Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Embedded Security Podcasts

show episodes
 
Artwork

1
Away Days Podcast: Reporting from the Underbelly

H11, Cool Zone Media & iHeartPodcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Away Days Podcast is an episodic documentary series focused on unreported stories from the fringes of society. We’re compassionately documenting the underground without watering it down or editorially obscuring it. This is independent journalism with no filter. Real, raw, and ugly. Journalist Jake Hanrahan, the host and creator of Away Days has spent the last 10 years embedded in places he’s not meant to be. With unique access and a straightforward style of on-the-ground reporting, the liste ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
  continue reading
 
Artwork
 
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Artwork

651
CYBER

VICE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Embedded Frontier, hosted by embedded systems expert Jacob Beningo, is a cutting-edge podcast dedicated to exploring the rapidly evolving world of embedded software and embedded system trends. Each episode delves into the latest technological advancements, industry standards, and innovative strategies that are shaping the future of embedded systems. Jacob Beningo, with his deep industry knowledge and experience, guides listeners through complex topics, making them accessible for both sea ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork
 
For history lovers who listen to podcasts, History Unplugged is the most comprehensive show of its kind. It's the only show that dedicates episodes to both interviewing experts and answering questions from its audience. First, it features a call-in show where you can ask our resident historian (Scott Rank, PhD) absolutely anything (What was it like to be a Turkish sultan with four wives and twelve concubines? If you were sent back in time, how would you kill Hitler?). Second, it features lon ...
  continue reading
 
Join Matias Madou for the interview series that brings the world's leading cybersecurity experts, educators, and academics to your living room. Chatting about all things software security, secure coding and the industry at large, it's the podcast for security enthusiasts everywhere.
  continue reading
 
Artwork

1
Talk Python To Me

Michael Kennedy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
The way we move money is changing. Fast. We want control at the touch of a finger-print. We want to send money in real-time – to the other side of the world. We want everything in one place, integrated, seamless and on our devices. Ubiquitous, embedded, fast, standardized, frictionless and secure. Global finance trends are hurling towards a unanimous conclusion. These are our Financial Futures. Each episode, we size up the bleeding edge of fintech innovation and explore the trends that are a ...
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork

1
The Shifting Privacy Left Podcast

Debra J. Farber (Shifting Privacy Left)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Shifting Privacy Left features lively discussions on the need for organizations to embed privacy by design into the UX/UI, architecture, engineering / DevOps and the overall product development processes BEFORE code or products are ever shipped. Each Tuesday, we publish a new episode that features interviews with privacy engineers, technologists, researchers, ethicists, innovators, market makers, and industry thought leaders. We dive deeply into this subject and unpack the exciting elements ...
  continue reading
 
Artwork

1
The Higher EdTech Podcast

Tim VanNorman & Brent Warner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Instructional Technologist Tim VanNorman and Professor Brent Warner work through the ins and outs of technology integration in Higher Education. The show focuses on best classroom practices for instructors in face-to-face, hybrid, and online courses. You'll hear about tools and tips that help you gain a broader understanding of the tech your students are using and expecting, and you'll hear interviews with peers and colleagues that are implementing educational technology in innovative and en ...
  continue reading
 
Artwork

1
The MSDW Podcast

MSDynamicsWorld.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The MSDW Podcast dives into the latest news and events in the Microsoft Dynamics ERP and CRM community. Produced by the editors of MSDynamicsWorld.com, the podcast features interviews and discussions on the latest issues confronting Dynamics AX, GP, NAV, and CRM users and professionals.
  continue reading
 
Artwork

1
The Current

Future Electronics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
  continue reading
 
Artwork
 
Welcome to the Responsible Bytes podcast, where we talk about all things safe and responsible technology. Technology is changing our world and the way we live in it. In this podcast we explore what those changes look like and what they mean for our present and our future. Listen in as I chat to people working in and around the technology sector, unpacking our increasingly complex and evolving digital world. Responsible Bytes is created and hosted by Dr Zena Assaad.
  continue reading
 
Artwork

1
Nerding Out With Viktor

Viktor Petersson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
  continue reading
 
Business Matters with Karl Fitzpatrick is a weekly business podcast that has featured over 2,000 interviews with entrepreneurs from Ireland, UK, Australia and the United States. Karl Fitzpatrick is an EY Entrepreneur of the Year Finalist and CEO of Chevron College. Chevron employs 135 staff and delivers further and higher education programmes to over 15,000 students annually, through e-learning. Business Matters is a compelling podcast that delves into all aspects of entrepreneurship and bus ...
  continue reading
 
Artwork
 
The audio versions of the posts we publish on The ST Blog. Listen at your leisure and learn more about what makes technologies great and innovations meaningful. Get more from technology to get more from life with STMicroelectronics.
  continue reading
 
Loading …
show series
 
The Cyber Resilience Act (CRA) is a regulation designed to enhance cybersecurity for products mainly sold in Europe. It establishes common cybersecurity standards for hardware and software, requiring manufacturers to build security into their products from design through the products’ complete lifecycle. It’s this latter concept that can be troubli…
  continue reading
 
Send us a text In this episode of Embedded Insiders, we’re joined by Piyush Sevalia, Executive Vice President of Marketing at SiTime, to discuss the evolving landscape of precision timing solutions and the shift from quartz to silicon-based MEMS. Next, Ken is back with another edition of ICYMI, where he updates us on some of the top embedded news s…
  continue reading
 
It's been 80 years since the bombings of Hiroshima and Nagasaki, and the question of whether or not those bombings were justified has never been more contentious. That wasn't the case in the immediate aftermath: 85% of the American public approved the decision to bomb the cities in 1945, but this has dropped to 56% in more recent years, particularl…
  continue reading
 
Luke Hinds, CTO of Stacklok and creator of Sigstore, speaks with SE Radio's Brijesh Ammanath about the privacy and security concerns of using AI coding agents. They discuss how the increased use of AI coding assistants has improved programmer productivity but has also introduced certain key risks. In the area of secrets management, for example, the…
  continue reading
 
This episode is sponsored by XPLUS. On this episode we are diving into key changes in license enforcement in Dynamics 365 F&SCM with Bartosz Szpiech, vice president of product at XPLUS. We begin by discussing what has changed in the licensing model from AX 2012 to Dynamics 365 and how it is changing in the coming months in ways that will have impor…
  continue reading
 
While it may not be as intimidating as it once was, antenna design can still be a make-or-break aspect of your end product. Make the antenna too big, and the end users balk. Make the antenna too small, and the device won’t function properly (and end users will balk). To understand where and how the antenna design should begin, I spoke with Dermot O…
  continue reading
 
In episode 147 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security® (CIS®); and Kaitlin Drape, Hybrid Threat Intelligence Analyst at CIS. Together, they discuss how to actualize threat intel for the purpose of building effective de…
  continue reading
 
Early in Microsoft's FY26, managers in the sales and channel organizations have worked to explain important program changes that will impact partners in the Dynamics 365 and Power Platform space. At the recent Biz Apps Partner Executive Summit 2025 event, attendees heard from a variety of Microsoft representatives who presented sales strategy and t…
  continue reading
 
The first year of the siege of Leningrad that began in September 1941 marked the opening stage of a 900-day-long struggle for survival that left over a million dead. The capture of the city came tantalizingly close late that year, but Hitler paused to avoid costly urban fighting. Determined to starve Leningrad into submission, what followed was a w…
  continue reading
 
We go to meet the head of one of Osaka's best known underground racing crews. What we didn't know, is that he's allegedly involved in a notorious organized crime thing. This makes things tricky, and we see access slip through our fingers... for now. Watch Away Days documentaries at youtube.com/@awaydaystv See omnystudio.com/listener for privacy inf…
  continue reading
 
The most radical piece of legislation in the 20th century was Louisiana Governor Huey Long’s “Share Our Wealth Plan,” a bold proposal to confiscate individual fortunes exceeding $1 million to fund healthcare, free college education, and a guaranteed minimum income for families struggling through the Great Depression—a plan so radical it sparked the…
  continue reading
 
In this episode of the Responsible Bytes podcast, Dr. Zena Assaad and Tracey Spicer AM discuss the intersection of technology and society, focusing on the implications of tech oligarchs' influence on politics, the need for regulation in AI, and the challenges of gender bias in technology. They explore the responsibilities of social media platforms,…
  continue reading
 
TSMC recently announced its exit from the GaN space. Well, maybe “announced” is the wrong word, but they did let customers know that they will not be producing GaN devices going forward. Details are still coming out, so we don’t know exactly when that stoppage will occur. So what does that mean for TSMC partners who relied on them to produce their …
  continue reading
 
In episode 146 of Cybersecurity Where You Are, Tony Sager is joined by Angelo Marcotullio, Chief Information Officer at the Center for Internet Security®(CIS®); and Stephanie Gass, Sr. Director of Information Security at CIS. Together, they look back on periods of transition at CIS to discuss what security looks like for a security company. Here ar…
  continue reading
 
Edge AI was once a niche topic, but now it’s driving higher productivity and enabling smarter devices by deploying AI models directly on embedded systems at the network edge. These systems perform tasks like detecting people, body positions, or recognizing hand gestures with increasing accuracy and speed. In this episode of our special Executive In…
  continue reading
 
Wesley Beary of Anchor speaks with host Sam Taggart about designing APIs with a particular emphasis on user experience. Wesley discusses what it means to be an “API connoisseur”— paying attention to what makes the APIs we consume enjoyable or frustrating and then taking those lessons and using them when we design our own APIs. Wesley and Sam also e…
  continue reading
 
“‘Rope!’ muttered Sam[wise Gamgee]. ‘I knew I’d want it, if I hadn’t got it!’” Sam knew in the Lord of the Rings that the quest would fail without rope, but he was inadvertently commenting on how civilization owes its existence to this three-strand tool. Humans first made rope 50,000 years ago and one of its earliest contributions to the rise of ci…
  continue reading
 
Centralize, retain, and query high-volume, long-term security data across Microsoft and third-party sources for up to 12 years using Microsoft Sentinel’s new unified data lake. Correlate signals, run advanced analytics, and perform forensic investigations from a single copy of data—without costly migrations or data silos. Detect persistent, low-and…
  continue reading
 
The Intel® Core™ Ultra (Series 2) processor powered Surface Laptop 5G for Business is a Copilot+ PC. Integrated Intel® AI Boost supports up to 48 TOPS with Foundry Local for on-device AI inferencing. Stay securely connected with rearchitected 5G design—including six smart-switching antennas, eSIM and Wi-Fi 7—without relying on hotspots. As the firs…
  continue reading
 
Send us a text In this episode of Embedded Insiders, Rich and I sit down with Sid Sheth, CEO and co-founder of d-Matrix, to explore the ongoing generative AI boom—why it’s becoming increasingly unsustainable, and how d-Matrix is addressing the challenge with a chiplet-based compute architecture built specifically for AI inference. Next, Ken brings …
  continue reading
 
July 2025 marks the 100th anniversary of the Scopes Trial – a trial that exposed profound divisions in America over religion, education, and public morality. This was a legal case in Dayton, Tennessee, where high school teacher John Scopes was prosecuted for teaching evolution, violating the state's Butler Act. The Butler Act was a 1925 Tennessee l…
  continue reading
 
On this episode we are talking to some of the experts who presented at the Summit North America Roadshow event in Seattle this week, where members of the Dynamics 365 community came together to hear from Microsoft and their peers about D365 applications, Power Platform, and the broader technology landscape that they face. Microsoft kicked off the e…
  continue reading
 
Chris Love, co-author of the book Core Kubernetes, joins host Robert Blumen for a conversation about kubernetes security. Chris identifies the node layer, secrets management, the network layer, contains, and pods as the most critical areas to be addressed. The conversation explores a range of topics, including when to accept defaults and when to ov…
  continue reading
 
Compute in the automobile is (again) moving toward consolidation and away from the discrete nature of multiple processors around the vehicle. Is this a trend that’s going to stick? I guess it depends on who you ask. In this case, I asked Robert Moran, the GM & VP for Automotive Processors at NXP Semiconductors. As we add AI and autonomous drive to …
  continue reading
 
In episode 145 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager begin their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode: 01:14. Verizon's Data Breach Investigations Report as a source of enlightenment and humility 02:28. The use of gene…
  continue reading
 
In the late 1920s, Theodore Roosevelt Jr. and his younger brother Kermit, sons of President Theodore Roosevelt, wanted fame and glory apart from the family spotlight. They were seeking the “empty spots” on the maps, the areas that had yet to be explored and described by Westerners. From these remote places, they hoped to bring back exotic animals t…
  continue reading
 
Every year the core developers of Python convene in person to focus on high priority topics for CPython and beyond. This year they met at PyCon US 2025. Those meetings are closed door to keep focused and productive. But we're lucky that Seth Michael Larson was in attendance and wrote up each topic presented and the reactions and feedback to each. W…
  continue reading
 
“History is written by the winners.” This aphorism is catchy and it makes an important point that a lot of what we know about history was written with an agenda, not for the purposes of informing us. Unfortunately, it isn’t true. There are many times that the so-called “losers” wrote the histories remembered today. After the American Civil War, Sou…
  continue reading
 
Wide Bandgap technologies have been widely adopted around the world. As more customers are aiming for higher efficiency, greater power density, and reduced energy losses, design engineers are seeing the clear path forward is through Silicon Carbide or GaN technology. In this episode of our special Executive Insights series, host Riccardo Collura sp…
  continue reading
 
In episode 144 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Carlos Kizzee, Senior Vice President of Multi-State Information Sharing and Analysis Center® (MS-ISAC®) at the Center for Internet Security®(CIS®). Together, they discuss how the MS-ISAC's new funding model helps to carry on the character and culture of this c…
  continue reading
 
In this episode, Viktor Petersson sits down with Niklas Düster, co-lead of OWASP DependencyTrack and contributor to CycloneDX, to explore the realities of managing software bill of materials (SBOMs) at scale. Drawing on real-world experience, Niklas explains how DependencyTrack helps engineering teams analyze, monitor, and act on risks buried deep …
  continue reading
 
Jacob Visovatti and Conner Goodrum of Deepgram speak with host Kanchan Shringi about testing ML models for enterprise use and why it's critical for product reliability and quality. They discuss the challenges of testing machine learning models in enterprise environments, especially in foundational AI contexts. The conversation particularly highligh…
  continue reading
 
Thirty-three years after the fall of Napoleon Bonaparte’s Empire, his nephew (known as Napoleon III) became the first president of France before becoming emperor himself. Although he was a capable ruler and reformer, Napoleon III’s failed military campaigns, especially France’s loss to Germany in the Franco-Prussian War, led to his defeat, capture,…
  continue reading
 
Troubleshoot identity issues, investigate risky users and apps, and optimize Conditional Access policies using natural language—with built-in AI from Microsoft Security Copilot in Microsoft Entra. Instead of switching between logs, PowerShell, and spreadsheets, Security Copilot centralizes insights for faster, more focused action. Resolve compromis…
  continue reading
 
This episode is sponsored by Invoiced by Flywire. Advances in AR software are re-shaping financial management in ERP systems. Our guest on this episode, Flywire product lead Chris Couch, discusses the evolution of the invoice to cash story from an AR and payments perspective and how his team's solution for Dynamics 365 Business Central, Invoiced by…
  continue reading
 
Our final episode of the Favela Government chapter shows first hand the cycle of never-ending-violence in Rio's favelas. People we met are dead, sewers are wide open, and the gang war continues to keep civilians living in fear. Watch Away Days documentaries at youtube.com/@awaydaystv See omnystudio.com/listener for privacy information.…
  continue reading
 
Why do people listen to this podcast? Sure, they're looking for technical explorations of new libraries and ideas. But often it's to hear the story behind them. If that speaks to you, then I have the perfect episode lined up. I have Barry Warsaw, Paul Everitt, Carol Willing, and Brett Cannon all back on the show to share stories from the history of…
  continue reading
 
This episode is sponsored by Mekorma. On this episode we are examining the persistent digital gaps plaguing Accounts Payable teams, despite widespread adoption of AP software. Our guest is Mekorma's Director of Revenue Brendan Coffey, and we explore why disjointed workflows still exist, what those inefficiencies look like in practice, and how they …
  continue reading
 
Samuel Colvin, the CEO and founder of Pydantic, speaks with host Gregory M. Kapfhammer about the ecosystem of Pydantic’s Python frameworks, including Pydantic, Pydantic AI, and Pydantic Logfire. Along with discussing the design, implementation, and use of these frameworks, they dive into the refactoring of Pydantic and the follow-on performance imp…
  continue reading
 
Send us a text In this episode of Embedded Insiders, we’re joined by Bahar Sadeghi, Technical Director at CCC, and Alysia Johnson, CCC President, to talk about the latest expansion of the CCC Digital Key™ Certification Program, which now includes support for Bluetooth Low Energy (BLE) and Ultra-Wideband (UWB) technologies. To learn more or register…
  continue reading
 
John Adams is arguably America’s most underrated Founding Father. He has no currency that bears his image. No national holidays celebrate his birth. He’s nearly never named as anyone’s favorite president. And he has no dedicated memorial in Washington, D.C. Despite this, he was perhaps the most influential early American, rivaling Washington, Jeffe…
  continue reading
 
In this episode of the Responsible Bytes podcast, Dr. Zena Assaad speaks with Dr. Luba Zatsepina about nuclear deterrence, responsible nuclear behavior, and the implications of artificial intelligence in the context of nuclear security. They explore the psychological aspects of deterrence, cultural differences in understanding nuclear policy, and t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play