Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
DevSecOps Podcasts
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Sushi Bytes is an unapologetically AI-generated podcast brought to you by Shinobi, FossIDās vigilant Software Composition Analysis ninja. In each bite-sized episode, Shinobi breaks down the evolving world of software supply chain integrity ā from open-source license compliance and vulnerability disclosure to SBOM standards, IP risks, and AI-generated code implications. With a surge in regulatory scrutiny and AI adoption, the software stack is becoming harder to manage ā and riskier to ignore ...
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Where Automation Meets Security
…
continue reading
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? Iām Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus⦠to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didnāt alignāleaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
A podcast for engineers building and operating modern infrastructure. Powered by Zesty. Hosted by Omer Hamerman and Mark Serdze, The Cron Job explores Kubernetes quirks, cost optimization strategies, scaling, reliability, and the art of keeping things from catching fire in production, all while unpacking the deeper DevOps questions around ownership, automation, and the tradeoffs behind every engineering decision. Tune in for real-world stories, sharp insights, and the occasional infrastructu ...
…
continue reading
Step into the DevOps Sauna with Pinja Kujala and Stefan Daugaard Poulsen as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
…
continue reading
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating whatās now and whatās next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
If you know how attacks work, youāll know exactly where to lookāwhether youāre breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business ā and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
Lessons from Production brings you real-world stories from tech leaders whoāve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts whoāve lived it.
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Courseāyour comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Welcome to The DevOps Toolchain Show ā your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, youāll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the worldās leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors ā Cloud Computing, Digital Transformation, CI/CD & DevOps ā they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading
1
Best AI Security Certification Courses & Earn $280K Salary Premium in 2026
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180Kā280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificatiā¦
…
continue reading
1
#87 - EU Compliance 101: AI Act, DORA, NIS2 explained
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Want a quick map of EU compliance for engineers? How do you classify AI by risk and tell users when AI is used? When do you send a 24-hour heads-up and a one-month report after an incident? Does NIS2 make your board liable and your logs mandatory? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our ā¦
…
continue reading
1
Ep 14 - DevSecOps Without the Buzzwords - What It Really Takes to Build Secure Software
1:09:57
1:09:57
Play later
Play later
Lists
Like
Liked
1:09:57šļø Coffee, Chaos and ProdSec - Ep 14 DevSecOps gets thrown around in cybersecurity more than any other term, but almost no one agrees on what it actually means. So this week, Kurt and Cameron pour fresh mugs and unpack the real practices behind modern Application Security, Product Security, DevSecOps, and Software Supply Chain Security without the ā¦
…
continue reading
1
Episode 16: DevSecOps & Security Integration
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09In this episode, Omer and Mark discuss the importance of integrating security into the DevOps culture, specifically focusing on DevSecOps. They explore the responsibilities of developers in ensuring application security, the significance of understanding the OWASP Top 10 vulnerabilities, and the need for actionable security practices. The conversatā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 138
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59Chris Steffen and Ken Buckler from EMA discuss API security.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CR117 Redesigning industries with AI with Scott Hanselman, Microsoft
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57AI is transforming software developmentāredefining roles, creativity, and community, while challenging developers to embrace ambiguity, orchestrate specialized agents, and stay human through empathy and curiosity. Will AI make developers more creative, or will we forget how the machine really works under the hood? This week Dave, Esmee , Rob sit doā¦
…
continue reading
1
Ep 15 - Part 1 - Get Comfortable Being Vulnerable: The Chaos Behind Every CVE and Every Risk
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58šļø Coffee, Chaos and ProdSec - Ep 15 Vulnerabilities are piling up faster than teams can read the reports, and vulnerability management is buckling under the weight. So this week, Kurt and Cameron grab their mugs and dig into why modern VM feels impossible, why severity scores mislead everyone, and how reachability and exploitability matter far morā¦
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a newā¦
…
continue reading
1
CTRL + ALT + DEPLOY | Ep 06 - How AI Is Redefining DevOps and Quality Engineering
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30AI is transforming DevOps and testing, shifting roles towards quality engineering while emphasizing human involvement. Insights from Yaniv Sayersās experience at OpenText reveal how AI enhances the software delivery lifecycle. Trust in AI remains a challenge, yet many professionals embrace these tools. The future envisions autonomous delivery teamsā¦
…
continue reading
1
Episode 19: What We Learned from the Cloudflare Outage
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06In this episode, Omer and Mark discuss the recent outages affecting major internet services like Cloudflare and AWS, exploring the implications of AI on infrastructure reliability, the centralization of internet services, and the risks associated with automation in DevOps. They also delve into the challenges of DNS management and the future of AI iā¦
…
continue reading
1
The $8 Trillion Question: Open Source, Risk, and Resilience
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10Send us a text Open source powers nearly everything we build todayābut what is it actually worth? Pinja and Stefan discuss Harvardās $8 trillion estimate, how widely open source is used, and why central registries are under pressure. They touch on security risks, supply chain attacks, and what the EU Cyber Resilience Act means for companies using Oā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 137
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CRLIVE58 AWS re:Invent 2025: European Digital Sovereign Futures with Mustafa Isik, AWS + Team reflections on re:Invent 2025
1:13:02
1:13:02
Play later
Play later
Lists
Like
Liked
1:13:02Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
CRLIVE57 AWS re:Invent 2025: Financial Renovation with Scott Mullins, AWS
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
CRLIVE56 AWS re:Invent 2025: Driving Innovation in Automotive and Energy & Utilities with Rob Boetticher and Howard Gefen, AWS
55:04
55:04
Play later
Play later
Lists
Like
Liked
55:04Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
CRLIVE55 AWS re:Invent 2025: re:Accelerating Europe with Tanuja Randery, AWS
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2ā4 years needed ā¦
…
continue reading
1
CRLIVE54 AWS re:Invent 2025: Making it real in Industries with Tim Murnin, AWS
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
CRLIVE53 AWS re:Invent 2025: Driving Cloud and AI success through collaboration with Chandra Pinapala, AWS
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28Live from the iconic Venetian in Las Vegas, weāre rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesnāt alwayā¦
…
continue reading
1
Vulnerabilities In Enterprise AI Workflows With Nicolas Dupont
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34Episode Summary As AI systems become increasingly integrated into enterprise workflows, a new security frontier is emerging. In this episode of The Secure Developer, host Danny Allan speaks with Nicolas Dupont about the often-overlooked vulnerabilities hiding in vector databases and how they can be exploited to expose sensitive data. Show Notes As ā¦
…
continue reading
1
CRAzy Requirements: What the Cyber Resilience Act Means for Your SBOM
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50The EU Cyber Resilience Act (CRA) is reshaping global expectations for software security ā and putting Software Bill of Materials (SBOMs) at the center of compliance. In this episode, Shinobi and Gen break down what the CRA requires, how it compares to U.S. regulations, and what engineering and legal teams must do now to stay ahead. Whether you're ā¦
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2ā¦
…
continue reading
1
Episode 18: How to ensure quality when building a Kubernetes product?
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22In this episode, our host Omer and special guest Tzachi Tzafrir discuss the complexities of testing in Kubernetes, exploring various strategies for effective quality assurance. Tzachi shares insights on balancing fast testing environments with realistic production-like scenarios, the significance of chaos engineering, and the processes involved in ā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 136
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CR116: Unlocking Cloud for critical missions with Danny Polaine, Thales
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45Accelerating cloud adoption to drive innovation across domains like space, identity, and naval systems presents unique challenges. Success depends on aligning organizational culture, governance, financial models, and regulatory frameworks to enable collaboration, scalability, and software-defined capabilities. This week, Dave, Esmee, and Rob speak ā¦
…
continue reading
1
Ep 13 - Untangling Cloud Security - Foundations, Failures, and What Teams Miss
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47šļø Coffee, Chaos & ProdSec ā Episode 13 This week, Cameron and Kurt tackle the questions everyone claims to understand but absolutely argues about in every cloud meeting. What is the cloud really? Why is identity suddenly the perimeter? And how did Kubernetes quietly become everyoneās new production environment? We break down the real concerns behiā¦
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec folā¦
…
continue reading
1
AI Security Certification: The Ultimate Guide to the Certified AI Security Professional (CAISP) course
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). ā¦
…
continue reading
1
Episode 17: DevOps Horror Story of the Week
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53In this episode of The Crown Job, Omer and Mark delve into the spooky side of technology, sharing horror stories from their experiences in the tech industry. They discuss the recent AWS outage and its bizarre effects on smart mattresses, a ghostly incident in a production environment, a certificate authority crisis, and the challenges of managing cā¦
…
continue reading
1
#86 - MCP plugins: your next security blind spot?
1:04:54
1:04:54
Play later
Play later
Lists
Like
Liked
1:04:54Is MCP just another server you need to threat model, patch, and monitor? How do you keep users from over-privileged access, block LLM injection, and stop blind spots? We unpack the VentureBeat article https://venturebeat.com/security/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise with real-world tips. We are always happy ā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 135
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CRLIVE52 Microsoft Ignite 2025: Scaling AI agents responsibly + Ignite 2025 team reflections with Yina Arenas, Microsoft
1:03:57
1:03:57
Play later
Play later
Lists
Like
Liked
1:03:57Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
CRLIVE51 Microsoft Ignite 2025: Undercover Cloud with Alistair Speirs, Microsoft
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
CRLIVE50 Microsoft Ignite 2025: Safe and responsible agentic implementation with Rob Lefferts, Microsoft
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
CRLIVE49 Microsoft Ignite 2025: Innovating at the frontier with John Link, Microsoft
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
CRLIVE48 Microsoft Ignite 2025: From business applications to AI business solutions with Jonathan Hunt, Microsoft
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
Ep 12 - OWASP Top 10:2025 RC1 Breakdown - The Vulnerabilities That Refuse To Die
1:04:57
1:04:57
Play later
Play later
Lists
Like
Liked
1:04:57šļø Coffee, Chaos & ProdSec - Ep 12 The OWASP Top 10:2025 RC1 is here, and it is already causing chaos. So this week, Kurt and Cameron grab their mugs and break down every category with real world stories, honest takes, and a few spicy opinions on why some vulnerabilities just will not go away. From Broken Access Control dominating the charts again,ā¦
…
continue reading
1
CRLIVE47 Microsoft Ignite 2025: The evolution and future of Co-pilot(s) with Rob Cromwell, Microsoft
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovationāempowering organizations to become AI-first. Plus, we'll keep you updā¦
…
continue reading
1
Ep 11 ā Google vs FFmpeg - The Open Source Meltdown
58:19
58:19
Play later
Play later
Lists
Like
Liked
58:19šļø Coffee, Chaos & ProdSec ā Episode 11 This week, Kurt and Cameron break down the showdown between Googleās Big Sleep AI and the FFmpeg maintainers keeping the internetās media backbone running for free. A tiny bug in a 1995 video codec sparked a big debate about responsibility, AI-driven vulnerability hunting, and the growing strain on open sourcā¦
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for hā¦
…
continue reading
1
Ep 10 - From Chaos to Controls - The Story Behind OWASP SPVS
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36šļø Coffee, Chaos & ProdSec ā Ep 10 This week, Cameron and Kurt sit down with the co-founders of the OWASP Secure Pipeline Verification Standard to unpack the real story behind SPVS and why the industry desperately needed a pipeline-focused security standard. From the early days of chaotic DevSecOps practices and scattered controls, to the moment thā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 134
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Developer Velocity vs. Legal Risk: The Latest Software Engineering Tug-of-War
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41Developer experience and productivity are critical, but so is copyright and license compliance. In this episode of Sushi Bytes, Shinobi and Gen talk about the tug-of-war between productivity-centric engineering teams and risk-averse legal teams. Who will win? Tune in to hear how modern SCA tooling can align speed with safety, automate away this friā¦
…
continue reading
1
Unmasked: What to Look for in Picking the Right SCA Tool
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Not every Software Composition Analysis (SCA) tool reveals whatās really haunting your code. In this Halloween-themed episode of Sushi Bytes, Shinobi and Gen explore why comparing SCA tools is trickier than it seemsāand what engineering and compliance teams should look for under the mask. From snippet detection and modified code to license clarity,ā¦
…
continue reading
1
Snippet Detection: Small Code, Big Compliance Risk
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07In this episode of Sushi Bytes, Shinobi and Gen unpack the high-stakes reality of code snippet: when small fragments of open source code make their way into proprietary applications and go undetected by traditional SCA tools. From copy-pasted Stack Overflow answers to AI-generated code functions, these sometimes-small code segments can carry seriouā¦
…
continue reading
1
How to Address the Problem of Poorly-Defined Requirements in Software System Design
54:48
54:48
Play later
Play later
Lists
Like
Liked
54:48This webcast offers a solution to the problem of poorly defined requirements in system design that can lead to software flaws, cost and time overruns, and stakeholder dissatisfaction. We will tell you how to use a structured process called the ATAM (architectural tradeoffs analysis method) to develop a system design by eliciting requirements, scenaā¦
…
continue reading