpenAI Assistants API Organized crime cybercrooks steal cargo Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platf…
…
continue reading
1
S6E25 - Securing Azure's Core: Microsoft Defender for Resource Manager, Key Vault, and APIs
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21In this episode, we dive into three key Cloud Workload Protection Platform (CWPP) offerings within Microsoft Defender for Cloud: Defender for Resource Manager, Defender for Key Vault, and Defender for APIs. Our Q&A format explores how these tools safeguard Azure environments against sophisticated threats, from management layer exploits to API vulne…
…
continue reading
1
ReactConf 2025 Highlights, Bun 1.3's Security Scanner API, and Malware-as-a-Service | News | Ep 39
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25News of the week of October 6, 2025: Highlights from ReactConf 2025, Bun 1.3's (delicious) security lede got buried, and how to buy lifetime access to someone's webcam for $500. From the community: CSS is cool again, Immer.js perf improvements, and why typed linting is blocked by ESLint core. Chapters (00:00) - Welcome to the Show (05:52) - News: R…
…
continue reading
1
ePlus Security & F5 API Security Podcast - Episode 4
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40Episode 4: Security as Code In this episode of the ePlus Security + F5 API Security Podcast, David Tumlin and Chuck Herrin dive into the future of "security as code," where automation, AI, and DevSecOps converge to protect dynamic, ephemeral environments. From real-time threat validation to AI-assisted policy tuning, this is a must-listen for anyon…
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading
1
Guest Host: Kelsey Hightower - Beyond Pipelines: Infrastructure As Data
48:51
48:51
Play later
Play later
Lists
Like
Liked
48:51Is your Git repo really the source of truth for infrastructure - or just a suggestion? Guest host Kelsey Hightower sits down with Cory O’Daniel to unpack why many teams hit dead ends with CI/CD for provisioning, where GitOps struggles with drift, and when TicketOps helps or hurts. They explore a different model: infrastructure as data with typed co…
…
continue reading
1
DOP 323: The Security Nightmare of Vibe Coding
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04#323: Vibe coding - the practice of giving AI a high-level description and letting it build applications unsupervised - has become increasingly popular among non-developers looking to quickly prototype ideas. While this approach excels at rapid prototyping and getting small, focused applications running, it creates significant security risks when d…
…
continue reading
1
Scattered Spider, LAPSUS$, ShinyHunters join forces, Nikkei data breach impacts 17k people, React Native NPM flaw leads to attacks
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
…
continue reading
1
TypeScript Won, Type-safe Regex, and Import from... Python? | News | Ep 42
53:59
53:59
Play later
Play later
Lists
Like
Liked
53:59News for the week of October 27, 2025: TypeScript is the #1 language on GitHub, making your Regex type-safe, and Biome adds support for three new metaframeworks. From the community: a metaframework for Angular, PHP in JS, and a polyglot runtime that will blow your mind. Chapters (00:00) - Welcome to the Show (05:36) - News: TypeScript Won in 2025 (…
…
continue reading
1
The Unseen Game: Building Resilience in Sport and Security
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08We hosted sports legends Bruce Bowen, Matt Giteau, Drew Mitchell, and health & wellness consultant JoeHolder at Ledger Op3n 2025! They chatted with our EVP of Communications Ariel Wengroff about the crossover between sports and security - namely, building resilience. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading
1
🎙️ $120M DeFi Heist, AI API Exploits, Water & Shipping Breaches, Apple Patches, and Cybercrime Indictments
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07🎙️ $120M DeFi Heist, AI Tools Abused for Attacks, Water & Shipping Systems Breached 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1005: Today's episode will discuss the latest news $120M DeFi Heist and more news below: · Claude AI and OpenAI APIs exploited for data exfiltration · …
…
continue reading
1
LLM-as-a-Judge: Bias, Preference Leakage, and Reliability
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousi…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
To write secure code, be less gullible than your AI
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26Ryan is joined by Greg Foster, CTO of Graphite, to explore how much we should trust AI-generated code to be secure, the importance of tooling in ensuring code security whether it’s AI-assisted or not, and the need for context and readability for humans in AI code. Episode notes: Graphite is an AI code review platform that helps you get context on c…
…
continue reading
1
Department of Know: Azure security pitfalls, retailer cyberattack profits, Aardvark eats bugs
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's w…
…
continue reading
1
Unraid 7.2 At A Glance + Cyber Weekend Sale Coming Soon!
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05Unraid 7.2.0 Stable is out now! We briefly walk you through the major upgrades like: fully responsive WebGUI built‑in open API RAIDZ expansion Broader filesystem support including ext2/3/4, NTFS, and exFAT Links mentioned: Full release blog: https://unraid.net/blog/unraid-7-2-0 Tour video: https://www.youtube.com/watch?v=frtauLMO3-c Cyber Weekend S…
…
continue reading
1
🎙️ U.S. Telecom Breach by Nation-State Hackers, China Zero-Day Exploits, FCC Cyber Rollback, and OT Security Guidance 🚨
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23🎙️ Nation-State Hackers Hit U.S. Telecom, China Exploits Firewalls & Zero-Days, FCC Rolls Back Cyber Rules 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1004: Today's episode will discuss the latest news Major US Telecom Backbone Hacked by Nation-State and more news below: · Unive…
…
continue reading
1
#744: Amazon Bedrock AgentCore, Amazon EC2 Capacity Manager, and so much more!
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Simon and Jillian walk you through all the new and interesting updates.By Amazon Web Services
…
continue reading
1
Australia BadCandy warning, Cisco firewall attack, Aardvark eats bugs
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything…
…
continue reading
1
#526: Building Data Science with Foundation LLM Models
1:07:24
1:07:24
Play later
Play later
Lists
Like
Liked
1:07:24Today, we’re talking about building real AI products with foundation models. Not toy demos, not vibes. We’ll get into the boring dashboards that save launches, evals that change your mind, and the shift from analyst to AI app builder. Our guide is Hugo Bowne-Anderson, educator, podcaster, and data scientist, who’s been in the trenches from scalable…
…
continue reading
1
Pixels and Personality: A Conversation with Susan Kare
40:54
40:54
Play later
Play later
Lists
Like
Liked
40:54We were beyond honoured to be able to collaborate with the legendary graphic designer Susan Kare on the Ledger Nano Gen5 badges. Susan joined us in Paris for Ledger Op3n to talk about expression through creativity, her career journey and the process of developing exclusive art for Ledger. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading
1
What Could Possibly Go Wrong? Safety Analysis for AI Systems
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
…
continue reading
1
S6E26 - Classify and protect your data using Purview sensitivity labels
40:00
40:00
Play later
Play later
Lists
Like
Liked
40:00In this episode, Alan and Sam drive into the importance of classifying data in an organisation. Alan goes through the capability in Purview to tag files and encrypt them. Here are a few things we covered in this episode: Why is it important to classify data in an organisation How can Purview help with the applying labels to data How to get started …
…
continue reading
1
LinkedIn AI opt-out, NSA leadership candidates, Python foundation withdraws
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
…
continue reading
1
MessageBot: WhatsApp OTP Service in India — Secure, Fast & Interactive Verification
2:50
2:50
Play later
Play later
Lists
Like
Liked
2:50In this new episode of MessageBot — Smarter Business Messaging for India, we uncover how WhatsApp OTP Service in India is changing the way businesses verify users securely and instantly. Traditional SMS OTPs often face delivery delays and lower engagement. WhatsApp OTP solves these issues by providing fast, encrypted, and interactive verification w…
…
continue reading
Ryan talks with Deepak Singh, VP of Developer Agents and Experiences at AWS and lead at Kiro, about spec-driven development in a vibe coding world. They explore how AI tools have evolved from autocomplete to sophisticated agents that can write code based off of just specs, and how AWS has pioneered spec-driven development through their Kiro agent. …
…
continue reading
Share Episode Microsoft's John Papa, Partner General Manager of Developer Relations for all things dev and code joins the show to talk developer relations...from his Mac. He reveals his small part in the birth of VS Code (back when its codename was Ticino) after he spent a year trying a new editor every month. The conversation dives deep into "Agen…
…
continue reading
1
Canada Hacktivists Breach Water & Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47🎙️ Canada Hacktivists Breach Water & Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1003: Today's episode will discuss the latest news Canada Hacktivists Breach Water & Energy and more news below: · Microsoft DNS O…
…
continue reading
1
AI and Tech Writing with Selvaraaju Murugesan
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20Selvaraaju Murugesan of Kovai and I speak about the future of AI in tech writing. The AI writing tool with unparalleled story smarts Sudowrite is an AI-powered writing assistant that helps you brainstorm, outline, and write your stories. go.chrischinchilla.com/sudowrite For show notes and an interactive transcript, visit chrischinchilla.com/podcast…
…
continue reading
1
The Design of Desire, with Tony Fadell and Susan Kare
18:35
18:35
Play later
Play later
Lists
Like
Liked
18:35What do the iPod, the original Mac icons, and the Ledger Nano Gen5 have in common? Design legends. We hosted Tony Fadell and Susan Kare at Ledger Op3n 2025 to talk about their "Design of Desire" philosophy, making digital ownership human, and their work on the new Ledger Nano Gen5. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading
1
LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
…
continue reading
1
Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02🎙️ Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1002: Today's episode will discuss the latest news highlighting Dentsu Data Breach and more news below: · Russia-Linked Breaches in Ukraine …
…
continue reading
1
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
…
continue reading
1
DOP 322: How to Build Apps That Never Go Down Even When Servers Die
51:33
51:33
Play later
Play later
Lists
Like
Liked
51:33#322: Peer-to-peer technology represents a fundamental shift in how we think about data sovereignty and application architecture. Rather than relying on centralized servers and trusting specific endpoints, peer-to-peer systems allow users to verify data authenticity regardless of its source. This approach eliminates the traditional point-to-point c…
…
continue reading
1
Deno Deploy Makeover, Vitest 4, Nuxt 4.2, and Next.js 16 (Oh, and React Native 0.82) | News | Ep 41
40:40
40:40
Play later
Play later
Lists
Like
Liked
40:40News for the week of October 20, 2025: Deno Deploy revamp, Vitest 4, Nuxt 4.2, and Next.js 16, all in a single week. From the community: 4 weird ways to cast in TypeScript (+2 to Arcana rolls), type-safe API clients, and the hottest JS REPL around. Chapters (00:00) - Welcome to the Show (05:04) - News: Deno Deployed a Brand Spankin' New Deno Deploy…
…
continue reading
1
SE Radio 692: Sourabh Satish on Prompt Injection
1:04:36
1:04:36
Play later
Play later
Lists
Like
Liked
1:04:36Sourabh Satish, CTO and co-founder of Pangea, speaks with SE Radio's Brijesh Ammanath about prompt injection. Sourabh begins with the basic concepts underlying prompt injection and the key risks it introduces. From there, they take a deep dive into the OWASP Top 10 security concerns for LLMs, and Sourabh explains why prompt injection is the top ris…
…
continue reading
1
Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24🎙️ Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1001: Today's episode will discuss the latest news highlighting Sweden Power Grid Data Breach and more news below: · Hackers Target Perplexity Comet Brows…
…
continue reading
1
Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and ale…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Atlas browser hijacked, Bye, bye Twitter birdie, Dante spyware surfaces
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
…
continue reading
1
Craft and quality beat speed and scale, with or without agents
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50Ryan welcomes Tom Moor, head of engineering at Linear, to discuss AI agents’ mixed results for productivity in the development lifecycle, the importance of context for maximizing agents’ effectiveness, and the role that junior developers need to take in a world increasingly driven by AI. Episode notes: Linear is a tool for planning and building pro…
…
continue reading