Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A podcast about web design and development.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A place for elite leaders and teams.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
next generation web podcast
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
Two Rubyists having conversations and interviewing others about Ruby and web development.
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
Join us on a journey to make believe worlds with our good friend Mat Ryer. The assignment; we each get to make up a new world where we invent a new gadget and declare a new rule. This episode is sure to delight loyal fans and especially those who enjoy Mat Ryer on the show and a good/bad song or two. Join the discussion Changelog++ members get a bo…
…
continue reading

1
Building Empathy and Accessibility: Fostering Better Engineering Cultures and Developer Experiences
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast, Shane Hastie, Lead Editor for Culture & Methods spoke to Erin Doyle about her journey as a generalist engineer, her passion for web accessibility, the importance of empathy and psychological safety in engineering teams, and her commit…
…
continue reading

1
A guide to functional programming By Jemima Abu
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47Jemima Abu, Senior Product Engineer at CAIS, joins the podcast to unpack her no-fluff approach to functional programming in JavaScript. From why predictable code matters to how higher-order functions like map and reduce can save your sanity, Jemima breaks down real-world lessons on purity, immutability, and when it's okay to not be a functional pur…
…
continue reading
This episode explores the dichotomy between iterative planning and target state planning in software development, discussing the benefits and drawbacks of each approach and providing decision factors to help you choose the most appropriate method for your situation. Understand the core difference between iterative planning, which emphasises agility…
…
continue reading

1
SE Radio 665: Malcolm Matalka on Developing in OCaml with Zero Frameworks
56:10
56:10
Play later
Play later
Lists
Like
Liked
56:10Malcolm Matalka, founder of Terrateam, joins host Giovanni Asproni to talk about the reasoning behind the choice of a not-so-widespread language (OCaml) and the (almost) total avoidance of frameworks for the development of Terrateam. While discussing the reasons for choosing a specific programming language and the advantages and disadvantages of us…
…
continue reading

1
896: Do I Still Need To Know JS/CSS/HTML with AI? × How To Sell An App × Is React Context Bad? × More
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57By Syntax
…
continue reading

1
Advancing AppSec With AI With Akira Brand
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Episode Summary In this episode of The Secure Developer, Danny Allan sits down with Akira Brand, AVP of Application Security at PRA Group, to explore the evolving landscape of application security and AI. Akira shares her unconventional journey from opera to cybersecurity, discusses why AppSec is fundamentally a customer service role and breaks dow…
…
continue reading

1
Episode 456: Will I look bad on the job market if I'm a crypto developer and struggling to go from management back to dev work
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39In this episode, Dave and Jamison answer these questions: Hey, I am a web developer getting bored of the regular development work. I am interested in finance and the monetary system and due to the overlap of finance and engineering I feel down the Bitcoin rabbit hole and even spiked interest in crypto like Solana and Sui. I am pretty sure most of c…
…
continue reading

1
#110 Unlocking Developer Productivity with Justin Reock
1:05:04
1:05:04
Play later
Play later
Lists
Like
Liked
1:05:04Justin Reock has spent a lot of his career thinking about how to help developers be more productive. In this episode we learn about the methodologies that can help developers spend more time in "flow state" - happily coding the fun stuff. Further reading: Measuring developer productivity with the DX Core 4 Discuss this episode: disc…
…
continue reading

1
China’s new cyber arsenal revealed. [Research Saturday]
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
…
continue reading
A tech worker stumbles upon mass fraud and brings receipts, a flag football prank goes very right, a teenager uses Net Send and gets in trouble — but not as much as the person they're in trouble with, and a guy almost sends his pal on a "Taken" style revenge mission to Kosovo. Got a strange tale of technology, security, or hacking? Share it at Hotl…
…
continue reading

1
Understanding SaaS Security: Insights, Challenges, and Best Practices
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highlights security concerns with SaaS, such as shadow IT and weak access co…
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
Pentagon hits fast-forward on software certs.
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
…
continue reading
SPONSER LINK Mailtrap Adam's Socials Adam on LinkedIn Event Modeling Understanding Event Modeling Adaptech Coder's Socials Mike on X Mike on BlueSky Mike's Blog Coder on X Coder on BlueSky Show Discord Alice Alice Forms TMB Earth Day 2025 CompetitionBy The Mad Botter
…
continue reading
In this episode of Remote Ruby, Chris and Andrew catch up on recent events and dive into their experiences with various conferences. They discuss their travels to Brazil, Philly, Chicago, and Vegas, sharing the highlights and challenges of each trip. The conversation then shifts to technical topics, including insights from the Tropical on Rails con…
…
continue reading

1
Mic Drop: The Hackalorian: A careful student strikes back
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Meet Mando: an IT guy by day, cybercrime fighter by night. And his mentor? One of the most prolific data thieves ever. Together, they’re rewriting the rules of digital justice. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading

1
Record-Breaking Cybercrime Losses and Data Breaches in 2024
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
…
continue reading
Paul Dhaliwal is the founder and CEO of CodeConductor. Priya Joseph is the AI field CEO at DDN. Lizzie Siegle is a developer advocate at Cloudflare. Erin Mikail Staples is a developer experience engineer at Galileo. This episode was recorded at HumanX last month. Next year’s event will be April 6-9, 2026 in San Francisco. Register today!…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
Neverending support for open source with Hayden Barnes
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55The issue of software support for open-source is a long and storied one. Scott sits down with open-source advocate Hayden Barnes about how paid support and custom builds of older open-source software is a business opportunity for herodevs. Should you upgrade and migrate to the latest build? Or should you get paid never ending support?…
…
continue reading
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
…
continue reading
Some Synology NAS products will require drives they sold you, doubt is cast on the CVE program, why some FreeBSD packages didn’t appear when they should have, and backing up the keys for encrypted backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Robust & Reliable Backup Solutions with OpenZFS News Synol…
…
continue reading
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
…
continue reading

1
Blue Shield of California shared private data,FBI IC3 report, Ex-Army sergeant jailed
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
…
continue reading

1
571: Space, Software, and Surprises with Rémy Hannequin
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11Sami and fellow thoughtboter Rémy look to the stars as they talk all things astronomical. Learn about Rémy’s new open source gem Astonoby that plots the coordinates of objects in space, the hidden inventions developed as humans looked to the stars and listen as the pair theorise whether there truly is other life in the universe. — If you’re enthusi…
…
continue reading

1
Are we a trade or a profession? [CISO Perspectives]
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives,…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
Standardization and simplification as key to engineering excellence
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44They also discuss: Lloyds Banking Group's multi-year journey to drive simplification and standardization, reduce cognitive load & improve engineering efficiency, and enhance developer happiness. Challenges engineering teams face today, along with the cultural shifts in regulatory environments. Episode notes: Connect with Hilary Lanham and Tom Kelk.…
…
continue reading
How can a large language model help your organization answer government RFPs? Carl and Richard talk to Vishwas Lele about his startup pWin, as in proposal win. Vishwas talks about being a year into the startup and his deeper understanding of how AI technologies can augment skilled operators to produce better quality products in less time, including…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
…
continue reading

1
Make sales not features (Interview)
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Kendall Miller is a bubbly extrovert who sticks his fingers in a lot of pies. He advises tech companies like FusionAuth, positions tech products like Civo & Tensorlake, organizes tech networks like CTO Lunches, and even sells whiskey & gin to tech people like us via his Friday Deployment Spirits brand. Kendall has learned a lot since he first enter…
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading

1
ep176 Monthly Platform 202504 | mozaic.fm
2:53:16
2:53:16
Play later
Play later
Lists
Like
Liked
2:53:16第 176 回のテーマは 2025 年 4 月の Monthly Platform です。Show Note はこちら: https://mozaic.fm/episodes/176/monthly-platform-202504.htmlBy Jxck
…
continue reading

1
Microsoft Recall updates, Russian orgs deal with networking software updates, SSL.com certificate issuance vulnerability
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stop…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
…
continue reading
If your organization is laser-focused on epics, features, and user stories, you may want to shift your attention to something else that can have an even greater impact on your product or solution. Michele Lanzinger, strategic advisor at Scaled Agile, explains what and why in this episode. Like what you hear? Connect with Michele on LinkedIn. Explor…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading
This week, how a global game of cat and mouse led to a friendship—and an unexpected redemption. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading

1
460: Programer Productivity with Valerie Burzynski
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10Start taking notes in this episode as Joël and Valerie discuss the different ways in which they structure their note taking systems to improve their workflows. Together they cover the best ways to get started with serious note taking, how to best map out your thoughts so they make the most sense when you come back round to them, as well as examinin…
…
continue reading

1
Google OAuth abused, Japan's trading scams, hijacking with Zoom
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Google OAuth abused in DKIM replay attack Japan warns of sharp rise in unauthorized trading North Koreans hijacking Zoom’s Remote Control Huge thanks to our sponsor, Dropzone AI Security threats don't clock out at 5 PM, but your analysts need to sleep sometime. Dropzone AI delivers around-the-clock alert investigations with the same attention to de…
…
continue reading

1
Shift-M/55: Richard Pawson about Naked Objects and OOP
1:09:40
1:09:40
Play later
Play later
Lists
Like
Liked
1:09:40The video is here: https://www.youtube.com/watch?v=x6LKw-iQHZQBy Yegor Bugayenko
…
continue reading

1
Visually orchestrating data diagnostics but platform agnostic
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02Dataiku orchestrates data stacks and lets you create analytics, models, and agents. Find Florian on LinkedIn. This episode was recorded at HumanX last month. Next year’s conference will be April 6-9, 2026 in San Francisco. Register today!By Stack Overflow
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading