The leading podcast on how to build a successful open source company. Learn from the founders of HashiCorp, Chronosphere, Vercel, MongoDB, DBT, mobile.dev and more!
…
continue reading
Hashicorp Podcasts
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
Software developers, platform engineers, and sysadmin/operators listen to the biweekly Ambassador podcasts in order to learn how to build cloud platforms and create an effective developer experience (DevEx) for deploying container-based applications to Kubernetes. We also discuss best practices for releasing functionality via continuous delivery pipelines, and we investigate the latest developer tooling, API gateway technology (e.g Envoy), and service mesh implementations. We interview pract ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Host Mike Maples Jr. from venture capital firm Floodgate offers lessons from the rare startup super performers — BEFORE they were successful. Pattern Breakers features interviews with some of Silicon Valley’s most legendary entrepreneurs and thought leaders, including Netscape co-founder Marc Andreessen, LinkedIn founder Reid Hoffman, Instagram founders Kevin Systrom and Mike Kreiger, business maverick Mark Cuban, and Shopify co-founder Tobi Lütke.
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
This podcast covers basically everything cloud native. Not just the tech, but also people aspect, the organizational aspect, product, and a bit of marketing of the product. In every episode, the hosts will cover a theme, and will bring in multiple bold statements linked to the theme which they will debunk. Episodes are somewhere between 20 and 30 minutes, so they can be easily digested during lunch, your commute to work or home, in the gym, or after your weekly stand up :)
…
continue reading
Welcome to the Someone Elses Podcast. I'm your host Sunny, I will cover a wide range of topics in tech, from the cloud, latest news and updates and the laughs from reddit!
…
continue reading
Each episode will profile a business and attempt to examine the quality of that business in terms of value proposition, commercialization efficiency, competitive advantage, and reinvestment opportunities. Each episode is broken up into two parts. Part One includes fundamental analysis of that business, and Part Two includes a discussion with an expert of that business. Part One lays out the framework. Part Two puts meat on the bone.
…
continue reading
Inspired Execution is a podcast series where DataStax Chairman and CEO Chet Kapoor interviews technology leaders from global enterprises on their journeys to scaling multi-billion dollar businesses while inspiring their teams. You will hear their stories, their perspectives, and they will tell you what they wish they could’ve told the younger version of themselves, and much more. Because every business must be a mobile-led business, an AI-led business, and a data-led business, Inspired Execu ...
…
continue reading
Join Thomas McGannon on his journey to learn - what makes great partnerships? We explore stories of people working together throughout business building, investing, community and family. While much of this is brought to you through Thomas’ work as a limited partner investor, our hope is that this podcast project finds a way to share themes and lessons for anyone looking to learn from the best partnership has to offer.
…
continue reading
The Ops Show is a weekly YouTube show and podcast hosted by Tristan Pollock covering the wide world of workflows in DevOps and the greater developer experience. 👉 Never miss an episode // SUBSCRIBE: https://bit.ly/2PzTqAI 🚀 Join the community // SHIP TOGETHER: https://bit.ly/3fTPKpe // About CTO.ai // Easy to use like Heroku, but powerful like Kubernetes, the serverless infrastructure of CTO.ai is designed for the needs of fast-moving development teams who want to optimize what the business ...
…
continue reading
Alex Williams, founder of The New Stack, hosts "The New Stack Analysts," a biweekly round-table discussion covering The New Stack's latest data research, and topics related to app development and back-end services. Listen to our other TNS Podcasts on SoundCloud: The New Stack Makers: https://soundcloud.com/thenewstackmakers The New Stack Context: https://soundcloud.com/thenewstackcontext The New Stack @ Scale: https://soundcloud.com/thenewstackatscale
…
continue reading

1
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE),…
…
continue reading

1
D2DO278: The Future of HashiCorp Inside IBM
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10On today’s show, we talk to Armon Dadgar, co-founder and CTO of HashiCorp regarding HashiCorp’s future within IBM. We start with a quick recap of IBM’s acquisition of HashiCorp and then move on to the challenges of bringing a small, young tech company into a huge corporation that makes lots of its revenue on legacy... Read more »…
…
continue reading

1
HN791: Should You Build or Buy Your Automation Platform?
55:32
55:32
Play later
Play later
Lists
Like
Liked
55:32Perhaps the biggest question around adopting network automation is whether you should build a solution using open source tools and a lot of coding glue, or buy a network automation platform from a vendor and construct your automation solution on top of that. Either way has tradeoffs. Network engineer Lee Harper joins Heavy Networking to... Read mor…
…
continue reading

1
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collection of five high-severity firmware vulnerabilities in Dell’s ControlVault3 subsystem. These flaws impact over 100 Dell laptop models, including the Latitude, Precision, and XPS series—devices used widely …
…
continue reading

1
Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer records via an external customer service platform. While no sensitive financial or identity documents were compromised, attackers successfully accessed unspecified customer data—prompting both airlines to n…
…
continue reading

1
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
…
continue reading

1
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
…
continue reading

1
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
…
continue reading

1
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
…
continue reading

1
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
…
continue reading

1
NAN097: Automating Optical Networks
1:05:54
1:05:54
Play later
Play later
Lists
Like
Liked
1:05:54Optical networks are an essential component of networking, but don’t get much attention. Today we shine a spotlight on the intersection of optical networks and the software that automates them. Our guest is Michal Pecek, consultant and teacher in optical communication, whose work has transformed organizations including Google and Alcatel-Lucent (no…
…
continue reading

1
CHANGELOG - HCP Terraform, Vault MCP Server, & Vault Radar MCP Server
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09Michael Kosir (Developer Advocate) and Gautam Baghel (Partner Solutions Engineer) recap HashiDays: London and HashiDays: Singapore, discuss new features in HCP Terraform, HCP Vault Radar, and the release of MCP Servers for Vault and Vault Radar.Podcast Notes:- https://www.hashicorp.com/en/conferences/hashidays- https://www.hashicorp.com/en/blog/bui…
…
continue reading

1
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
…
continue reading

1
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
1:06:45
1:06:45
Play later
Play later
Lists
Like
Liked
1:06:45In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
…
continue reading

1
PP073: Identify Yourself: Authentication From SAML to FIDO2
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06From SAML to OAuth to FIDO2 to passwordless promises, we unpack what’s working—and what’s broken—in the world of identity and authentication. Today on the Packet Protector podcast, we’re joined by the always thoughtful and occasionally provocative Wolf Goerlich, former Duo advisor, and now a practicing CISO in the public sector. We also talk about …
…
continue reading

1
Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
…
continue reading

1
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
…
continue reading

1
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
…
continue reading

1
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
…
continue reading

1
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
1:26:28
1:26:28
Play later
Play later
Lists
Like
Liked
1:26:28In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
…
continue reading

1
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
…
continue reading

1
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more…
…
continue reading

1
Eric Schmidt: The Implications of Superintelligence
40:35
40:35
Play later
Play later
Lists
Like
Liked
40:35 Best known as the CEO who helped transform Google from a promising startup into one of the best businesses in human history, Eric Schmidt has recently become one of the most important voices in the global conversation about artificial intelligence. He’s co-written two books on the subject including the New York Times bestseller Genesis: Artificial…
…
continue reading

1
HN790: From Rule-Based to Goal-Based: Rethinking Autonomous AI Operations (Sponsored)
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45On Heavy Networking today, AI operations for networking. That is, how do we delegate some amount of responsibility for network operations to artificial intelligence? Cisco is our sponsor, and our guests are Omar Sultan, Director for Product Management of Automation and AI; and Javier Antich, Chief Mad Scientist for AI (yes, that’s his title!). We t…
…
continue reading

1
TNO037: The Next Era of Network Management and Operations
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF…
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading

1
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
…
continue reading

1
E178: Building Safer AI Agents with Portia AI
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44Emma Burrows is Co-Founder & CTO of Portia AI, the platform to build AI agents in regulated environments. Their open source Python SDK provides a developer framework for predictable and stateful agentic workflows. Portia AI has raised around $5M from investors including General Catalyst and First Minute Capital. In this episode, we dig into: Why th…
…
continue reading

1
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
…
continue reading

1
N4N035: Well Actually . . . Listener Comments and Corrections
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35We ask listeners for follow up and you’ve sent it in. On today’s show we respond to listener comments and corrections on tunneling, the link aggregation control protocol, link aggregation in general, and DHCP options. We also talk about the network engineering certification journey. If you’ve got a “Well, actually” or any other follow up,... Read m…
…
continue reading