The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Browser Security Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
Linux “Off The Cuff”
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Audio versions of new articles as they’re posted on http://askleo.com
…
continue reading
15 minutes news, tips, and tricks on the Go programming language.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
A weekly news show where your favorite Engadget editors tear themselves away from their crippling technology addiction, to discuss our collective crippling technology addiction.
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
…
continue reading
Spreading awarness about data privacy, cybersecurity tips and how you should become an alert citizen by protecting your privacy
…
continue reading
…
continue reading
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
…
continue reading
Technical interviews about software topics.
…
continue reading
Talking about the newest tech, such as phones, computers, and more!
…
continue reading
Current content form the PC World Magazine
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading
ConTejas Code is a podcast in the web engineering space that has deep dives on various topics between frontend engineering with React, TypeScript, Next.js, and backend engineering with Kafka, Postgres, and more. The series is a mix of long-form content and guest episodes with industry leaders in the web engineering space. From the podcast, listeners will take away actionable best practices that you can integrate into your workflows as well as valuable insights from prominent people in the in ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse’s residential honeypot, which has historica…
…
continue reading

1
3347: Bitsight on the Hidden Risks Inside Global Supply Chains
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56When we talk about cybersecurity, it’s often easy to think in terms of firewalls, passwords, and high-profile breaches. But what happens when the vulnerability isn’t within your own systems but somewhere deep in your third or fourth-tier supply chain? In this episode, I spoke with Ben Edwards from Bitsight about the unseen infrastructure propping u…
…
continue reading

1
Risky Biz Soap Box: Prowler, the open cloud security platform
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler. Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler’s successful transition from an open-source projec…
…
continue reading

1
Risky Biz Soap Box: Prowler, the open cloud security platform
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler. Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler’s successful transition from an open-source projec…
…
continue reading
Microsoft tests new Windows tech to lengthen laptop battery life.
…
continue reading
Microsoft tightens screws on Windows 10 users running Office 365.
…
continue reading
This mini PC with 16GB of RAM is just $157, no Prime necessary.
…
continue reading
The best monitors: 11 top picks for gaming, 4K, HDR, and more.
…
continue reading
SwannBuddy 4K Video Doorbell review: Let the robots run the house.
…
continue reading
Snag a pair of ultra-fast 240W USB-C cables for only $11 right now.
…
continue reading
Prime Day leftovers: I found 10 superb PC tech deals you can still score cheap.
…
continue reading

1
Zillow Transforms Real Estate with AI, AWS S3 Becomes AI Powerhouse, India Launches AI X-ray Kits, American Airlines Innovates Travel Experience, and more...
10:08
10:08
Play later
Play later
Lists
Like
Liked
10:08(0:10): Zillow Revolutionizes Real Estate with AI: Boosting Efficiency, Accuracy, and Market Access (2:12): AWS S3 Transforms into AI Powerhouse with Metadata Lakes and Autonomous Data Agents (4:11): India Launches AI-Powered Portable X-ray Kits to Boost TB Detection Nationwide (6:25): American Airlines Revolutionizes Travel with AI and Biometric I…
…
continue reading
Gmail AI summaries can be hijacked for phishing scams.
…
continue reading
Static electricity fried my PC. Heres what I did wrong.
…
continue reading
Asus turns heads with $500K RTX 5090 made with 11 pounds of real gold.
…
continue reading
This fast USB-C wall charger with retractable cable is so cheap right now.
…
continue reading
Julys Windows 10 update borked the emoji panel for some users.
…
continue reading
This SSD will literally self-destruct in 10 seconds.
…
continue reading
OpenAI plans to launch its own browser with built-in ChatGPT soon.
…
continue reading
Nvidia is nearly doubling the FPS of RTX 40 graphics cards for free.
…
continue reading
OWC USB-C Travel Dock review: Compact professionalism on the go.
…
continue reading
I'll discuss what you should do in the wake of the latest data breach.
…
continue reading
This RTX 5060 laptop with Ryzen 9 CPU is insane for just $1,250.
…
continue reading
I upgraded my desk with a power-charging grommet.
…
continue reading

1
Tech Bytes: Build a Reliable DC Network With Nokia Validated Designs (Sponsored)
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Today on the Tech Bytes podcast we explore NVDs, or Nokia Validated Designs, for enterprise data center networks. NVDs are developed to address a broad set of customer requirements and undergo extensive testing of hardware, software, and traffic. We talk with sponsor Nokia about its validation process, customer benefits, NVD use cases, technical de…
…
continue reading
How I convinced a Windows fan to buy a Chromebook.
…
continue reading
Dell Pro 27 Plus review: Nice 4K monitor, but the USB-C hub steals the show.
…
continue reading
Your next PC upgrade: Windows 11 Pro and Microsoft Office for less than $50.
…
continue reading

1
The Human Element Still Matters in a Quantum AI World
50:26
50:26
Play later
Play later
Lists
Like
Liked
50:26Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer (#)
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspi…
…
continue reading

1
3346: How Nexthink Is Rethinking IT Support with Proactive, AI-Driven DEX
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17IT support is changing fast, and the old service desk model is starting to feel like a relic from another era. In this episode, I spoke with Samuele Gantner, Chief Product Officer at Nexthink, about what comes next and what companies need to do now to prepare for it. With Nexthink sitting at the forefront of Digital Employee Experience (DEX) techno…
…
continue reading

1
Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.By Tim Callan and Jason Soroko
…
continue reading
No Bill this episode, but we have a great time none the less.By Bill, Leo, Majid, Eric
…
continue reading

1
Ep. 10 - The Data Beneath the Breach: Analyzing Francis Odum’s Latest Report
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36In Episode 10, we take an in-depth look at the latest report from cybersecurity researcher Francis Odum, uncovering the key insights behind the numbers. We discuss: How third-party and credential-based risks are evolving What the report reveals about attacker tactics and system intrusion trends The growing risk surface of browsers and unmanaged end…
…
continue reading
A Chromebook for $75?
…
continue reading
Think Windows 11 will be a nightmare?
…
continue reading

1
3345: Veeva Systems and the Future of Agentic AI in Pharma
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51AI is racing ahead, but for industries like life sciences, the stakes are higher and the rules more complex. In this episode, recorded just before the July heatwave hit its peak, I spoke with Chris Moore, President of Europe at Veeva Systems, from his impressively climate-controlled garden office. We covered everything from the trajectory of agenti…
…
continue reading

1
Searching for a Technical Support Support Phone Number? Avoid This Huge Trap
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49I'll explain why searching for a tech-support phone number is one of the most dangerous steps you can take when you're looking for help.
…
continue reading
$75 Chromebooks are a thing during PCWorlds version of Prime Day.
…
continue reading
This QuickBooks lifetime deal is quickly going viral at 71% off.
…
continue reading

1
3344: Reimagining Cyber Infrastructure Without Compromising User Experience
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10What does modern cybersecurity look like when you're leading a federally regulated financial institution serving Canadians from coast to coast? In this episode, recorded at Cisco Live last month, I sat down with Shawn Spurko, VP of Information and Cybersecurity at Innovation Federal Credit Union. Based in Swift Current, Saskatchewan, but now operat…
…
continue reading
Intel spins off RealSense as a new depth-camera company.
…
continue reading
A new Windows feature could allow your PC to fix itself.
…
continue reading