Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Application Security Podcasts
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Welcome to the mbaMission podcast, where every week we discuss different MBA application components and give our expert guidance on everything business school admissions related.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to Interview Boss hosted by sisters Emma and Sarah Smith. This podcast is all about providing advice, inspiration and support for job seekers. Whether you're between jobs, or looking for your dream promotion, we're here to give you the tips, tricks and behind the scenes knowledge you need to be the boss of your career. We'll dive deep in to all things resume, cover letter, job application, job search strategy, interviews and offer negotiations. We're going to bring you a mix of advic ...
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
Nancy L. Cavey, a seasoned attorney with over thirty-nine years of experience, explains the complex world of filing for Social Security Disability benefits. Filing for disability can be a confusing, life changing event, so with her deft expertise, Nancy will guide you through: - The ins-and-outs of qualifying for Social Security Disability benefits (such as age and insurance requirements). - Information regarding the process and lifespan of a claim, from the initial application to the reques ...
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
Consumer advocacy in application security
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Software Architecture Insights is your go-to resource for empowering software architects and aspiring professionals with the knowledge and tools required to navigate the complex landscape of modern software design. SAI provides invaluable insights into crucial aspects of software architecture, including cloud computing, application security, scalability, availability, and more. Whether you're a seasoned architect looking to stay up-to-date with the latest industry trends or a prospective sof ...
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
The Innovators & Investors Podcast: Connecting the Startup Ecosystem. We are on a mission to bridge the gap between founders, investors, and industry leaders across the early-stage ecosystem. By bringing together visionaries from cutting-edge startups, venture capitalists, family offices, angel investors, accelerators, and studios, we offer a platform for sharing invaluable insights, market trends, and first-hand experiences. Whether you’re an entrepreneur navigating the challenges of buildi ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Technical interviews about software topics.
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
Trust in the media is at an all-time low. And there’s a reason—endless virtue signaling and manufactured outrage. Finally, there’s an alternative. Morning Wire is presented by Daily Wire Editor-in-Chief, John Bickley, and co-host Georgia Howe. Get daily coverage of the latest developments in politics, culture, education, sports, and more. Wake up with Morning Wire and get the facts first on the news you need to know.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and ale…
…
continue reading
1
Nigeria on Notice: The Trump Administration Zeros In On Christian Persecution
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31What exactly is happening to Christians on the ground in Nigeria and why has the legacy media been so unwilling to call it genocide? In this episode Daily Wire Culture Reporter Megan Basham speaks with Congressman Riley Moore, Senator Ted Cruz, and a regional ministering expert to find out. Get the facts first with Morning Wire. Equip Foods: Equip …
…
continue reading
1
Evening Wire: SCOTUS Backs Biology & Trump’s Weight Loss Drug Deal | 11.7.25
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28The U.S. takes out another drug-smuggling boat in the Caribbean, a Republican announces her candidacy for New York Governor, and Vietnam moves to thwart China’s dominance in the south China sea. Get the facts first with Evening Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Privacy Policy: https://www.dailywire.com/pr…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
Shutdown Chaos Escalates & Pelosi Bows Out | 11.7.25
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08President Trump leans on lawmakers to end the country’s longest government shutdown, progressive Democrat leader Nancy Pelosi finally hangs it up, and Border Patrol sets a new record on illegal crossings as officers face increased resistance. Get the facts first with Morning Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - …
…
continue reading
1
Evening Wire: Pelosi Calls It Quits & FAA Cuts Flights | 11.6.25
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Nancy Pelosi says she’s finally walking away, the FAA slashes flights, and a Virginia teacher gets a massive payout after being shot by a 6-year-old student. Get the facts first with Evening Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Privacy Policy: https://www.dailywire.com/privacy morning wire,morning wire podca…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Momentum Series: Bridging Healthcare Innovation and Investment with Joel Martin
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43In this episode of the Innovators and Investors podcast, host Kristian Marquez talks with Joel Martin, Chief Operating Officer at Medsense and Operating Partner at HealthX Ventures. Joel discusses his career journey and the challenges in healthcare technology. He emphasizes the importance of accurate provider data, the transition from fee-for-servi…
…
continue reading
1
The Architecture of the Internet with Erik Seidel
51:20
51:20
Play later
Play later
Lists
Like
Liked
51:20The modern internet is a vast web of independent networks bound together by billions of routing decisions made every second. It’s an architecture so reliable we mostly take it for granted, but behind the scenes it represents one of humanity’s greatest engineering achievements. Today’s internet is also dramatically more complex and capable than in i…
…
continue reading
1
SCOTUS Weighs Tariff Authority & ICE Checks Mamdani | 11.6.25
17:23
17:23
Play later
Play later
Lists
Like
Liked
17:23The Supreme Court considers President Trump’s authority to impose reciprocal tariffs worth billions, a standoff is brewing in New York City between Zohran Mamdani and ICE, and the battle to shift the balance of power in Congress through redistricting ratchets up. Get the facts first with Morning Wire. - - - Wake up with new Morning Wire merch: http…
…
continue reading
1
Evening Wire: Louisville Crash Claims Lives & Houston Courts The NYPD | 11.5.25
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31The death toll rises following a fiery plane crash in Louisville, Houston Police openly recruit from the NYPD, and Zohran Mamdani’s victory party gets hacked. Get the facts first with Evening Wire. Thumbnail Image Credit: Leirim Rodrigues via Storyful - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Privacy Policy: https://ww…
…
continue reading
1
Don't be fooled by the 'casual chat' trap
33:24
33:24
Play later
Play later
Lists
Like
Liked
33:24You’ve been invited in for a “casual chat.” No panel, no formal questions, maybe even coffee instead of a meeting room. Sounds chill, right? Not so fast. These chats might feel relaxed, but they’re still interviews, and plenty of people get caught out by treating them like they’re not. In this week’s episode, Sarah and Emma unpack what “just a chat…
…
continue reading
1
Mark McMillan - Leading with the Carrot: Building Security Culture, Not Just Compliance
43:36
43:36
Play later
Play later
Lists
Like
Liked
43:36Mark McMillan has been building and leading Information Security Champions programs for over five years and has spent nearly a decade shaping cybersecurity culture at Rocket. He's passionate about creating programs that empower, not punish, and help people understand their role in keeping data secure. In this episode of The Security Champions Podca…
…
continue reading
1
Episode 70 - The Best of Times, The Worst of Times: Finding Humanity in the Age of AI
29:29
29:29
Play later
Play later
Lists
Like
Liked
29:29The robots used to be a distant concept from science fiction, but not anymore. They are already here, walking among us. From agentic AI to artificial general intelligence, the digital frontier is evolving faster than most can process. As these tools grow smarter and more autonomous, the heart of the matter is finding out how to stay grounded, curio…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Inside Your Social Security Disability Hearing: What to Expect and How to Win
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Have a comment or question? Click this sentence to send us a message, and we might answer it in a future episode. Welcome to Season 1, Episode 37 of Winning Isn't Easy: Navigating Your Social Security Disability Claim. In this episode, we'll dive into the complicated topic of "Inside Your Social Security Disability Hearing: What to Expect and How t…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
#70 From Teen Hacker to Professional Pentester: The Journey of Kyle Hoehn
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
…
continue reading
The 2025 election results are in, the Democratic Party takes a hard-left swerve, and as the government shutdown breaks records, Transportation Secretary Duffy warns of massive air travel fallout. Get the facts first with Morning Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Today's Sponsors: Shopify - Go to https://S…
…
continue reading
1
Driving healthcare discoveries with AI ft. Jianying Hu
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30We often hear about AI's potential to generate text and code, but its application in healthcare and life sciences promises a more profound impact: solving our most fundamental challenges in disease and medicine. This isn't just about applying existing LLMs; it's about building entirely new foundation models that understand the complex language of b…
…
continue reading
1
Evening Wire: Voters Hit The Polls & Duffy’s Dire Warning | 11.4.25
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57Millions of voters decide the political fate of several cities and states, bomb threats shut down multiple polling stations in New Jersey & pressure mounts on Democrats as the Transportation Secretary issues a dire warning. Get the facts first with Evening Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Privacy Policy:…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
Episode 302 of Absolute AppSec has hosts Ken Johnson and Seth Law speculating on the upcoming Global AppSec DC conference, predicting the announcement of the OWASP Top Ten 2025 edition, with Brian Glass scheduled to discuss it on the podcast. The conversation shifts to a technical discussion of OpenAI's new browser, Atlas, which is built on Chromiu…
…
continue reading
1
Why File Uploads Are Hard: Lessons from Uploadcare's CEO Igor Debatur
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Igor Debatur, the CEO and co-founder of Uploadcare, joins us to discuss the complexities and challenges of file management in modern applications. Uploadcare specializes in making the file upload experience seamless for users. Igor shares how their journey started from being an agency that built products for clients to creating a comprehensive solu…
…
continue reading
1
A Deep Dive into the Open Source Project Security (OSPS) Baseline
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode of "What's in the SOSS," CRob, Ben Cotton, and Eddie Knight discuss the Open Source Project Security Baseline. This baseline provides a common language and control catalog for software security, enabling maintainers to demonstrate their project's security posture and fostering confidence in open source projects. They explore its int…
…
continue reading
1
Enhancing the Developer Experience: Recent MCUXpresso Improvements in VS Code
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Evolution of MCUXpresso for VS Code: Latest Features and Enhancements Welcome back to the NXP EdgeVerse Techcast! Join hosts Kyle Dando and Bridgette Stone as they discuss the growing momentum behind the MCUXpresso extension for Visual Studio Code. Ecosystem Product Manager Jose Ocampo Hernandez joins the episode to discuss the transformative upgra…
…
continue reading
1
LLM-as-a-Judge: Bias, Preference Leakage, and Reliability
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousi…
…
continue reading
1
SED News: AMD’s Big OpenAI Deal, Intel’s Struggles, and Apple’s AI Long Game
49:02
49:02
Play later
Play later
Lists
Like
Liked
49:02SED News is a monthly podcast from Software Engineering Daily where hosts Gregor Vand and Sean Falconer unpack the biggest stories shaping software engineering, Silicon Valley, and the broader tech industry. In this episode, they cover the $1.7B acquisition of Security AI, LangChain’s massive valuation, and the surprise $300M funding” round for Per…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Ep 75 | How to Secure Standout MBA Recommendation Letters
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34Letters of recommendation are a critical -- and often overlooked -- part of the MBA application process. In this week's episode of the mbaMission podcast, Harold Simansky is joined by mbaMission Managing Director Rachel Beck and Executive Director Jessica Shklar. Harold, Rachel, and Jessica discuss the role recommendations play in business school a…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Election Day 2025: Eyes on Jersey & NYC | 11.4.25
18:54
18:54
Play later
Play later
Lists
Like
Liked
18:54We look at the final polling and stakes for both parties, check on the New Jersey governor’s race, and peer into New York City, where front-runner Zohran Mamdani brings a commanding lead into Election Day. Get the facts first with Morning Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Today's Sponsors: Vanta - Get sta…
…
continue reading
1
Building Trustworthy AI: Navigating the Challenges and Future of Agentic Software with Shane Emmons
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22In this episode of The Innovators & Investors Podcast, host Kristian Marquez sits down with Shane Emmons, founder and CEO of Swept, to explore the complexities and challenges surrounding AI trust and reliability. Shane explains why AI systems can behave unpredictably due to their probabilistic nature and the inherent uncertainty in their prediction…
…
continue reading
1
Technology Innovations in Media and Entertainment
1:20:38
1:20:38
Play later
Play later
Lists
Like
Liked
1:20:38In this episode of the CDW Canada Tech Talks podcast, host KJ Burke engages with CDW experts Joe D'Amato, Kris Kostiuk and Kevin Ellsworth to explore the evolving technology landscape of media and entertainment. They discuss the unique challenges faced by the industry, including project-based workflows, cybersecurity threats and the impact of AI on…
…
continue reading
1
Evening Wire: Obama’s 11th Hour Stump & Dodgers Defend Title | 11.3.25
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39Barack Obama hits the trail in two big races, President Trump returns to “60 Minutes,” and new details emerge on a horrible string of stabbings in the UK. Get the facts first with Evening Wire. - - - Wake up with new Morning Wire merch: https://bit.ly/4lIubt3 - - - Privacy Policy: https://www.dailywire.com/privacy morning wire,morning wire podcast,…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading