Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
DevSecOps Podcasts
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Where Automation Meets Security
…
continue reading
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Step into the DevOps Sauna with Darren Richardson and Pinja Kujala as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
…
continue reading
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading
1
Secure Your Cloud with Code: Building Automated AWS Infrastructure Using DevSecOps
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27Secure Your Cloud with Code: Building Automated AWS Infrastructure Using DevSecOps https://knowledge.businesscompassllc.com/secure-your-cloud-with-code-building-automated-aws-infrastructure-using-devsecops/ Managing AWS infrastructure manually leaves your cloud environment vulnerable to security gaps and human errors. AWS DevSecOps changes this by …
…
continue reading
1
#85 - Is It Time for OpenTofu? Our HashiConf Takeaways
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46We break down 10 years of HashiConf and this year's Terraform-heavy news. What do Terraform Actions with Ansible, Stacks GA, and HCP-only features mean for day two work? Is open source getting left behind, and is OpenTofu worth a look? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our listeners. D…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 133
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11Chris Steffen and Ken Buckler from EMA discuss trends in network security.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Coffee, cookies, and platforms: How to make developers love your platform
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Send us a text In this episode of DevOps Sauna, Pinja and Stefan talk about what truly makes a developer platform successful—and why forcing adoption never works. They explore the “coffee and cookie principle,” the importance of trust between developers and platform teams, and how to create platforms people actually want to use. Topics include buil…
…
continue reading
1
ECS, EC2, and Auto Scaling Explained: The Core of Scalable Cloud Architecture
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58ECS, EC2, and Auto Scaling Explained: The Core of Scalable Cloud Architecture https://knowledge.businesscompassllc.com/ecs-ec2-and-auto-scaling-explained-the-core-of-scalable-cloud-architecture/ Building modern applications that can handle traffic spikes and grow with your business isn’t just nice to have—it’s essential. AWS ECS, Amazon EC2, and Au…
…
continue reading
1
Full Deployment Walkthrough: Unsplash MCP Server with SSE Integration on Cloud Foundry
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11Full Deployment Walkthrough: Unsplash MCP Server with SSE Integration on Cloud Foundry https://knowledge.businesscompassllc.com/full-deployment-walkthrough-unsplash-mcp-server-with-sse-integration-on-cloud-foundry/ This comprehensive Cloud Foundry deployment walkthrough shows you how to deploy an Unsplash MCP Server with server-sent events integrat…
…
continue reading
1
Smarter Kubernetes Deployments: Moving Beyond Helm Charts
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39Smarter Kubernetes Deployments: Moving Beyond Helm Charts https://knowledge.businesscompassllc.com/smarter-kubernetes-deployments-moving-beyond-helm-charts/ Helm charts have become the go-to solution for Kubernetes deployments, but many DevOps teams are hitting walls with complex applications and modern deployment needs. If you’re a DevOps engineer…
…
continue reading
1
Automate Monitoring on AWS: Create CloudWatch Alarms with SNS Notifications
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Automate Monitoring on AWS: Create CloudWatch Alarms with SNS Notifications https://knowledge.businesscompassllc.com/automate-monitoring-on-aws-create-cloudwatch-alarms-with-sns-notifications/ AWS infrastructure moves fast, and manual monitoring can’t keep up. This podcast shows DevOps engineers, cloud architects, and system administrators how to a…
…
continue reading
1
Strategic Cloud Migration: Avoiding Pitfalls and Building a Future-Proof Strategy
17:23
17:23
Play later
Play later
Lists
Like
Liked
17:23Strategic Cloud Migration: Avoiding Pitfalls and Building a Future-Proof Strategy https://knowledge.businesscompassllc.com/strategic-cloud-migration-avoiding-pitfalls-and-building-a-future-proof-strategy/ Moving your business to the cloud isn’t just about following the latest tech trend—it’s about building a strategic cloud migration that actually …
…
continue reading
1
Simplify Authentication in Your App: AWS Cognito Deep Dive for Developers
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Simplify Authentication in Your App: AWS Cognito Deep Dive for Developers https://knowledge.businesscompassllc.com/simplify-authentication-in-your-app-aws-cognito-deep-dive-for-developers/ User authentication can make or break your app’s success, but building it from scratch eats up valuable development time and introduces security risks. AWS Cogni…
…
continue reading
1
Serverless DevOps: Automating Resource Lifecycle Management with AWS Lambda
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Serverless DevOps: Automating Resource Lifecycle Management with AWS Lambda https://knowledge.businesscompassllc.com/serverless-devops-automating-resource-lifecycle-management-with-aws-lambda/ Managing cloud resources manually is a productivity killer, especially when you’re dealing with dozens of AWS services that need constant attention. Serverle…
…
continue reading
1
Deploy Spring Boot on AWS Automatically with a CI/CD Pipeline (CodePipeline + ECS)
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54Deploy Spring Boot on AWS Automatically with a CI/CD Pipeline (CodePipeline + ECS) https://knowledge.businesscompassllc.com/deploy-spring-boot-on-aws-automatically-with-a-ci-cd-pipeline-codepipeline-ecs/ Deploying Spring Boot applications manually to AWS gets old fast. Every code change means repeating the same tedious steps, and human errors creep…
…
continue reading
1
Beyond Glue: Build a Lightweight CSV ETL with AWS Lambda and Step Functions
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33Beyond Glue: Build a Lightweight CSV ETL with AWS Lambda and Step Functions https://knowledge.businesscompassllc.com/beyond-glue-build-a-lightweight-csv-etl-with-aws-lambda-and-step-functions/ Traditional ETL platforms like Glue often feel like using a sledgehammer to crack a nut when you’re just processing CSV files. If you’re a data engineer, clo…
…
continue reading
1
CRSP07: State of AI 2025 pt.2 - For the love of data with Indhira Mani, Intact Insurance
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33In this second episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week, Dave, Esmee, and …
…
continue reading
1
Episode 160: Championing SME Security with the CIS Controls
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55In Episode 160 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Alan Watkins, CIS Controls Ambassador, to explore how the CIS Critical Security Controls® (CIS Controls®) empower small and medium-sized enterprises (SMEs) to build practical, scalable cybersecurity programs. Alan shares his journey from law enforcement to IT …
…
continue reading
1
Simplify AWS CLI MFA Authentication with Interactive Script Automation
16:10
16:10
Play later
Play later
Lists
Like
Liked
16:10Simplify AWS CLI MFA Authentication with Interactive Script Automation https://knowledge.businesscompassllc.com/simplify-aws-cli-mfa-authentication-with-interactive-script-automation/ Managing AWS CLI MFA authentication can turn simple tasks into repetitive, time-consuming workflows that slow down your development process. Every AWS CLI command req…
…
continue reading
1
AWS Backup Automation Explained: Simplifying Data Protection for Cloud Workloads
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26AWS Backup Automation Explained: Simplifying Data Protection for Cloud Workloads https://knowledge.businesscompassllc.com/aws-backup-automation-explained-simplifying-data-protection-for-cloud-workloads/ Managing backups for your cloud infrastructure doesn’t have to be a daily headache. AWS backup automation transforms how organizations protect thei…
…
continue reading
1
Serverless vs IaC: AWS Lambda and CDK Compared for Cloud Engineers
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56Serverless vs IaC: AWS Lambda and CDK Compared for Cloud Engineers https://knowledge.businesscompassllc.com/serverless-vs-iac-aws-lambda-and-cdk-compared-for-cloud-engineers/ Cloud engineers face a critical decision when building AWS applications: choosing between serverless computing with AWS Lambda and infrastructure as code approaches like AWS C…
…
continue reading
1
Simplify Your Monorepo Workflow: The Ultimate Guide to GitHub Actions CI/CD
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Simplify Your Monorepo Workflow: The Ultimate Guide to GitHub Actions CI/CD https://knowledge.businesscompassllc.com/simplify-your-monorepo-workflow-the-ultimate-guide-to-github-actions-ci-cd/ Managing multiple projects in a single repository can quickly turn into a nightmare without the right CI/CD setup. Monorepo GitHub Actions offer powerful sol…
…
continue reading
1
Data Architecture for Generative AI | RAG and Cloud-Native Design Patterns
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46Data Architecture for Generative AI | RAG and Cloud-Native Design Patterns https://knowledge.businesscompassllc.com/data-architecture-for-generative-ai-rag-and-cloud-native-design-patterns/ Building effective data architecture for AI systems requires more than just throwing data at large language models and hoping for the best. Retrieval augmented …
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
How to Configure IRSA on AWS EKS | IAM Roles for Pods Setup Guide
17:36
17:36
Play later
Play later
Lists
Like
Liked
17:36How to Configure IRSA on AWS EKS | IAM Roles for Pods Setup Guide https://knowledge.businesscompassllc.com/how-to-configure-irsa-on-aws-eks-iam-roles-for-pods-setup-guide/ Managing AWS permissions for your Kubernetes pods just got easier with IAM Roles for Service Accounts (IRSA). This podcast walks you through the complete AWS EKS IRSA setup proce…
…
continue reading
1
Pipedrive Database Architecture | Engineering Scalability and Reliability
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Pipedrive Database Architecture | Engineering Scalability and Reliability https://knowledge.businesscompassllc.com/pipedrive-database-architecture-engineering-scalability-and-reliability/ Pipedrive handles millions of sales interactions daily while maintaining lightning-fast performance and zero downtime. The secret lies in their sophisticated data…
…
continue reading
1
Automating Cloud Security: Zero-Touch Threat Remediation Using AWS Services
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Automating Cloud Security: Zero-Touch Threat Remediation Using AWS Services https://knowledge.businesscompassllc.com/automating-cloud-security-zero-touch-threat-remediation-using-aws-services/ Cloud security teams spend countless hours manually responding to threats, often missing critical incidents during off-hours or vacation periods. Automating …
…
continue reading
1
Scaling KYC in the Cloud: How We Built a Secure Identity Verification System on AWS
18:54
18:54
Play later
Play later
Lists
Like
Liked
18:54Scaling KYC in the Cloud: How We Built a Secure Identity Verification System on AWS https://knowledge.businesscompassllc.com/scaling-kyc-in-the-cloud-how-we-built-a-secure-identity-verification-system-on-aws/ Building a robust KYC system that can handle thousands of identity verifications daily while maintaining strict security standards is no easy…
…
continue reading
1
Code Visualization Made Easy: Top Tools to Create Beautiful Diagrams Automatically
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55Code Visualization Made Easy: Top Tools to Create Beautiful Diagrams Automatically https://knowledge.businesscompassllc.com/code-visualization-made-easy-top-tools-to-create-beautiful-diagrams-automatically/ Converting complex codebases into clear, visual diagrams no longer requires hours of manual work. Modern code visualization tools can automatic…
…
continue reading
1
Secure QuickSight Access: Automate IP Restrictions Using AWS Lambda
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13Secure QuickSight Access: Automate IP Restrictions Using AWS Lambda https://knowledge.businesscompassllc.com/secure-quicksight-access-automate-ip-restrictions-using-aws-lambda/ Managing QuickSight IP restrictions manually becomes a nightmare when your team grows or remote workers change locations frequently. This podcast shows data engineers, DevOp…
…
continue reading
1
Unleashing Scalable Generative AI with Amazon Bedrock on AWS
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Unleashing Scalable Generative AI with Amazon Bedrock on AWS https://knowledge.businesscompassllc.com/unleashing-scalable-generative-ai-with-amazon-bedrock-on-aws/ Amazon Bedrock transforms how businesses deploy generative AI AWS solutions by removing the complexity of managing infrastructure and foundation models. This podcast targets developers, …
…
continue reading
1
Debugging AWS the Hard Way: Tracking Down a Missing Host Header Disaster
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57Debugging AWS the Hard Way: Tracking Down a Missing Host Header Disaster https://knowledge.businesscompassllc.com/debugging-aws-the-hard-way-tracking-down-a-missing-host-header-disaster/ Your AWS application is throwing errors, users can’t access your site, and the logs show cryptic messages about missing host headers. Sound familiar? This AWS debu…
…
continue reading
1
Python boto3 S3 Upload | Direct In-Memory Logging Without stdout
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Python boto3 S3 Upload | Direct In-Memory Logging Without stdout https://knowledge.businesscompassllc.com/python-boto3-s3-upload-direct-in-memory-logging-without-stdout/ Need to upload log data directly from Python memory to S3 without creating temporary files or cluttering stdout? Many developers struggle with efficient logging workflows that bypa…
…
continue reading
1
Transforming String Data to JSON in AWS Step Functions Using Pass and Lambda States
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Transforming String Data to JSON in AWS Step Functions Using Pass and Lambda States https://knowledge.businesscompassllc.com/transforming-string-data-to-json-in-aws-step-functions-using-pass-and-lambda-states/ Working with string data in AWS Step Functions often requires converting it to JSON format for downstream processing. This podcast helps dev…
…
continue reading
1
What Could Possibly Go Wrong? Safety Analysis for AI Systems
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 132
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Introduction to AWS Cloud9: Build, Code, and Collaborate in the Cloud
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59Introduction to AWS Cloud9: Build, Code, and Collaborate in the Cloud https://knowledge.businesscompassllc.com/introduction-to-aws-cloud9-build-code-and-collaborate-in-the-cloud/ AWS Cloud9 transforms how developers build applications by bringing your entire development environment to the cloud. This cloud IDE lets you write, debug, and deploy code…
…
continue reading
1
Infrastructure Automation with Terraform: Jenkins Deployment on AWS
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09Infrastructure Automation with Terraform: Jenkins Deployment on AWS https://knowledge.businesscompassllc.com/infrastructure-automation-with-terraform-jenkins-deployment-on-aws/ DevOps engineers, cloud architects, and development teams constantly need reliable ways to deploy and manage Jenkins servers on AWS without the manual headaches. Infrastruct…
…
continue reading
1
Automating Infrastructure Deployment with Terraform and Jenkins CI/CD
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Automating Infrastructure Deployment with Terraform and Jenkins CI/CD https://knowledge.businesscompassllc.com/automating-infrastructure-deployment-with-terraform-and-jenkins-ci-cd/ Managing cloud infrastructure manually is time-consuming and error-prone. Automating Infrastructure Deployment with Terraform and Jenkins CI/CD transforms how DevOps te…
…
continue reading
1
Implementing Cross-Region Backup and Restore for AWS EKS Using Kasten K10
17:18
17:18
Play later
Play later
Lists
Like
Liked
17:18Implementing Cross-Region Backup and Restore for AWS EKS Using Kasten K10 https://knowledge.businesscompassllc.com/implementing-cross-region-backup-and-restore-for-aws-eks-using-kasten-k10/ Protecting your AWS EKS workloads against regional failures requires a solid cross-region backup strategy. AWS EKS cross-region backup using Kasten K10 gives yo…
…
continue reading
1
How to Modernize Your Data Warehouse: Automating Teradata Migration to Redshift
16:46
16:46
Play later
Play later
Lists
Like
Liked
16:46How to Modernize Your Data Warehouse: Automating Teradata Migration to Redshift https://knowledge.businesscompassllc.com/how-to-modernize-your-data-warehouse-automating-teradata-migration-to-redshift/ Moving your data warehouse from Teradata to AWS Redshift doesn’t have to mean months of manual work and sleepless nights. Automated database migratio…
…
continue reading
1
Containerizing and Deploying a Go Application on AWS ECS: A Developer’s Guide
20:01
20:01
Play later
Play later
Lists
Like
Liked
20:01Containerizing and Deploying a Go Application on AWS ECS: A Developer’s Guide https://knowledge.businesscompassllc.com/containerizing-and-deploying-a-go-application-on-aws-ecs-a-developers-guide/ Deploying Go applications to the cloud doesn’t have to be overwhelming. This podcast walks you through containerizing Go applications and deploying them o…
…
continue reading
1
Monitoring AWS Login Failures: Best Practices for Account Security
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00Monitoring AWS Login Failures: Best Practices for Account Security https://knowledge.businesscompassllc.com/monitoring-aws-login-failures-best-practices-for-account-security/ AWS login failures pose serious threats to your cloud infrastructure, potentially signaling brute force attacks, compromised credentials, or unauthorized access attempts. This…
…
continue reading
1
Seamless AWS Deployments: Terraform Infrastructure Automation via GitHub Actions
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01Seamless AWS Deployments: Terraform Infrastructure Automation via GitHub Actions https://knowledge.businesscompassllc.com/seamless-aws-deployments-terraform-infrastructure-automation-via-github-actions/ Modern cloud deployments don’t have to be a manual nightmare of clicking through AWS consoles and praying nothing breaks. AWS Terraform deployment …
…
continue reading
1
MySQL and Aurora MySQL: Debugging, Tuning, and Performance Best Practices
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15MySQL and Aurora MySQL: Debugging, Tuning, and Performance Best Practices https://knowledge.businesscompassllc.com/mysql-and-aurora-mysql-debugging-tuning-and-performance-best-practices/ MySQL databases power millions of applications worldwide, but even experienced developers and database administrators struggle with performance issues that can bri…
…
continue reading
1
Exploring the AWS Ecosystem: Key Managed Services Developers Love
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29Exploring the AWS Ecosystem: Key Managed Services Developers Love https://knowledge.businesscompassllc.com/exploring-the-aws-ecosystem-key-managed-services-developers-love/ Amazon Web Services for developers offers a massive toolkit that can feel overwhelming at first glance. This podcast breaks down the AWS ecosystem overview into digestible piece…
…
continue reading
1
CR114: Why human experience matters more than ever with Kevin Magee, All human
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at Al…
…
continue reading
1
Episode 159: The Scariest Malware of 2025
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48In episode 159 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf, Sr. Cyber Threat Intelligence Analyst at the Center for Internet Security® (CIS®), and Randy Rose, Vice President of Security Operations & Intelligence at CIS. Together, they dive into the scariest malware of 2025 in this special Halloween edition. The conver…
…
continue reading
1
Accelerating AI Outcomes with Great Data: Strategies for Data-Driven Intelligence
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27Accelerating AI Outcomes with Great Data: Strategies for Data-Driven Intelligence https://knowledge.businesscompassllc.com/accelerating-ai-outcomes-with-great-data-strategies-for-data-driven-intelligence/ Your AI initiatives are only as strong as the data feeding them. Poor data quality kills even the most sophisticated machine learning models, whi…
…
continue reading
1
Seamless Load Balancing in AWS: How Auto Scaling Groups Attach EC2 Instances to Target Groups
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01Seamless Load Balancing in AWS: How Auto Scaling Groups Attach EC2 Instances to Target Groups https://knowledge.businesscompassllc.com/seamless-load-balancing-in-aws-how-auto-scaling-groups-attach-ec2-instances-to-target-groups/ Managing AWS load balancing can feel overwhelming when you’re trying to connect Auto Scaling Groups with Target Groups fo…
…
continue reading
1
Cloud Governance Done Right: Building Trust, Control, and Compliance in the Cloud
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55Cloud Governance Done Right: Building Trust, Control, and Compliance in the Cloud https://knowledge.businesscompassllc.com/cloud-governance-done-right-building-trust-control-and-compliance-in-the-cloud/ Cloud governance has become the backbone of successful digital transformation, yet many organizations struggle with balancing security, compliance,…
…
continue reading