Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
DevSecOps Podcasts
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Sushi Bytes is an unapologetically AI-generated podcast brought to you by Shinobi, FossID’s vigilant Software Composition Analysis ninja. In each bite-sized episode, Shinobi breaks down the evolving world of software supply chain integrity – from open-source license compliance and vulnerability disclosure to SBOM standards, IP risks, and AI-generated code implications. With a surge in regulatory scrutiny and AI adoption, the software stack is becoming harder to manage – and riskier to ignore ...
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Where Automation Meets Security
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
Step into the DevOps Sauna with Pinja Kujala and Stefan Daugaard Poulsen as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
The TestGuild DevOps Toolchain Podcast is a practical, engineer-focused show for navigating the modern DevOps landscape, covering the tools, practices, and decisions that power reliable software delivery at scale. Previously known as the TestGuild Performance and SRE Podcast, this show brings together DevOps engineers, SREs, platform teams, and engineering leaders to explore what's actually working in real-world environments. Each episode features in-depth conversations with industry experts ...
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading
1
Top 10 Emerging AI Security Roles in 2026
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Secure your future in the most critical career path in tech by enrolling in the Certified AI Security Professional (CAISP) course today! In this episode, we explore the definitive guide to the Top 10 Emerging AI Security Roles for 2026. The shift toward AI-integrated operations is not a future concern—it is happening now, and it has opened a "chasm…
…
continue reading
1
Ep 17 - Breaking Into Product Security, AppSec, DevSecOps, and Cloud Security Without a Degree
1:11:35
1:11:35
Play later
Play later
Lists
Like
Liked
1:11:35🎙️ Coffee, Chaos and ProdSec, Ep 17 Breaking into cybersecurity without a degree feels impossible, yet people do it every single day. So this week, Cameron and Kurt grab their mugs and get real about how career changers actually break into Product Security, Application Security, DevSecOps, and Cloud Security when their background looks nothing like…
…
continue reading
1
#88 - EU Compliance 101: DSA, MiCA explained
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56Which parts of AI Act, NIS2, DORA, and DSA overlap so you can cover more with less? What basics raise your baseline fast: central logs, backups, risk assessments, and human-in-the-loop governance? Could a simple mailing list make incident comms painless? We are always happy to answer any questions, hear suggestions for new episodes, or hear from yo…
…
continue reading
1
CR118: Christmas special! Return to the simulation with Anders Indset, Author & Philosopher
1:30:13
1:30:13
Play later
Play later
Lists
Like
Liked
1:30:13From all of us at Cloud Realities, MERRY CHRISTMAS!!!! Back in our December 2022 Christmas special, we explored the far reaches of reality, asking whether we live in a simulation and if that even matters. Now, we return to that question with fresh perspectives and new challenges… In this last Cloud Realities podcast of 2025, Dave, Esmee and Rob ret…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 139
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Who controls your cloud now? Inside Europe’s shift to sovereign cloud
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Send us a text Who really controls your cloud, and why does it matter now? In this episode of DevOps Sauna, Pinja and Stefan dive into Europe’s growing shift toward sovereign cloud. They explore what’s driving the conversation, from data sovereignty and GDPR to geopolitical uncertainty and upcoming EU regulations. The discussion breaks down how dif…
…
continue reading
1
CRSP08: State of AI 2025 pt.3: AI Unplugged - from data to sovereign intelligence with Johanna Hutchinson, BAE Systems
42:58
42:58
Play later
Play later
Lists
Like
Liked
42:58In this last episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week Dave, Esmee , Rob si…
…
continue reading
1
Ep 16 - Part 2 - Get Comfortable Being Vulnerable: When AI, Risk, and Reality Collide in AppSec
1:06:54
1:06:54
Play later
Play later
Lists
Like
Liked
1:06:54🎙️ Coffee, Chaos and ProdSec - Ep 16 Last week we mapped the problem — now we break the system. Kurt and Cameron return with part two of our vulnerability deep dive, tackling CVSS chaos, broken tooling, exploding CVE volume, and how AI is about to overwhelm traditional prioritization models. From exposure validation turning 15,000 findings into 300…
…
continue reading
1
AI Security Interview Questions - AI Security Training and Certification - 2026
16:42
16:42
Play later
Play later
Lists
Like
Liked
16:42Enroll now in the Certified AI Security Professional (CAISP) course by Practical DevSecOps! This highly recommended certification is designed for the engineers , focusing intensely on the hands-on skills required to neutralize AI threats before attackers strike. The CAISP curriculum moves beyond theoretical knowledge, teaching you how to secure AI …
…
continue reading
1
A Vision For The Future Of Enterprise AI Security With Sanjay Poonen
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30Episode Summary The future of cyber resilience lies at the intersection of data protection, security, and AI. In this conversation, Cohesity CEO Sanjay Poonen joins Danny Allan to explore how organisations can unlock new value by unifying these domains. Sanjay outlines Cohesity’s evolution from data protection to security in the ransomware era, to …
…
continue reading
1
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 138
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59Chris Steffen and Ken Buckler from EMA discuss API security.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Best AI Security Certification Courses & Earn $280K Salary Premium in 2026
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180K–280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificati…
…
continue reading
1
CR117 Redesigning industries with AI with Scott Hanselman, Microsoft
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57AI is transforming software development—redefining roles, creativity, and community, while challenging developers to embrace ambiguity, orchestrate specialized agents, and stay human through empathy and curiosity. Will AI make developers more creative, or will we forget how the machine really works under the hood? This week Dave, Esmee , Rob sit do…
…
continue reading
1
Ep 15 - Part 1 - Get Comfortable Being Vulnerable: The Chaos Behind Every CVE and Every Risk
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58🎙️ Coffee, Chaos and ProdSec - Ep 15 Vulnerabilities are piling up faster than teams can read the reports, and vulnerability management is buckling under the weight. So this week, Kurt and Cameron grab their mugs and dig into why modern VM feels impossible, why severity scores mislead everyone, and how reachability and exploitability matter far mor…
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
CTRL + ALT + DEPLOY | Ep 06 - How AI Is Redefining DevOps and Quality Engineering
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30AI is transforming DevOps and testing, shifting roles towards quality engineering while emphasizing human involvement. Insights from Yaniv Sayers’s experience at OpenText reveal how AI enhances the software delivery lifecycle. Trust in AI remains a challenge, yet many professionals embrace these tools. The future envisions autonomous delivery teams…
…
continue reading
1
#87 - EU Compliance 101: AI Act, DORA, NIS2 explained
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Want a quick map of EU compliance for engineers? How do you classify AI by risk and tell users when AI is used? When do you send a 24-hour heads-up and a one-month report after an incident? Does NIS2 make your board liable and your logs mandatory? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our …
…
continue reading
1
The $8 Trillion Question: Open Source, Risk, and Resilience
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50Send us a text Open source powers nearly everything we build today—but what is it actually worth? Pinja and Stefan discuss Harvard’s $8 trillion estimate, how widely open source is used, and why central registries are under pressure. They touch on security risks, supply chain attacks, and what the EU Cyber Resilience Act means for companies using O…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 137
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CRLIVE58 AWS re:Invent 2025: European Digital Sovereign Futures with Mustafa Isik, AWS + Team reflections on re:Invent 2025
1:13:02
1:13:02
Play later
Play later
Lists
Like
Liked
1:13:02Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
CRLIVE57 AWS re:Invent 2025: Financial Renovation with Scott Mullins, AWS
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
CRLIVE56 AWS re:Invent 2025: Driving Innovation in Automotive and Energy & Utilities with Rob Boetticher and Howard Gefen, AWS
55:04
55:04
Play later
Play later
Lists
Like
Liked
55:04Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
CRLIVE55 AWS re:Invent 2025: re:Accelerating Europe with Tanuja Randery, AWS
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
Ep 14 - DevSecOps Without the Buzzwords - What It Really Takes to Build Secure Software
1:09:57
1:09:57
Play later
Play later
Lists
Like
Liked
1:09:57🎙️ Coffee, Chaos and ProdSec - Ep 14 DevSecOps gets thrown around in cybersecurity more than any other term, but almost no one agrees on what it actually means. So this week, Kurt and Cameron pour fresh mugs and unpack the real practices behind modern Application Security, Product Security, DevSecOps, and Software Supply Chain Security without the …
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
…
continue reading
1
CRLIVE54 AWS re:Invent 2025: Making it real in Industries with Tim Murnin, AWS
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
CRLIVE53 AWS re:Invent 2025: Driving Cloud and AI success through collaboration with Chandra Pinapala, AWS
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28Live from the iconic Venetian in Las Vegas, we’re rolling out an exclusive mini-series dedicated to AWS re:Invent 2025! Tune in as we sit down with AWS visionaries and take the pulse of the industry on everything shaping the future, Cloud innovation, GenAI, Agents, and the hottest trends making waves. And because what happens in Vegas doesn’t alway…
…
continue reading
1
Vulnerabilities In Enterprise AI Workflows With Nicolas Dupont
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34Episode Summary As AI systems become increasingly integrated into enterprise workflows, a new security frontier is emerging. In this episode of The Secure Developer, host Danny Allan speaks with Nicolas Dupont about the often-overlooked vulnerabilities hiding in vector databases and how they can be exploited to expose sensitive data. Show Notes As …
…
continue reading
1
CRAzy Requirements: What the Cyber Resilience Act Means for Your SBOM
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50The EU Cyber Resilience Act (CRA) is reshaping global expectations for software security – and putting Software Bill of Materials (SBOMs) at the center of compliance. In this episode, Shinobi and Gen break down what the CRA requires, how it compares to U.S. regulations, and what engineering and legal teams must do now to stay ahead. Whether you're …
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 136
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CR116: Unlocking Cloud for critical missions with Danny Polaine, Thales
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45Accelerating cloud adoption to drive innovation across domains like space, identity, and naval systems presents unique challenges. Success depends on aligning organizational culture, governance, financial models, and regulatory frameworks to enable collaboration, scalability, and software-defined capabilities. This week, Dave, Esmee, and Rob speak …
…
continue reading
1
Ep 13 - Untangling Cloud Security - Foundations, Failures, and What Teams Miss
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47🎙️ Coffee, Chaos & ProdSec – Episode 13 This week, Cameron and Kurt tackle the questions everyone claims to understand but absolutely argues about in every cloud meeting. What is the cloud really? Why is identity suddenly the perimeter? And how did Kubernetes quietly become everyone’s new production environment? We break down the real concerns behi…
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
…
continue reading
1
AI Security Certification: The Ultimate Guide to the Certified AI Security Professional (CAISP) course
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). …
…
continue reading
1
#86 - MCP plugins: your next security blind spot?
1:04:54
1:04:54
Play later
Play later
Lists
Like
Liked
1:04:54Is MCP just another server you need to threat model, patch, and monitor? How do you keep users from over-privileged access, block LLM injection, and stop blind spots? We unpack the VentureBeat article https://venturebeat.com/security/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise with real-world tips. We are always happy …
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 135
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
CRLIVE52 Microsoft Ignite 2025: Scaling AI agents responsibly + Ignite 2025 team reflections with Yina Arenas, Microsoft
1:03:57
1:03:57
Play later
Play later
Lists
Like
Liked
1:03:57Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
…
continue reading
1
CRLIVE51 Microsoft Ignite 2025: Undercover Cloud with Alistair Speirs, Microsoft
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
…
continue reading
1
CRLIVE50 Microsoft Ignite 2025: Safe and responsible agentic implementation with Rob Lefferts, Microsoft
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
…
continue reading
1
CRLIVE49 Microsoft Ignite 2025: Innovating at the frontier with John Link, Microsoft
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
…
continue reading
1
CRLIVE48 Microsoft Ignite 2025: From business applications to AI business solutions with Jonathan Hunt, Microsoft
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
…
continue reading
1
Ep 12 - OWASP Top 10:2025 RC1 Breakdown - The Vulnerabilities That Refuse To Die
1:04:57
1:04:57
Play later
Play later
Lists
Like
Liked
1:04:57🎙️ Coffee, Chaos & ProdSec - Ep 12 The OWASP Top 10:2025 RC1 is here, and it is already causing chaos. So this week, Kurt and Cameron grab their mugs and break down every category with real world stories, honest takes, and a few spicy opinions on why some vulnerabilities just will not go away. From Broken Access Control dominating the charts again,…
…
continue reading