Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Developmental Podcasts
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Technical interviews about software topics.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Explore topics related to transformational community leadership including economic development, non-profit engagement, organizational management, and policy development. It's a candid conversation with veterans of the economic development profession along with inspiring interviews of today's thought leaders.
…
continue reading
next generation web podcast
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Hear about the cutting edge of development economics from research to practice.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Experienced Open Source professionals exploring the tech we actually use. If it runs on Linux, we're into it. Whether you're tweaking your desktop, gaming, self-hosting, developing software, improving terminal productivity, or running production infrastructure — we cover the tools and workflows that actually matter. New episode every fortnight. Upbeat and family-friendly for Linux enthusiasts of all ages.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Programming is a podcast that aims to make us better software engineers! With each episode, you'll learn about a computer science concept in a brief and accessible way.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
continue reading
Software developer at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Start your day with practical philosophy that actually works. In under 10 minutes, Scott Smith cuts through the noise with straight talk about navigating life's messy middle—where personal and professional challenges collide. No hype. No fluff. Just 20 years of hard-won wisdom, Stoic principles, and real stories from someone who's been there. Monday through Friday, learn to think clearly, act wisely, and build a life that's actually yours.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
No Limit Leadership is the go-to podcast for growth-minded executives who refuse to settle for mediocrity. Hosted by executive coach and former Special Forces commander Sean Patton, this show explores modern leadership, self-leadership, and the real-world strategies that build high-performing teams. Whether you're focused on leadership development, building a coaching culture, improving leadership communication, or strengthening team accountability, each episode equips you with actionable in ...
…
continue reading
Mark Manson is a three-time #1 New York Times bestselling author and 20-year personal development industry veteran. Solved is the most comprehensive, evidence-based, overly-researched podcast on the planet to help you get an issue in your life, err... solved.
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
coffee => code
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
…
continue reading
Cigar, Beer and Spirit Reviews and Discussions
…
continue reading
1
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
…
continue reading
I've talked about goals for 19 years on this podcast. Got 5,200 episodes documented. I could pull every single mention of goals from my database and write a book. AI could probably do it for me. But after all that talking, I've gotten really simple about goals. Two types. Legacy goals that take your whole life. Living goals that happen every week, …
…
continue reading
1
SN 1058: A Gift for the New Year - Vitamin D Revisited
1:26:06
1:26:06
Play later
Play later
Lists
Like
Liked
1:26:06In this special holiday episode, Steve Gibson and Leo Laporte revisit their classic conversation about vitamin D—diving into the science, surprising updates, and practical tips for your health. Whether you've heard it before or are tuning in for the first time, this "blast from the past" is the perfect way to kick off 2026 with wisdom, laughs, and …
…
continue reading
Upcoming Travel; Reaching IoT Shelly Nirvana; Physical Security Meets Digital with Ubiquiti; Sponsored by Malwarebytes https://www.troyhunt.com/weekly-update-484/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
…
continue reading
1
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
1
Fortinet VPN exploit, Google gmail change, Aflac breach update
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
…
continue reading
China’s surveillance of Uyghurs has leapt from the physical world to the digital one. No longer just QR codes on doorways, it’s now hidden in cloud services and software updates. This week on Click Here’s Mic Drop, we return to a story on how digital tools meant to protect identity are being used to erase it. ERASED is a four-part investigation int…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading
1
The Ransomware Ecosystem: An Encore Holiday Episode
1:15:54
1:15:54
Play later
Play later
Lists
Like
Liked
1:15:54Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The podcast's production is supported by Meter, a company providing integrated networking solutions. Additionally, support from listen…
…
continue reading
I used to hate mornings. I was a morning DJ starting at 18. Up at 4 am every day. Hated it so much I quit. Then I met Joy. She gets up at 5:30 am every single morning like it's programmed in her DNA. Lights on, radio on, house awake. Didn't matter if I was sleeping. Her mindless persistence drove me bonkers. But I couldn't change her. So I had to f…
…
continue reading
1
Containers are easy—moving your legacy system off your VM is not
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Ryan sits down with Dan Ciruli, VP and General Manager of Cloud Native at Nutanix, to talk about getting your virtual machines and Kubernetes to play nice in cloud-native environments, why VMs are still relevant in enterprise applications, and how AI can help modernize legacy systems. Episode notes: Nutanix combines compute, storage, virtualization…
…
continue reading
The one bit of advice we’d give to someone wanting to become a professional sysadmin. This is a short episode because Joe is having a break for the Christmas period. See our contact page for ways to get in touch.By The Late Night Linux Family
…
continue reading
1
Blender and Godot in Game Development with Simon Thommes
35:11
35:11
Play later
Play later
Lists
Like
Liked
35:11Blender Studio is the creative arm of the Blender Foundation and it’s dedicated to producing films, games, and other projects that showcase the full potential of Blender. The studio functions as both an art and technology lab and pushes the boundaries of 3D animation through open productions. All of their assets, production files, and workflows are…
…
continue reading
1
Scams target MENA region, pen testers accused of blackmail, DDoS protection faces fresh challenges
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
…
continue reading
While our team is out on winter break, please enjoy this episode of Hacking Humans This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
1
Caveat Live: FBI and KU Cybersecurity Conference.
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53While our team is out on winter break, please enjoy this episode of Caveat. We've got something special for you this week! We are excited to share our very first Caveat Live event. Host Ben Yelin recently headed to the FBI and KU Cybersecurity Conference at the University of Kansas for a live session of Caveat. During the episode, Ben covered the…
…
continue reading
I walk my dogs three times a day. Same times. Every single day. It started once. Now it's a tradition. My dogs look at me like it's the law. Traditions aren't just for holidays. They're the secret sauce that makes life special all year long. But somebody has to make them. My neighbor Janice spends weeks decorating her house for Christmas. She's not…
…
continue reading
Space Geek Out Time - 2025 Edition! Richard talks to Carl about the past year in space, starting with a reader comment about 3I/ATLAS, the interstellar comet passing through our solar system that has kicked off conspiracies about aliens coming to visit - hint, it's just a comet. Then, into another record-breaking year of spaceflight with a record n…
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Play later
Play later
Lists
Like
Liked
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
Team Review Recap: Red Meat Lovers Fritanga
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Jiunn, Seth, John and Aaron discuss their review experience with the Red Meat Lovers Fritanga https://developingpalates.com/reviews/cigar-reviews/team-cigar-review-red-meat-lovers-fritanga/By Developing Palates
…
continue reading
1
DOP 330: Merry Christmas (You Should Probably Be Doing Something Else)
1:42
1:42
Play later
Play later
Lists
Like
Liked
1:42#330: In this short episode, Darin and Viktor reflect on the holiday season. YouTube channel: https://youtube.com/devopsparadox Review the podcast on Apple Podcasts: https://www.devopsparadox.com/review-podcast/ Slack: https://www.devopsparadox.com/slack/ Connect with us at: https://www.devopsparadox.com/contact/…
…
continue reading
1
ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
…
continue reading
1
Year End Repeat: Pig Butchering: Operation Shamrock Fights Back
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Over the holidays we are rerunning some of our favourite episodes. This one first aired this summer and was one of my first conversations with the fascinating head of Operation Shamrock. We'll be back with regular programming on January 5th.By Jim Love
…
continue reading
I used to be that guy wandering Walmart on Christmas Eve at midnight looking for a toaster. One year I stopped and looked around. There were a bunch of us. All guys. All looking lost in the kitchen section. The employees were looking at us with pity. That's when I decided never again. Decision-making is one of your most powerful personal growth too…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
DT #615 Advocacy That Gets Projects Done: Working With Elected Officials
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36In this episode of Develop This! host Joi Cuartero Austin interviews Kyle Moore, Great River Economic Development Foundation (GREDF) President & CEO, former Quincy, IL Mayor & IL State Representative, who shares hard-earned insights on how local leaders can advocate effectively with elected officials to get economic development projects across the …
…
continue reading
1
SE Radio 700: Mojtaba Sarooghi on Waiting Rooms for High-Traffic Events
1:07:46
1:07:46
Play later
Play later
Lists
Like
Liked
1:07:46Mojtaba Sarooghi, a Distinguished Product Architect at Queue-it, speaks with host Jeremy Jung about virtual waiting rooms for high-traffic events such as concerts and limited-quantity product releases. They explore using a virtual queue to prevent overloading systems, how most traffic is from bots, using edge workers to reduce requests to the custo…
…
continue reading
1
Why You Can't Build AI Without Progressive Delivery
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Former GitHub CEO Thomas Dohmke’s claim that AI-based development requires progressive delivery frames a conversation between analyst James Governor and The New Stack’s Alex Williams about why modern release practices matter more than ever. Governor argues that AI systems behave unpredictably in production: models can hallucinate, outputs vary betw…
…
continue reading
1
What is TYiQ? Wrong answers only – Ep 117 (End-of-year special)
1:00:46
1:00:46
Play later
Play later
Lists
Like
Liked
1:00:46Show notes: What is TYiQ? Wrong answers only – Ep 117 (End-of-year special)By Testing Podcast
…
continue reading
In this episode: Alan sends Zane Lowe to a retirement home and grabs the Aux on Spotify with Auxolotl. Martin sharpens his cultlery and hard forks ffmpeg-go as ffmpeg-statigo. “Real FFmpeg bindings for Go. Not a wrapper. Not a CLI tool. The actual libraries 📚” Mark carves up his monitors with Tiling Assistant. You can send your feedback via show@li…
…
continue reading
JavaScript has grown far beyond the browser. It now powers millions of backend systems, APIs, and cloud services through Node.js, which is one of the most widely deployed runtimes on the planet. Keeping such a critical piece of infrastructure fast, secure, and stable is a massive engineering challenge, and the work behind it is often invisible. Raf…
…
continue reading
Please enjoy this encore of Word Notes. The process of installing applications on a device without the use of official software distribution channels. CyberWire Glossary link: https://thecyberwire.com/glossary/sideloadingBy N2K Networks
…
continue reading
1
Spotify music library scraped, DDoS disrupts French postal services, Fake delivery sites hit holiday shoppers
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
…
continue reading
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker. Sponsors This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allo…
…
continue reading
In a small classroom in western China, children once learned to sing and count in the language of their ancestors — Uyghur. Then the doors were locked, and founder Abduweli Ayup went from teacher to enemy of the state. We return to the first episode in our series, ERASED. ERASED is a four-part investigation into how China is wiping Uyghur culture f…
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
1
Are we entering the 'age of intent' in digital interaction?
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24The 'age of intent' is a phrase that's been around for a number of years. However, with the rise of AI agents in 2025 it has the potential to become a key trend for 2026. It describes a new way of thinking about digital interaction in which the gap between human intention and output are reduced even further through AI assistance. Thoughtworks' APAC…
…
continue reading
Ever feel stuck not knowing what you want next year? I'm sharing the brain science behind getting unstuck and excited about 2026. It starts with exploring possibilities without commitment. No announcements, no pressure. Just curiosity. Once you find something interesting, your anticipation engine kicks in. That's when everything changes. I'll show …
…
continue reading
1
Settle down, nerds. AI is a normal technology
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31Ryan welcomes Anil Dash, writer and former Stack Overflow board member, back to the show to discuss how AI is not a magical technology, but rather the normal next step in computing’s evolution. They explore the importance of democratizing access to technology, the unique challenges that LLMs’ non-determinism poses, and how developers can keep Stack…
…
continue reading
1
Department of Know: President signs defense bill, time flies at NIST, Italian ferry malware
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading