Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Concise Software Podcasts
Need quick, actionable insights to sharpen your UX leadership and strategy? Short on time but eager to grow your influence? UX strategist Paul Boag delivers concise, practical episodes designed to enhance your strategic thinking, leadership skills, and impact in user experience. Each bite-sized podcast is just 6-10 minutes—perfect for busy UX leaders and advocates on the go.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Concise Conversation is a podcast where Bob Swift is talking with his guests about new technologies and their impact on the world we live in and for the future. Stay with us for a behind-the-scenes look at the world of new technology, explore exciting interviews with new-tech leaders, and subscribe to never miss new episodes!
…
continue reading
Digital Dialogs - Compact conversations on the future of tech is an innovative podcast that aims to explore the cutting-edge frontiers of technology, with a special focus on emotional intelligence and human-computer interaction. Through a series of concise dialogues and expert insights from professionals, this podcast is a journey into how technology is not only advancing by leaps and bounds but also becoming increasingly sensitive and responsive to our emotions, thereby improving the qualit ...
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
The Startup CEO Show hosted by coach and advisor Mark MacLeod, brings you veteran CEOs each week who have collectively had had billion dollar valuations, 9 figure exits, and millions in revenue each week. Subscribe to join the leading podcast produced exclusively for the CEOs of high-growth startups and the VCs who back them. This podcast offers concise, yet deep dives into specific themes within each episode, focusing on providing actionable insights for busy leaders. The format includes in ...
…
continue reading
✨ Welcome to AI Insight Central Hub (AICHUB) ✨ Your ultimate destination for staying up-to-date with the world of artificial intelligence. Whether you're looking for in-depth analyses, quick updates, or expert reviews on the latest AI tools and gadgets, we’ve got you covered! 🔍 What to Expect: RoboRoundup: Dive deep every weekend into the biggest breakthroughs and most impactful AI trends. Each episode features expert insights, interviews, and thoughtful discussions designed to help you unde ...
…
continue reading
The ERP & Data Management News Briefing delivers concise, actionable updates on the technologies, strategies, and players shaping enterprise resource planning and data management. Each episode distills the latest developments in software, cloud platforms, analytics, and governance—helping IT leaders, business analysts, and decision-makers stay ahead without wading through endless reports. From new vendor launches to emerging best practices in integration, security, and compliance, you’ll get ...
…
continue reading
Free minds. Free markets. Big stories. That's the Reason Rundown. End the week with concise, thought-provoking stories from the journalists at Reason, the magazine of logic, not legends; coherence, not contradictions. Hosted by Features Editor Peter Suderman, each week he talks to a single Reason journalist about a single big story.
…
continue reading
1
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
…
continue reading
Cyber Daily News December 22, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New Flaw in Somalia’s E-Visa System Exposes Travelers’ Passport Datahttps://thecyberexpress.com/somalia-e-visa-security-flaw-data-exposure/- Infy Returns: Iran-linked hacking group show…
…
continue reading
1
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
…
continue reading
Cyber Daily News December 21, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Massive Android botnet Kimwolf infects millions, strikes with DDoShttps://securityaffairs.com/185921/malware/massive-android-botnet-kimwolf-infects-millions-strikes-with-ddos.html- ATM …
…
continue reading
1
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
…
continue reading
1
Singularity Speed: Navigating the Great AI Frontier Transformation
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08Welcome to a deep dive into the most intense 25-day sequence in technology history, where the AI model race accelerated to "singularity speed" between November and December 2025. This podcast explores the unprecedented "chronological cascade" that saw xAI, Google, Anthropic, and OpenAI each release their most powerful models to date in rapid-fire s…
…
continue reading
Cyber Daily News December 20, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Russia was behind a destructive cyber attack on a water utility in 2024, Denmark sayshttps://securityaffairs.com/185885/hacking/russia-was-behind-a-destructive-cyber-attack-on-a-water-u…
…
continue reading
1
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
Cyber Daily News December 19, 2025Stories mentioned in today's briefing:- China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Managerhttps://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-cisco-secure-email-gateway-and-secure-email-and-web-manager.html- Hewlett Packard Enterprise (HPE) f…
…
continue reading
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
…
continue reading
Cyber Daily News December 18, 2025Stories mentioned in today's briefing:- FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Launderinghttps://thecyberexpress.com/e-note-crypto-exchange-seized/- Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerabilityhttps://thecyberexpress.com/cisco-cve-2025-20393-secure-email-cyberatt…
…
continue reading
1
Digital Dialogs (Episode 4 | S6) - From Tools to Teammates: Enterprise AI Agents
21:57
21:57
Play later
Play later
Lists
Like
Liked
21:57Exploring how AI agents are evolving from simple productivity tools to collaborative digital teammates in enterprise environments, fundamentally reshaping workforce dynamics and creating new organizational models where humans become "agent bosses."
…
continue reading
1
Loose Leaf for Systems Analysis and Design
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
…
continue reading
1
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
…
continue reading
1
Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's pix, Aaran Leyland. - SWN #538
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's Pix, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-538
…
continue reading
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
…
continue reading
1
Why Creativity + Data Is the New CEO Superpower
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55Join a community of ambitious CEOs who are looking to build market-leading companies without sacrificing health and happiness. Check out: https://limitless.ceo What happens when your “software startup” accidentally turns into an agency, and that mistake becomes the fuel for your next breakout company? In this episode, I sit down with Reza, founder …
…
continue reading
1
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
15:00
15:00
Play later
Play later
Lists
Like
Liked
15:00An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
…
continue reading
1
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
…
continue reading
1
The AI Paradox: Exuberance & Reality (or The $2.1 Trillion Bet)
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17This is the deep dive into the single biggest paradox in the global economy right now: the tension between AI exuberance and the reality of stock market downside. We analyze the colossal scale of the structural shift, driven by a truly historic $2.1 trillion in capital investment committed by mega cap tech firms, the "AI scalers" like Amazon, Alpha…
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-537
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading
Well, here we are. The UX Strategy and Leadership course has wrapped up, and I am officially putting down my digital pen until January 8th. I know. Try not to weep. 😭 Before I disappear into a haze of mince pies and questionable Christmas jumpers, I wanted to take a moment to say thank you. Genuinely. You read what I write, you tolerate my rambling…
…
continue reading
1
Security for Telecommunications Networks (Advances in Information Security Book 40)
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
…
continue reading
1
Enterprise Security Architecture: A Business-Driven Approach
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
1
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
…
continue reading
1
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
…
continue reading
1
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
…
continue reading
1
The Deep Dive: AI Acceleration, Compliance, and the $150 Billion Patent Cliff
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12Welcome to The Deep Dive, your weekly briefing on the critical market shifts occurring in early December 2025. We explore the tense convergence of rapid technological acceleration and high-stakes financial urgency across two key sectors. The AI Race Redefined: The global battle for AI supremacy has pivoted from brute-force scaling toward architectu…
…
continue reading
1
Cracking the Coding Interview: 189 Programming Questions and Solutions
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
…
continue reading
And so we've reached the end of the course on UX leadership and strategy (but not the end of my emails), and I want to leave you with some final thoughts and encouragement for the journey ahead. Being a design leader within an organization is challenging, and you will find yourself coming up against many roadblocks and difficulties along the way. I…
…
continue reading
1
Digital Dialogs (Episode 4 | S5) - Agentic-Powered Software Development
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26Exploring how AI agents are revolutionizing the software development lifecycle, from autonomous code generation and testing to intelligent debugging and deployment, fundamentally transforming how developers work and accelerating software delivery.
…
continue reading
1
Computer Forensics: Incident Response Essentials
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
…
continue reading
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
…
continue reading
1
The Backup That Built a Business: Inside Rewind with Mike Potter
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Join a community of ambitious CEOs who are looking to build market-leading companies without sacrificing health and happiness. Check out: https://limitless.ceo What if the “boring” SaaS backup tool you rarely think about is actually a rocketship, and the CEO behind it refuses to sacrifice his marriage or his health to build it? In this episode, I s…
…
continue reading
1
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
14:29
14:29
Play later
Play later
Lists
Like
Liked
14:29A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
…
continue reading
1
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
…
continue reading
1
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
…
continue reading
1
Dealing with loss, phone loss with Aaran, Doug, and Josh. - SWN #533
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
…
continue reading
1
Certificate of Cloud Auditing Knowledge Study Guide
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
…
continue reading
1
Agentic Shift: Data, Dollars, and the AI Nexus
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38This week, the AI industry stopped being a future technology and became national and corporate infrastructure. We break down the massive shift that marked the end of the "Chatbot Era" and the start of the "Agent Era" between November 22nd and 27th, 2025. The Technological Revolution: Google introduced Gemini 3 as a new "intelligence layer" woven ac…
…
continue reading
Last week I talked about marketing UX within your organization and how you can use internal marketing strategies to build awareness and executive support. This week, I want to dig into a more hands-on approach: getting your stakeholders directly involved in UX activities. If all my talk about guerrilla marketing and PR stunts felt a bit overwhelmin…
…
continue reading
Last week, I talked about building credibility by looking outside your organization for validation. External benchmarking, expert opinions, and industry recognition all help shift internal perception. But validation only works if people understand the actual value you're delivering. That brings us to today's topic: measuring and communicating UX su…
…
continue reading