Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Api Security Podcasts

show episodes
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Hosted by Viktor Gamov and Kaitlyn Barnard, we interview software developers and technology leaders at the top of their game every other week. We’ll also give you the tools, tactics and strategies you need to take your cloud native architecture to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you can tackle your biggest connectivity challenges.
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
  continue reading
 
We believe that digital transformation efforts make companies and communities more resilient. In the API Resilience podcast you'll listen to guests from industry leading API teams sharing their views about the current trends of the API economy. We also bring you insights that your API team will be able to use, and even explain to your management on how APIs can help your company cope, resurge, and thrive during and after this pandemic. The host is Kristof Van Tomme.
  continue reading
 
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
  continue reading
 
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
  continue reading
 
Building a successful API requires more than just coding. It starts with collaborative design, focuses on creating a great developer experience, and ends with getting your company on board, maintaining consistency, and maximizing your API’s profitability. In the API Intersection, you’ll learn from experienced API practitioners who transformed their organizations, and get tangible advice to build quality APIs with collaborative API-first design. Jason Harmon brings over a decade of industry-r ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Welcome to MessageBot, the podcast that explores how Indian businesses are transforming communication using Bulk SMS, Voice Calls, WhatsApp Business API, and RCS Messaging. Each episode dives into real-world use cases, automation strategies, and the latest updates in India’s messaging ecosystem. Whether you’re a startup, developer, or enterprise, you’ll learn how to send secure OTPs, automate campaigns, and stay TRAI-compliant — all while delivering messages that truly connect.
  continue reading
 
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
  continue reading
 
Artwork

1
Tech Lounge

Chris Chinchilla

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly podcast that welcomes you to explore technology with an insightful interview every two weeks and topic-deep dives every other two weeks. If you're interested in deep and creative technology and conversations with some of its most interesting practioners, this is the show for you. Come in and get yourself comfortable. Show notes can be found at - chrischinchilla.com/podcast Formerly known as "Chinchilla Squeaks"
  continue reading
 
Buzzword Bingo explores top-of-mind topics in enterprise tech. Each topic is examined from multiple perspectives through in-depth interviews with industry leaders and aficionados. Powered by Rubrik.
  continue reading
 
Artwork

1
Let's Talk Azure!

Alan Armstrong & Sam Foot

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
  continue reading
 
Artwork

1
The Last Great Cloud Transformation

lastgreatcloudtransformation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
For 20 years the cloud computing revolution has been transforming how organizations operate and innovate. But the revolution is not yet complete. The final areas of transformation are networking and security, which have remained grounded in on-premises thinking and technologies. No longer. A majority of enterprises are planning to increase spending on network modernization. Join us as we discuss what this new, cloud-oriented network should look like.
  continue reading
 
Artwork

1
Talk Python To Me

Michael Kennedy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
  continue reading
 
Artwork

1
Cloud Talk

Rackspace Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cloud Talk brings you discussions on topics like digital transformation, Kubernetes, IoT, edge computing and multicloud, as told through the perspectives of the people and the companies who are living this transformation on a daily basis. In Cloud Talk, host Jeff DeVerter interviews some of the most influential figures on the frontlines of cloud technology, helping you stay connected. Jeff is CTO at Rackspace and has spent over 20 years immersed in the world of cutting-edge technology.
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Artwork

1
Adventures in DevOps

Will Button, Warren Parad

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Owning an Unraid server gives you the ultimate control over your data and reduces your dependence on The Cloud. Join host Ed Rawlings to learn how to get the most out of your Unraid server, stay up to date on relevant news and topics, and get to know members of the Unraid community!
  continue reading
 
Artwork

1
Platform Engineering Podcast

Cory O'Daniel, CEO of Massdriver

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Private equity, venture capital and alternative investments - long-form podcasts with industry leaders Dive into in-depth conversations with industry leaders and gain exclusive insights into the world of private capital. 🎙️Fund Shack is dedicated to providing thought-provoking, authentic discussions with the most respected private capital managers, asset managers, professional advisers, & thought leaders. Our long-form interviews are unscripted, ensuring genuine & enriching conversations. Ho ...
  continue reading
 
Loading …
show series
 
"SleepyDuck" uses Ethereum to keep command server alive SesameOp abuses OpenAI Assistants API Organized crime cybercrooks steal cargo Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platf…
  continue reading
 
In this episode, we dive into three key Cloud Workload Protection Platform (CWPP) offerings within Microsoft Defender for Cloud: Defender for Resource Manager, Defender for Key Vault, and Defender for APIs. Our Q&A format explores how these tools safeguard Azure environments against sophisticated threats, from management layer exploits to API vulne…
  continue reading
 
News of the week of October 6, 2025: Highlights from ReactConf 2025, Bun 1.3's (delicious) security lede got buried, and how to buy lifetime access to someone's webcam for $500. From the community: CSS is cool again, Immer.js perf improvements, and why typed linting is blocked by ESLint core. Chapters (00:00) - Welcome to the Show (05:52) - News: R…
  continue reading
 
Episode 4: Security as Code In this episode of the ePlus Security + F5 API Security Podcast, David Tumlin and Chuck Herrin dive into the future of "security as code," where automation, AI, and DevSecOps converge to protect dynamic, ephemeral environments. From real-time threat validation to AI-assisted policy tuning, this is a must-listen for anyon…
  continue reading
 
Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
  continue reading
 
Is your Git repo really the source of truth for infrastructure - or just a suggestion? Guest host Kelsey Hightower sits down with Cory O’Daniel to unpack why many teams hit dead ends with CI/CD for provisioning, where GitOps struggles with drift, and when TicketOps helps or hurts. They explore a different model: infrastructure as data with typed co…
  continue reading
 
#323: Vibe coding - the practice of giving AI a high-level description and letting it build applications unsupervised - has become increasingly popular among non-developers looking to quickly prototype ideas. While this approach excels at rapid prototyping and getting small, focused applications running, it creates significant security risks when d…
  continue reading
 
Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
  continue reading
 
News for the week of October 27, 2025: TypeScript is the #1 language on GitHub, making your Regex type-safe, and Biome adds support for three new metaframeworks. From the community: a metaframework for Angular, PHP in JS, and a polyglot runtime that will blow your mind. Chapters (00:00) - Welcome to the Show (05:36) - News: TypeScript Won in 2025 (…
  continue reading
 
We hosted sports legends Bruce Bowen, Matt Giteau, Drew Mitchell, and health & wellness consultant JoeHolder at Ledger Op3n 2025! They chatted with our EVP of Communications Ariel Wengroff about the crossover between sports and security - namely, building resilience. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
🎙️ $120M DeFi Heist, AI Tools Abused for Attacks, Water & Shipping Systems Breached 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1005: Today's episode will discuss the latest news $120M DeFi Heist and more news below: · Claude AI and OpenAI APIs exploited for data exfiltration · …
  continue reading
 
Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousi…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Ryan is joined by Greg Foster, CTO of Graphite, to explore how much we should trust AI-generated code to be secure, the importance of tooling in ensuring code security whether it’s AI-assisted or not, and the need for context and readability for humans in AI code. Episode notes: Graphite is an AI code review platform that helps you get context on c…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's w…
  continue reading
 
Unraid 7.2.0 Stable is out now! We briefly walk you through the major upgrades like: fully responsive WebGUI built‑in open API RAIDZ expansion Broader filesystem support including ext2/3/4, NTFS, and exFAT Links mentioned: Full release blog: https://unraid.net/blog/unraid-7-2-0 Tour video: https://www.youtube.com/watch?v=frtauLMO3-c Cyber Weekend S…
  continue reading
 
🎙️ Nation-State Hackers Hit U.S. Telecom, China Exploits Firewalls & Zero-Days, FCC Rolls Back Cyber Rules 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1004: Today's episode will discuss the latest news Major US Telecom Backbone Hacked by Nation-State and more news below: · Unive…
  continue reading
 
Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything…
  continue reading
 
Today, we’re talking about building real AI products with foundation models. Not toy demos, not vibes. We’ll get into the boring dashboards that save launches, evals that change your mind, and the shift from analyst to AI app builder. Our guide is Hugo Bowne-Anderson, educator, podcaster, and data scientist, who’s been in the trenches from scalable…
  continue reading
 
We were beyond honoured to be able to collaborate with the legendary graphic designer Susan Kare on the Ledger Nano Gen5 badges. Susan joined us in Paris for Ledger Op3n to talk about expression through creativity, her career journey and the process of developing exclusive art for Ledger. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
  continue reading
 
In this episode, Alan and Sam drive into the importance of classifying data in an organisation. Alan goes through the capability in Purview to tag files and encrypt them. Here are a few things we covered in this episode: Why is it important to classify data in an organisation How can Purview help with the applying labels to data How to get started …
  continue reading
 
LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
  continue reading
 
In this new episode of MessageBot — Smarter Business Messaging for India, we uncover how WhatsApp OTP Service in India is changing the way businesses verify users securely and instantly. Traditional SMS OTPs often face delivery delays and lower engagement. WhatsApp OTP solves these issues by providing fast, encrypted, and interactive verification w…
  continue reading
 
Ryan talks with Deepak Singh, VP of Developer Agents and Experiences at AWS and lead at Kiro, about spec-driven development in a vibe coding world. They explore how AI tools have evolved from autocomplete to sophisticated agents that can write code based off of just specs, and how AWS has pioneered spec-driven development through their Kiro agent. …
  continue reading
 
Share Episode Microsoft's John Papa, Partner General Manager of Developer Relations for all things dev and code joins the show to talk developer relations...from his Mac. He reveals his small part in the birth of VS Code (back when its codename was Ticino) after he spent a year trying a new editor every month. The conversation dives deep into "Agen…
  continue reading
 
🎙️ Canada Hacktivists Breach Water & Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1003: Today's episode will discuss the latest news Canada Hacktivists Breach Water & Energy and more news below: · Microsoft DNS O…
  continue reading
 
Selvaraaju Murugesan of Kovai and I speak about the future of AI in tech writing. The AI writing tool with unparalleled story smarts Sudowrite is an AI-powered writing assistant that helps you brainstorm, outline, and write your stories. go.chrischinchilla.com/sudowrite For show notes and an interactive transcript, visit chrischinchilla.com/podcast…
  continue reading
 
What do the iPod, the original Mac icons, and the Ledger Nano Gen5 have in common? Design legends. We hosted Tony Fadell and Susan Kare at Ledger Op3n 2025 to talk about their "Design of Desire" philosophy, making digital ownership human, and their work on the new Ledger Nano Gen5. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
  continue reading
 
🎙️ Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1002: Today's episode will discuss the latest news highlighting Dentsu Data Breach and more news below: · Russia-Linked Breaches in Ukraine …
  continue reading
 
New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
  continue reading
 
#322: Peer-to-peer technology represents a fundamental shift in how we think about data sovereignty and application architecture. Rather than relying on centralized servers and trusting specific endpoints, peer-to-peer systems allow users to verify data authenticity regardless of its source. This approach eliminates the traditional point-to-point c…
  continue reading
 
News for the week of October 20, 2025: Deno Deploy revamp, Vitest 4, Nuxt 4.2, and Next.js 16, all in a single week. From the community: 4 weird ways to cast in TypeScript (+2 to Arcana rolls), type-safe API clients, and the hottest JS REPL around. Chapters (00:00) - Welcome to the Show (05:04) - News: Deno Deployed a Brand Spankin' New Deno Deploy…
  continue reading
 
Sourabh Satish, CTO and co-founder of Pangea, speaks with SE Radio's Brijesh Ammanath about prompt injection. Sourabh begins with the basic concepts underlying prompt injection and the key risks it introduces. From there, they take a deep dive into the OWASP Top 10 security concerns for LLMs, and Sourabh explains why prompt injection is the top ris…
  continue reading
 
🎙️ Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1001: Today's episode will discuss the latest news highlighting Sweden Power Grid Data Breach and more news below: · Hackers Target Perplexity Comet Brows…
  continue reading
 
Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and ale…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
  continue reading
 
Ryan welcomes Tom Moor, head of engineering at Linear, to discuss AI agents’ mixed results for productivity in the development lifecycle, the importance of context for maximizing agents’ effectiveness, and the role that junior developers need to take in a world increasingly driven by AI. Episode notes: Linear is a tool for planning and building pro…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play