For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Enterprise Software Defenders Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
…
continue reading
Ransomware, cyberwarfare, supply chain hacks—today’s headlines are full of dire warnings related to cybersecurity and digital transformation. But where are the solutions? LET’S CONVERGE is a podcast dedicated to exploring the ways top business and tech leaders are meeting today’s complex security challenges. Join thought leaders from Tanium, an industry innovator in security software, as they discuss the latest cyber trends and strategies with C-suite executives, CISOs, CIOs, and an array of ...
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
…
continue reading

1
Open-source is for the people, by the people
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14Travis Oliphant, creator of NumPy and SciPy, joins Ryan to explore the development of Python as a data science tool, the evolution of these foundational libraries, and the importance of community and collaboration in open-source projects, including Travis’ current work to support sustainable open-source through the OpenTeams Incubator. Episode note…
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
Securing the Energy Grid from Cyber Threats with Duke Energy CSO Martin Strasburger
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18On the 30th episode of Enterprise AI Defenders, hosts Mike Britton and Evan Reiser talk with Martin Strasburger, Senior Vice President and Chief Security Officer at Duke Energy. Martin shares how Duke, serving over 11 million customers across the Southeast, protects vital physical and digital infrastructure in a time of accelerating energy demand a…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
From punch cards to prompts: a history of how software got better
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12SPONSORED BY AWS Ryan welcomes Darko Mesaroš, Principal Developer Advocate at AWS and all around computer history buff, to chat about history of software development improvements and how they made developers made more productive. They discuss the technologies and breakthroughs that created greater abstractions on the underlying bit manipulations an…
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
Svelte was built on “slinging code for the sheer love of it”
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Rich Harris, creator of Svelte and software engineer at Vercel, joins Ryan on the show to dive into the evolution and future of web frameworks. They discuss the birth and growth of Svelte during the rise of mobile, the challenges of building robust and efficient web applications, how companies can back more open-source community projects, and the d…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading

1
Learning in the flow: Unlocking employee potential through continuous learning
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01In this episode of Leaders of Code, Stack Overflow CEO Prashanth Chandrasekar and Christina Dacauaziliqua, Senior Learning Specialist at Morgan Stanley, talk about the importance of experiential learning in fast-paced environments. They emphasize the value of creating intentional learning environments where innovative tools meet collaborative commu…
…
continue reading

1
Robots in the skies (and they use Transformer models)
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50Ryan welcomes Nathan Michael, CTO at Shield AI, to discuss what AI looks like in defense technologies, both technically and ethically. They cover how the Hivemind technology works in coordinating the autonomous decisions of drones in the field while keeping humans in the loop, whether Shield AI is building Terminators, and how software security wor…
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
The server-side rendering equivalent for LLM inference workloads
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44Ryan is joined by Tuhin Srivastava, CEO and co-founder of Baseten, to explore the evolving landscape of AI infrastructure and inference workloads, how the shift from traditional machine learning models to large-scale neural networks has made GPU usage challenging, and the potential future of hardware-specific optimizations in AI. Episode notes: Bas…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More... - SWN #503
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-503
…
continue reading
Ryan welcomes Evan You, the creator of Vue.js, to explore the origins of Vue.js, the challenges faced during its development, and the project’s growth over a decade. They dive into potential integrations for AI, future developments for Vue.js, and the sustainability of open-source projects. Episode notes: Vue.js is a progressive JavaScript framewor…
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
AI isn’t stealing your job, it’s helping you find it
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Wenjing Zhang, VP of Engineering, and Caleb Johnson, Principal Engineer at LinkedIn, sit down with Ryan to discuss how semantic search and AI have transformed LinkedIn’s job search feature. They explore the engineering efforts behind transitioning from keyword-based search and the impact of AI models on LinkedIn’s job seekers and employers. Episode…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading

1
Python: Come for the language, stay for the community
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36Ryan welcomes Paul Everitt, developer advocate at JetBrains and an early adopter of Python, to discuss the history, growth, and future of Python. They cover Python’s pivotal moments and rise alongside the internet, the increased adoption from transitions like Python 2 to Python 3, and the significant role Python plays in academia and data science t…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading

1
Defending the Railroad: AI Risk, Rigor, and Resilience with CN CISO Vaughn Hazen
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14On the 29th episode of Enterprise AI Defenders, host Mike Britton, Chief Information Security Officer at Abnormal AI, talks with Vaughn Hazen, Chief Information Security Officer at the Canadian National Railway Company. CN is Canada’s largest rail operator and the only one that spans the Atlantic, Pacific, and Gulf coasts, running over 20,000 mil…
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Richard Bird, Nick Mistry - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading

1
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
…
continue reading

1
Being unambiguous in what you want: the software engineer in a vibe coding world
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43Quinn Slack, CEO and co-founder of Sourcegraph, joins the show to dive into the implications of AI coding tools on the software engineering lifecycle. They explore how AI tools are transforming the work of developers from syntax-focused tasks to higher-level design and management roles, and how AI will integrate into enterprise environments. Episod…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading

1
Hacking Washing Machines - PSW #885
1:58:07
1:58:07
Play later
Play later
Lists
Like
Liked
1:58:07In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
…
continue reading

1
The innovation, leadership, and team agility inside U.S. Bank’s cloud journey
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19U.S. Bank has undergone a significant digital transformation, implementing a multi-cloud strategy to accelerate innovation and improve customer-focused development. Operating in a highly regulated environment, the bank must navigate the challenge of balancing innovation with strict compliance requirements while meeting the evolving demands and need…
…
continue reading

1
Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
…
continue reading

1
Popup Porn, LoveSense, Tea, Fire Ant, Scatterede Spider, AI Pricing, Josh Marpet... - SWN #498
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06Popup Porn, LoveSense, Tea, Fire Ant, Scatterede Spider, AI Pricing, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-498
…
continue reading

1
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
…
continue reading

1
That custom gift for your mom takes more work than you think
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59Etsy is a global marketplace that keeps human connection at the heart of commerce. Connect with Mahir on LinkedIn. This week’s shoutout goes to user jsignell, who won a Populist badge for their answer to How do I tell if a column in a pandas dataframe is of type datetime? How do I tell if a column is numerical?. See Privacy Policy at https://art19.…
…
continue reading

1
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
1:42:01
1:42:01
Play later
Play later
Lists
Like
Liked
1:42:01Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
…
continue reading

1
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
1:42:01
1:42:01
Play later
Play later
Lists
Like
Liked
1:42:01Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
…
continue reading

1
Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More... - SWN #497
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-497
…
continue reading