Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Application Security Podcasts
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
This podcast will take you on a smart, direct, sometimes scary, sometimes profane, sometimes hilarious tour of the inner workings of American power and of the impact of our leaders and their policies on our standing in the world. Hosted by noted author and commentator David Rothkopf and featuring regulars Rosa Brooks of Georgetown Law School, Kori Schake of AEI, and Ed Luce of the Financial Times, the program will be the lively, smart dinner table conversation on the big issues of the day th ...
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
The DSR Daily is a daily news podcast cover the foreign policy and national security news. Each weekday morning, Riley Fessler, Minnah Stein, and David Rothkopf will bring you the latest as covered by the best media outlets from around the world. See acast.com/privacy for privacy and opt-out information.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Nancy L. Cavey, a seasoned attorney with over thirty-nine years of experience, explains the complex world of filing for Social Security Disability benefits. Filing for disability can be a confusing, life changing event, so with her deft expertise, Nancy will guide you through: - The ins-and-outs of qualifying for Social Security Disability benefits (such as age and insurance requirements). - Information regarding the process and lifespan of a claim, from the initial application to the reques ...
…
continue reading
Welcome to Interview Boss hosted by sisters Emma and Sarah Smith. This podcast is all about providing advice, inspiration and support for job seekers. Whether you're between jobs, or looking for your dream promotion, we're here to give you the tips, tricks and behind the scenes knowledge you need to be the boss of your career. We'll dive deep in to all things resume, cover letter, job application, job search strategy, interviews and offer negotiations. We're going to bring you a mix of advic ...
…
continue reading
Consumer advocacy in application security
…
continue reading
As a Visa Consultant based in Chandigarh, Amit Kakkar has gained extensive experience in providing Visa services to clients. With his vast knowledge of the Visa application process and his understanding of the complex legal requirements, Amit has helped countless individuals and families secure their visas.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Mike Domeny, actor, author, and founder of Outloud Bible Project (outloudbible.com), reads the Bible out loud in a conversational and approachable way so you can read the Bible like it makes a difference! This isn't simply an audiobook version of the Bible! Every episode offers helpful context so you won't get lost, and a brief takeaway to help apply that reading to your life. Want to invite Mike to read Scripture at your event or gathering? Visit outloudbible.com. Starting with episode 279, ...
…
continue reading
The Innovators & Investors Podcast: Connecting the Startup Ecosystem. We are on a mission to bridge the gap between founders, investors, and industry leaders across the early-stage ecosystem. By bringing together visionaries from cutting-edge startups, venture capitalists, family offices, angel investors, accelerators, and studios, we offer a platform for sharing invaluable insights, market trends, and first-hand experiences. Whether you’re an entrepreneur navigating the challenges of buildi ...
…
continue reading
Software Architecture Insights is your go-to resource for empowering software architects and aspiring professionals with the knowledge and tools required to navigate the complex landscape of modern software design. SAI provides invaluable insights into crucial aspects of software architecture, including cloud computing, application security, scalability, availability, and more. Whether you're a seasoned architect looking to stay up-to-date with the latest industry trends or a prospective sof ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Technical interviews about software topics.
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
Securing Application Delivery with Island
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55All links and images can be found on CISO Series. Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermin…
…
continue reading
1
Technical Series: Basic SAP Authorisation Concepts - SAP Transactions & Fiori Applications, Authorisation Objects, Fields and Values
12:24
12:24
Play later
Play later
Lists
Like
Liked
12:24Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. Introducing Our Technical Series: The Building Blocks of SAP Role Design. In the first episode of our new Technical Series, we unpack the foundations of SAP authorisations — what they are, how they function, and why they matte…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Siliconsciousness: AI and Investing: Ally, Enemy or Both?
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Would you use an AI as your stockbroker? Maybe not. Yet more and more individuals and firms are using AI tools to aid in investing. But will AI-powered investment democratize the practice, or ensure that wealth disparity grows as wealthier individuals use better models? MIT professor Andrew Lo joins David Rothkopf to explore the relationship betwee…
…
continue reading
1
How to explain why you're taking a step down (convincingly!)
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Stepping down a level on the career ladder can feel strangely just as intimidating as aiming higher. How do you explain why you want a less senior role without sounding like you’re burnt out, unmotivated, or trying to “quit” responsibility? Whether you’re shifting from director to individual contributor, prioritising family life, or simply craving …
…
continue reading
We rethink legacy through David’s charge to Solomon, contrasting wealth with obedience, and explore how discipleship builds a living temple that outlasts money and monuments. We speak to those with complex family stories and offer hope, courage, and a clear next step. • repentance as daily recalibration toward God • Paul’s “worst of sinners” as gro…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Words Matter: MAGA is Coming Apart at the Seams
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50Tuesday was a surprisingly difficult victory for the Republicans in red Tennessee. The speical election’s electoral results have a lot to tell us about the increasing tensions and discontent within the Republican party. Norm Ornstein and David Rothkopf are back to discuss the fragile state of GOP leadership, the absurd levels of political corruptio…
…
continue reading
Python’s popularity in data science and backend engineering has made it the default language for building AI infrastructure. However, with the rapid growth of AI applications, developers are increasingly looking for tools that combine Python’s flexibility with the rigor of production-ready systems. Pydantic began as a library for type-safe data val…
…
continue reading
1
1 Chronicles 21-22: Security, Sacrifice, and Legacy
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02We trace David’s misstep in counting Israel’s fighting men, the mercy that met his repentance, and how a place of judgment became the site for God’s house. We draw a straight line from ancient numbers to modern security and end with a charge to build with courage. • why David’s census undercut trust in God • Joab’s warning and the weight of leaders…
…
continue reading
1
The Daily Blast: Angry Trump Unravels over 2026 Woes as GOP Panic Grows: “Flashing Red”
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Democrats have signaled that they’re running in the 2026 midterms on “affordability.” This week, Trump unleashed several angry, wild-eyed rants about their “affordability” message. In one, he raged that this message is a “con job.” In another, he seethed that it’s a “Democrat scam.” He’s angry because these attacks are working, and because he knows…
…
continue reading
1
Momentum Series: Amplifying Citizen Voices with Polco Co-Founder Nick Mastronardi
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19In this episode of the Innovators and Investors Podcast, host Kristian Marquez interviews Nick Mastronardi, co-founder and CEO of Polco. They discuss Nick’s background in data science and economics, the inspiration behind Polco, and the company’s mission to enhance civic participation through data-driven decision-making for public sector officials.…
…
continue reading
1
Hegseth's War Criminal Ethos plus Can Europe Be Saved?
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Are we really going to war with Venezuela? Just how bad is Hegseth’s war criminal ethos? Can Europe pull itself together to save Ukraine and itself? These are the questions that keep us up at night, but our friends Ed Luce and Rosa Brooks join David Rothkopf to try and give us answers. Will their answers help us rest easy? Tune in to find out! Lear…
…
continue reading
1
December 3: Admin Pauses ALL Immigration Applications for 19 Countries
20:36
20:36
Play later
Play later
Lists
Like
Liked
20:36On the DSR Daily for Wednesday, we discuss a new pause on immigration applications for 19 countries, a new immigration crackdown in New Orleans, a Democrat loss in the Tennessee special election, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading
1
DSR Daily December 3: Admin Pauses ALL Immigration Applications for 19 Countries
20:36
20:36
Play later
Play later
Lists
Like
Liked
20:36On the DSR Daily for Wednesday, we discuss a new pause on immigration applications for 19 countries, a new immigration crackdown in New Orleans, a Democrat loss in the Tennessee special election, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading
1
Top Technology Trends and Predictions for 2026
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
…
continue reading
1
The Daily Blast: Trump Seethes Darkly at Media as MAGA Bloodlust at Bombings Boils Over
24:26
24:26
Play later
Play later
Lists
Like
Liked
24:26Suddenly, on many fronts at once, President Trump and his allies are demonstrating how central sheer sadism is to his agenda—and to how MAGA conducts politics. Trump just unleashed a hateful rant to the media about Somali immigrants to set the stage for a coming campaign to arrest them en masse. Meanwhile, MAGA excitement over the Caribbean Sea bom…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
Social Security Myths: Fraud, Immigrants, and Inmates - What’s Really Going On
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Have a comment or question? Click this sentence to send us a message, and we might answer it in a future episode. Welcome to Season 1, Episode 41 of Winning Isn't Easy: Navigating Your Social Security Disability Claim. In this episode, we'll dive into the complicated topic of "Social Security Myths: Fraud, Immigrants, and Inmates - What’s Really Go…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
…
continue reading
1
Platform engineering for AI agents ft. Tushar Katarki
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05A decade ago, the shift from monolithic applications to microservices created an explosion of complexity that only Kubernetes could tame. Today, the enterprise is facing a similar inflection point. We are moving beyond simple chatbots to "Agentic AI"—autonomous systems capable of planning, tool calling, and executing complex workflows. But with thi…
…
continue reading
1
NTK: After the Fox: The Search for Who to Trust in the New Media Era
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35How dead is old media? As more and more traditional outlets are swallowed by powerful individuals and corporations, it’s hard to determine what’s worth reading anymore. Are the New York Times and Washington Posts of the world still worth paying attention to? Jeff Jarvis and Dan Froomkin join David Rothkopf to explore these questions and determine w…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
NTK: How to Combat Authoritarianism in the US: A Conversation with Sen. Jeff Merkley
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05President Trump has grown even more authoritarian and bold with each passing day in his second term. With illegal strikes on boats and the pardon of the former Honduran president, it’s clear that the administration is moving recklessly ahead with a dangerous agenda. So what can Congress do? And just as critically, what can every day citizens do to …
…
continue reading
1
December 2: Trump Pardons Former Honduran President
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44On the DSR Daily for Tuesday, we break down Trump’s pardon of the former president of Honduras, Hegseth and the White House scrambling in the fallout from a boat strike, Costco’s lawsuit against the administration, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading
1
DSR Daily December 2: Trump Pardons Former Honduran President
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44On the DSR Daily for Tuesday, we break down Trump’s pardon of the former president of Honduras, Hegseth and the White House scrambling in the fallout from a boat strike, Costco’s lawsuit against the administration, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading
Given the spate of recent npm news stories, we've arranged a topical show with software supply-chain security researcher and npm hacker Paul McCarty (find Paul on bsky https://bsky.app/profile/6mile.githax.com) . Paul is currently a researcher with Safety (https://getsafety.com/) and has a background in security including work at John Deere, Boeing…
…
continue reading
1
Securing the Future: AI, Open Source, and Collaboration with Jay White (Microsoft)
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32Jay White, a leader in the open source ecosystem at Microsoft, discusses his journey into open source, focusing on AI and machine learning. He highlights his role in the Azure office of the CTO, working on open source, security, and AI standards. White emphasizes the importance of model signing and transparency in AI development, mentioning ongoing…
…
continue reading
1
SPSDK Spotlight: Empowering Developers with Secure Provisioning
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26Unlocking the Power of NXP's Secure Provisioning SDK (SPSDK) with Maria Wisniewska | EdgeVerse Techcast Join hosts Kyle Dando and Bridgette Stone on the latest episode of the EdgeVerse Techcast as they help listeners understand the ways NXP's Secure Provisioning SDK (SPSDK) reduces the complexities of secure provisioning. Special guest Maria Wisnie…
…
continue reading
1
Now you see me, now you don't: Ephemeral Auth and AI agents
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Agents are popping up everywhere: tiny bots spinning up for a task, then dying off. They shouldn’t carry long-lived credentials any more than you carry a master key everywhere you go. What if each agent got a just-for-this-mission credential—scoped, temporary, context-aware, and gone when its task ends? That’s ephemeral authentication. In this epis…
…
continue reading
1
SED News: Bezos Returns to Building, AI’s Reality Check, and Europe’s Cloud Ambitions
54:01
54:01
Play later
Play later
Lists
Like
Liked
54:01SED News is a monthly podcast from Software Engineering Daily where hosts Gregor Vand and Sean Falconer unpack the biggest stories shaping software engineering, Silicon Valley, and the broader tech industry. In this episode, they cover Jeff Bezos’s unexpected return to the CEO seat with Project Prometheus, the growing debate over whether AI investm…
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
The Daily Blast: Trump Press Sec Spin Implodes as Fresh Boat Bombing Horrors Rattle GOP
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15President Trump’s illegal boat bombings just got even worse. We’ve now learned that after demolishing a boat allegedly carrying drug smugglers in September, two survivors were left behind, and they were both blown apart in a second strike. That’s probably a war crime. On Monday, White House press secretary Karoline Leavitt struggled mightily to spi…
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
We trace David’s campaigns in 1 Chronicles 18–20 and show how every victory points beyond tactics to trust. Strategy matters, but the source of real triumph is God’s purpose and power, culminating in a hope that points from David to Jesus. • focus on Judah’s history through David’s reign • key wars against Philistines, Moabites, Arameans and Ammoni…
…
continue reading
1
Technical Series: How to Make use of SAP SU24 Variants
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as …
…
continue reading
1
Technical Series: How to Build SAP Single Roles
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical series episode, we unpack one of the most important building blocks in SAP authorisations: single roles. Our experts explore the different ways organisations design single roles to balance provisioning efficienc…
…
continue reading