Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Code Security Podcasts
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
…
continue reading
A podcast for new programmers and developers. Join CodeNoobs co-creators Danny, Randall, and Russell weekly to explore topics that anyone interested in programming and learning to code will find valuable.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
15 minutes news, tips, and tricks on the Go programming language.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Welcome to For a Cloudy Day, the podcast where we talk about the cloud technology industry with insights from experts. Hosted by Co-native, the home of cloud specialists.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
A show about the perils & pitfalls of creative intellectual automation; and why the future of good Internet vibes is for the humans, by the humans.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Learn to Code is a podcast hosted by Chris Castiglione (OneMonth.com) based in Brooklyn, NY. Each week Chris interviews successful business founders, startups and programmers to ask them: How did you learn to code? What tips and tricks do you have for finding meaningful work? Learn more about One Month and the Learn to Code podcast at www.onemonth.com.
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Podcast by Skyscanner
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading

1
Inside Augment Code: Why security starts at line one (with Dirk Meister)
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32What if your first lines of code determined your startup’s ability to scale? Dirk Meister, founding engineer at Augment Code, walks us through the intentional security architecture decisions they made on day one—and why trust isn't something you can bolt on later. Dirk Meister: https://www.linkedin.com/in/meisterdirk/ Augment Code: https://www.augm…
…
continue reading

1
AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal
46:36
46:36
Play later
Play later
Lists
Like
Liked
46:36In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minu…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
EP70: Securing Medical Devices You Might Not Have Thought to Secure
33:30
33:30
Play later
Play later
Lists
Like
Liked
33:30Healthcare organizations are prone to the same weaknesses that any other office or manufacturing site may have. Sonu Shankar, Chief Product Officer at Phosphorus Cybersecurity, explains how the devices you might not suspect might be the ones to bring down your organization if they’re not secured. That includes the printer used to print patient wris…
…
continue reading

1
Vibe Coding: Four Security Nightmares in a Trenchcoat (with Susanna Cox), 2025.07.21
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00After many months of making fun of the term "vibe coding," Emily and Alex tackle the LLMs-as-coders fad head-on, with help from security researcher Susanna Cox. From one person's screed that proclaims everyone not on the vibe-coding bandwagon to be crazy, to the grandiose claim that LLMs could be the "opposable thumb" of the entire world of computi…
…
continue reading

1
Episode 99: Securing Data for Copilot (w/ Jen Kemmerer)
23:34
23:34
Play later
Play later
Lists
Like
Liked
23:34Data security in the age of AI requires more than just basic protections. It's an ongoing, evolving challenge. In this episode, Jen Kemmerer, Senior Cloud Solution Architect specializing in data security, breaks down how organizations can manage sensitive information in the era of AI and Microsoft Purview. From the rise of AI-powered agents to tool…
…
continue reading

1
From Russia with Code: A Malware Analyst's Journey
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27Send us a text Sergey Novikov shares his fascinating journey from early days at Kaspersky Lab through his evolution as a malware analyst and cybersecurity expert, offering unique insights into the changing threat landscape and ethical considerations of security research. • Started at Kaspersky in 2002 when it was a small startup with fewer than 100…
…
continue reading

1
#157 - History of the DUNA, with David Kerr of Cowrie
49:39
49:39
Play later
Play later
Lists
Like
Liked
49:39DUNA — the Decentralized Unincorporated Nonprofit Association — is one of the most important new legal structures for crypto governance. To understand its history, tax implications, and jurisdictional trade-offs, I sat down with David Kerr, founder of Cowrie, a crypto-native advisory firm specializing in U.S. tax compliance and entity structuring. …
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading
The Absolute AppSec duo returns with an in-depth episode talking about true and false positives, where context matters and business impact must be taken into account in order to avoid rabbit holes. This discussion spurred by a recent article from signalblur of magonia.io discussing alerts in a security operations center. In short, only considering …
…
continue reading

1
Episode 103: Prompt Engineering (w/ April Dunnam)
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10Prompt engineering can feel like a secret language. April Dunnam returns to explain how Prompt Coach helps everyone speak it more clearly. From refining prompts to checking compliance and teaching best practices, Prompt Coach provides users with a smoother start to using Copilot and agents. We also cover when to roll it out, how it supports adoptio…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading

1
Copyright, class action and cybersecurity... Shaping our digital future with Lizzie O’Shea
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by lawyer and digital rights activist, Lizzie O’Shea. This episode explores Australia’s technology debates from a security and legal lens—addressing copyright, creativity, AI, and the legal structures, including class action, that shape society and security.…
…
continue reading

1
EP242 The AI SOC: Is This The Automation We've Been Waiting For?
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01Guest: Augusto Barros, Principal Product Manager, Prophet Security, ex-Gartner analyst Topics: What is your definition of “AI SOC”? What will AI change in a SOC? What will the post-AI SOC look like? What are the primary mechanisms by which AI SOC tools reduce attacker dwell time, and what challenges do they face in maintaining signal fidelity? Why …
…
continue reading

1
Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC
1:53:57
1:53:57
Play later
Play later
Lists
Like
Liked
1:53:57Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC Episode 16 of the Distilled Security Podcast is here! In this episode, Justin, Joe, and Rick christen the new studio and dive into some of the trickiest challenges in measuring, reporting, and governing security programs. From maturity models to board reporting, the conversati…
…
continue reading
Security Noise is back for its 8th season! The weather is getting cooler but we are still chatting about our experiences in Las Vegas for "Hacker Summer Camp." In this episode, Geoff and Skyler speak with Senior Security Consultants David Boyd and Whitney Phillips about their experiences at DEFCON 33 and Black Hat 2025. We discuss the evolution of …
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
#156 - DOJ enforcement and developer liability, with Amanda Tuminelli of the DeFi Education Fund
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06DOJ Criminal Division Chief Matthew Galeotti recently stated: “Merely writing code, without ill intent, is not a crime.” He emphasized that developers of neutral tools should not be held liable for someone else’s misuse. Joining me to unpack what this means for developers is Amanda Tuminelli, Executive Director of the DeFi Education Fund. We discus…
…
continue reading
Let's talk with a friend of the pod, John Arundel. We talk about state of thing a little regarding Go's maturity, a bit of AI, I personally am a bit fatigue of the noise and "agent". The podcast is returning slowly. John is releasing an updated version to his For the love of Go book, John produce excellent learning and training resources. Links: Th…
…
continue reading

1
The Future of AI: Security, Ethics, and Human Augmentation
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31Send us a text Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand. • AI development is acce…
…
continue reading
The internet's still broken, folks, and apparently, AI's here to make it more awkward. Intel caught a break from Uncle Sam's CHIPS Act, cool for them, not so much for those 'flashing warning signs' in the job market. Meta's been letting celebrity chatbots run wild (and creepy), Midjourney's getting sued by Warner Bros. for stealing IP (who'da thoug…
…
continue reading

1
UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more...
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-496 Personal AI Video I'm so excited about Subscribe to the newsletter at: https://danielmiessl…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Does AI Change What it Means to be a Dev?
46:29
46:29
Play later
Play later
Lists
Like
Liked
46:29AI is an amazing tool, one that is making it possible to code with little or no programming knowledge. How do you get the best results when using AI to code? Is AI changing what it means to be a developer? In this episode, Danny, Randall, and Russell discuss how AI is changing what it means to be a dev. The CodeNoobs podcast allows anyone to listen…
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
Play later
Play later
Lists
Like
Liked
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading

1
#155 - Anchorage Digital's Kevin Wysocki on the Future of U.S. Crypto Policy
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Sponsor: This episode of the Law of Code podcast is brought to you by Day One Law, a boutique corporate law firm for founders and funds in crypto. Learn more at dayonelaw.com. The regulatory winds in Washington have shifted dramatically, and Anchorage Digital has been in the middle of it all. Kevin Wysocki, Head of Policy at Anchorage Digital, jo…
…
continue reading

1
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17In this episode of the Security Repo Podcast, Narayan Ram Narayanan shares his journey into cybersecurity, sparked by a personal data breach and fueled by a passion for privacy and secure development. He discusses his upcoming talk on threat modeling OpenSSL applications using STRIDE and other threat models, and highlights the value of volunteering…
…
continue reading
This episode is a replay from the CodeNoobs library. Enjoy! Are you learning web development, but you feel stuck? Are you creating projects that aren’t getting noticed? How can you take your code to the next level? In this episode, Danny, Randall, and Russell discuss how to take your code to the next level. The CodeNoobs podcast allows anyone to li…
…
continue reading

1
Ariel Shin - Beyond Breaking: From Pen Tester to Problem Solver
1:00:08
1:00:08
Play later
Play later
Lists
Like
Liked
1:00:08Ariel Shin is a Security Engineer at Stripe, specializing in threat modeling and proactively identifying and mitigating potential security risks. She is passionate about scaling application security while reducing engineering burdens and strives to create foundations that seamlessly integrate security practices into the development lifecycle. Ariel…
…
continue reading

51
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT t…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Taming AI agents with observability ft. Bernd Greifeneder
30:15
30:15
Play later
Play later
Lists
Like
Liked
30:15As modern IT systems grow too complex for humans to effectively manage, there's growing interest in turning to autonomous AI agents for operations. While powerful, these agents introduce new challenges around trust, reliability, and control. To explore how to solve for this, Red Hat CTO Chris Wright speaks with Bernd Greifeneder, Founder and CTO of…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading
Ken and Seth kickoff a podcast by reviewing current state of the OWASP Top 10 project, given recent requests and interactions on Absolute AppSec slack from various contributors. This is followed by an in-depth breakdown of the recent NX npm package compromise. This breakdown shows that even though AI is weaponized to exfiltrate data, the main explo…
…
continue reading

1
Episode 102: Agent Inventory (w/ Mik Ferland)
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Inventory matters. This week, we bring on Mik Ferland to take a look under the hood of the new Power Platform Admin Center. Mik explains why inventory comes first, how it works tenant-wide, and what is next for apps and flows. You'll also learn when to use Manage, Monitoring, or Licensing, and what you can expect at PPCC. Explore the public GitHub …
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading

1
EP241 From Black Box to Building Blocks: More Modern Detection Engineering Lessons from Google
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Guest: Rick Correa,Uber TL Google SecOps, Google Cloud Topics: On the 3rd anniversary of Curated Detections, you've grown from 70 rules to over 4700. Can you walk us through that journey? What were some of the key inflection points and what have been the biggest lessons learned in scaling a detection portfolio so massively? Historically the SecOps …
…
continue reading