Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

DevSecOps Podcasts

show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork
 
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
Artwork

1
Profound

John Willis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Step into the DevOps Sauna with Darren Richardson and Pinja Kujala as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
  continue reading
 
Artwork
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

251
Solutions Express

ePlus, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
  continue reading
 
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Artwork

1
CTRL+ALT+DEPLOY

controlaltdeploy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
DevOps State of Mind

LogDNA x StudioPod Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
  continue reading
 
Artwork

1
Lessons in Cybersecurity

Prof. Avishai Wool * Sponsored by AlgoSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
  continue reading
 
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Artwork

1
SilverLining IL

MarkeTech Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
  continue reading
 
Loading …
show series
 
Secure Your Cloud with Code: Building Automated AWS Infrastructure Using DevSecOps https://knowledge.businesscompassllc.com/secure-your-cloud-with-code-building-automated-aws-infrastructure-using-devsecops/ Managing AWS infrastructure manually leaves your cloud environment vulnerable to security gaps and human errors. AWS DevSecOps changes this by …
  continue reading
 
We break down 10 years of HashiConf and this year's Terraform-heavy news. What do Terraform Actions with Ansible, Stacks GA, and HCP-only features mean for day two work? Is open source getting left behind, and is OpenTofu worth a look? We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our listeners. D…
  continue reading
 
Send us a text In this episode of DevOps Sauna, Pinja and Stefan talk about what truly makes a developer platform successful—and why forcing adoption never works. They explore the “coffee and cookie principle,” the importance of trust between developers and platform teams, and how to create platforms people actually want to use. Topics include buil…
  continue reading
 
ECS, EC2, and Auto Scaling Explained: The Core of Scalable Cloud Architecture https://knowledge.businesscompassllc.com/ecs-ec2-and-auto-scaling-explained-the-core-of-scalable-cloud-architecture/ Building modern applications that can handle traffic spikes and grow with your business isn’t just nice to have—it’s essential. AWS ECS, Amazon EC2, and Au…
  continue reading
 
Full Deployment Walkthrough: Unsplash MCP Server with SSE Integration on Cloud Foundry https://knowledge.businesscompassllc.com/full-deployment-walkthrough-unsplash-mcp-server-with-sse-integration-on-cloud-foundry/ This comprehensive Cloud Foundry deployment walkthrough shows you how to deploy an Unsplash MCP Server with server-sent events integrat…
  continue reading
 
Smarter Kubernetes Deployments: Moving Beyond Helm Charts https://knowledge.businesscompassllc.com/smarter-kubernetes-deployments-moving-beyond-helm-charts/ Helm charts have become the go-to solution for Kubernetes deployments, but many DevOps teams are hitting walls with complex applications and modern deployment needs. If you’re a DevOps engineer…
  continue reading
 
Automate Monitoring on AWS: Create CloudWatch Alarms with SNS Notifications https://knowledge.businesscompassllc.com/automate-monitoring-on-aws-create-cloudwatch-alarms-with-sns-notifications/ AWS infrastructure moves fast, and manual monitoring can’t keep up. This podcast shows DevOps engineers, cloud architects, and system administrators how to a…
  continue reading
 
Strategic Cloud Migration: Avoiding Pitfalls and Building a Future-Proof Strategy https://knowledge.businesscompassllc.com/strategic-cloud-migration-avoiding-pitfalls-and-building-a-future-proof-strategy/ Moving your business to the cloud isn’t just about following the latest tech trend—it’s about building a strategic cloud migration that actually …
  continue reading
 
Simplify Authentication in Your App: AWS Cognito Deep Dive for Developers https://knowledge.businesscompassllc.com/simplify-authentication-in-your-app-aws-cognito-deep-dive-for-developers/ User authentication can make or break your app’s success, but building it from scratch eats up valuable development time and introduces security risks. AWS Cogni…
  continue reading
 
Serverless DevOps: Automating Resource Lifecycle Management with AWS Lambda https://knowledge.businesscompassllc.com/serverless-devops-automating-resource-lifecycle-management-with-aws-lambda/ Managing cloud resources manually is a productivity killer, especially when you’re dealing with dozens of AWS services that need constant attention. Serverle…
  continue reading
 
Deploy Spring Boot on AWS Automatically with a CI/CD Pipeline (CodePipeline + ECS) https://knowledge.businesscompassllc.com/deploy-spring-boot-on-aws-automatically-with-a-ci-cd-pipeline-codepipeline-ecs/ Deploying Spring Boot applications manually to AWS gets old fast. Every code change means repeating the same tedious steps, and human errors creep…
  continue reading
 
Beyond Glue: Build a Lightweight CSV ETL with AWS Lambda and Step Functions https://knowledge.businesscompassllc.com/beyond-glue-build-a-lightweight-csv-etl-with-aws-lambda-and-step-functions/ Traditional ETL platforms like Glue often feel like using a sledgehammer to crack a nut when you’re just processing CSV files. If you’re a data engineer, clo…
  continue reading
 
In this second episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week, Dave, Esmee, and …
  continue reading
 
In Episode 160 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Alan Watkins, CIS Controls Ambassador, to explore how the CIS Critical Security Controls® (CIS Controls®) empower small and medium-sized enterprises (SMEs) to build practical, scalable cybersecurity programs. Alan shares his journey from law enforcement to IT …
  continue reading
 
Simplify AWS CLI MFA Authentication with Interactive Script Automation https://knowledge.businesscompassllc.com/simplify-aws-cli-mfa-authentication-with-interactive-script-automation/ Managing AWS CLI MFA authentication can turn simple tasks into repetitive, time-consuming workflows that slow down your development process. Every AWS CLI command req…
  continue reading
 
AWS Backup Automation Explained: Simplifying Data Protection for Cloud Workloads https://knowledge.businesscompassllc.com/aws-backup-automation-explained-simplifying-data-protection-for-cloud-workloads/ Managing backups for your cloud infrastructure doesn’t have to be a daily headache. AWS backup automation transforms how organizations protect thei…
  continue reading
 
Serverless vs IaC: AWS Lambda and CDK Compared for Cloud Engineers https://knowledge.businesscompassllc.com/serverless-vs-iac-aws-lambda-and-cdk-compared-for-cloud-engineers/ Cloud engineers face a critical decision when building AWS applications: choosing between serverless computing with AWS Lambda and infrastructure as code approaches like AWS C…
  continue reading
 
Simplify Your Monorepo Workflow: The Ultimate Guide to GitHub Actions CI/CD https://knowledge.businesscompassllc.com/simplify-your-monorepo-workflow-the-ultimate-guide-to-github-actions-ci-cd/ Managing multiple projects in a single repository can quickly turn into a nightmare without the right CI/CD setup. Monorepo GitHub Actions offer powerful sol…
  continue reading
 
Data Architecture for Generative AI | RAG and Cloud-Native Design Patterns https://knowledge.businesscompassllc.com/data-architecture-for-generative-ai-rag-and-cloud-native-design-patterns/ Building effective data architecture for AI systems requires more than just throwing data at large language models and hoping for the best. Retrieval augmented …
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
How to Configure IRSA on AWS EKS | IAM Roles for Pods Setup Guide https://knowledge.businesscompassllc.com/how-to-configure-irsa-on-aws-eks-iam-roles-for-pods-setup-guide/ Managing AWS permissions for your Kubernetes pods just got easier with IAM Roles for Service Accounts (IRSA). This podcast walks you through the complete AWS EKS IRSA setup proce…
  continue reading
 
Pipedrive Database Architecture | Engineering Scalability and Reliability https://knowledge.businesscompassllc.com/pipedrive-database-architecture-engineering-scalability-and-reliability/ Pipedrive handles millions of sales interactions daily while maintaining lightning-fast performance and zero downtime. The secret lies in their sophisticated data…
  continue reading
 
Automating Cloud Security: Zero-Touch Threat Remediation Using AWS Services https://knowledge.businesscompassllc.com/automating-cloud-security-zero-touch-threat-remediation-using-aws-services/ Cloud security teams spend countless hours manually responding to threats, often missing critical incidents during off-hours or vacation periods. Automating …
  continue reading
 
Scaling KYC in the Cloud: How We Built a Secure Identity Verification System on AWS https://knowledge.businesscompassllc.com/scaling-kyc-in-the-cloud-how-we-built-a-secure-identity-verification-system-on-aws/ Building a robust KYC system that can handle thousands of identity verifications daily while maintaining strict security standards is no easy…
  continue reading
 
Code Visualization Made Easy: Top Tools to Create Beautiful Diagrams Automatically https://knowledge.businesscompassllc.com/code-visualization-made-easy-top-tools-to-create-beautiful-diagrams-automatically/ Converting complex codebases into clear, visual diagrams no longer requires hours of manual work. Modern code visualization tools can automatic…
  continue reading
 
Secure QuickSight Access: Automate IP Restrictions Using AWS Lambda https://knowledge.businesscompassllc.com/secure-quicksight-access-automate-ip-restrictions-using-aws-lambda/ Managing QuickSight IP restrictions manually becomes a nightmare when your team grows or remote workers change locations frequently. This podcast shows data engineers, DevOp…
  continue reading
 
Unleashing Scalable Generative AI with Amazon Bedrock on AWS https://knowledge.businesscompassllc.com/unleashing-scalable-generative-ai-with-amazon-bedrock-on-aws/ Amazon Bedrock transforms how businesses deploy generative AI AWS solutions by removing the complexity of managing infrastructure and foundation models. This podcast targets developers, …
  continue reading
 
Debugging AWS the Hard Way: Tracking Down a Missing Host Header Disaster https://knowledge.businesscompassllc.com/debugging-aws-the-hard-way-tracking-down-a-missing-host-header-disaster/ Your AWS application is throwing errors, users can’t access your site, and the logs show cryptic messages about missing host headers. Sound familiar? This AWS debu…
  continue reading
 
Python boto3 S3 Upload | Direct In-Memory Logging Without stdout https://knowledge.businesscompassllc.com/python-boto3-s3-upload-direct-in-memory-logging-without-stdout/ Need to upload log data directly from Python memory to S3 without creating temporary files or cluttering stdout? Many developers struggle with efficient logging workflows that bypa…
  continue reading
 
Transforming String Data to JSON in AWS Step Functions Using Pass and Lambda States https://knowledge.businesscompassllc.com/transforming-string-data-to-json-in-aws-step-functions-using-pass-and-lambda-states/ Working with string data in AWS Step Functions often requires converting it to JSON format for downstream processing. This podcast helps dev…
  continue reading
 
How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
  continue reading
 
Introduction to AWS Cloud9: Build, Code, and Collaborate in the Cloud https://knowledge.businesscompassllc.com/introduction-to-aws-cloud9-build-code-and-collaborate-in-the-cloud/ AWS Cloud9 transforms how developers build applications by bringing your entire development environment to the cloud. This cloud IDE lets you write, debug, and deploy code…
  continue reading
 
Infrastructure Automation with Terraform: Jenkins Deployment on AWS https://knowledge.businesscompassllc.com/infrastructure-automation-with-terraform-jenkins-deployment-on-aws/ DevOps engineers, cloud architects, and development teams constantly need reliable ways to deploy and manage Jenkins servers on AWS without the manual headaches. Infrastruct…
  continue reading
 
Automating Infrastructure Deployment with Terraform and Jenkins CI/CD https://knowledge.businesscompassllc.com/automating-infrastructure-deployment-with-terraform-and-jenkins-ci-cd/ Managing cloud infrastructure manually is time-consuming and error-prone. Automating Infrastructure Deployment with Terraform and Jenkins CI/CD transforms how DevOps te…
  continue reading
 
Implementing Cross-Region Backup and Restore for AWS EKS Using Kasten K10 https://knowledge.businesscompassllc.com/implementing-cross-region-backup-and-restore-for-aws-eks-using-kasten-k10/ Protecting your AWS EKS workloads against regional failures requires a solid cross-region backup strategy. AWS EKS cross-region backup using Kasten K10 gives yo…
  continue reading
 
How to Modernize Your Data Warehouse: Automating Teradata Migration to Redshift https://knowledge.businesscompassllc.com/how-to-modernize-your-data-warehouse-automating-teradata-migration-to-redshift/ Moving your data warehouse from Teradata to AWS Redshift doesn’t have to mean months of manual work and sleepless nights. Automated database migratio…
  continue reading
 
Containerizing and Deploying a Go Application on AWS ECS: A Developer’s Guide https://knowledge.businesscompassllc.com/containerizing-and-deploying-a-go-application-on-aws-ecs-a-developers-guide/ Deploying Go applications to the cloud doesn’t have to be overwhelming. This podcast walks you through containerizing Go applications and deploying them o…
  continue reading
 
Monitoring AWS Login Failures: Best Practices for Account Security https://knowledge.businesscompassllc.com/monitoring-aws-login-failures-best-practices-for-account-security/ AWS login failures pose serious threats to your cloud infrastructure, potentially signaling brute force attacks, compromised credentials, or unauthorized access attempts. This…
  continue reading
 
Seamless AWS Deployments: Terraform Infrastructure Automation via GitHub Actions https://knowledge.businesscompassllc.com/seamless-aws-deployments-terraform-infrastructure-automation-via-github-actions/ Modern cloud deployments don’t have to be a manual nightmare of clicking through AWS consoles and praying nothing breaks. AWS Terraform deployment …
  continue reading
 
MySQL and Aurora MySQL: Debugging, Tuning, and Performance Best Practices https://knowledge.businesscompassllc.com/mysql-and-aurora-mysql-debugging-tuning-and-performance-best-practices/ MySQL databases power millions of applications worldwide, but even experienced developers and database administrators struggle with performance issues that can bri…
  continue reading
 
Exploring the AWS Ecosystem: Key Managed Services Developers Love https://knowledge.businesscompassllc.com/exploring-the-aws-ecosystem-key-managed-services-developers-love/ Amazon Web Services for developers offers a massive toolkit that can feel overwhelming at first glance. This podcast breaks down the AWS ecosystem overview into digestible piece…
  continue reading
 
Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at Al…
  continue reading
 
In episode 159 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf, Sr. Cyber Threat Intelligence Analyst at the Center for Internet Security® (CIS®), and Randy Rose, Vice President of Security Operations & Intelligence at CIS. Together, they dive into the scariest malware of 2025 in this special Halloween edition. The conver…
  continue reading
 
Accelerating AI Outcomes with Great Data: Strategies for Data-Driven Intelligence https://knowledge.businesscompassllc.com/accelerating-ai-outcomes-with-great-data-strategies-for-data-driven-intelligence/ Your AI initiatives are only as strong as the data feeding them. Poor data quality kills even the most sophisticated machine learning models, whi…
  continue reading
 
Seamless Load Balancing in AWS: How Auto Scaling Groups Attach EC2 Instances to Target Groups https://knowledge.businesscompassllc.com/seamless-load-balancing-in-aws-how-auto-scaling-groups-attach-ec2-instances-to-target-groups/ Managing AWS load balancing can feel overwhelming when you’re trying to connect Auto Scaling Groups with Target Groups fo…
  continue reading
 
Cloud Governance Done Right: Building Trust, Control, and Compliance in the Cloud https://knowledge.businesscompassllc.com/cloud-governance-done-right-building-trust-control-and-compliance-in-the-cloud/ Cloud governance has become the backbone of successful digital transformation, yet many organizations struggle with balancing security, compliance,…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play