We Cover the Cyberspace.
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Tune in to Cassia's podcast as we talk about all things Bluetooth. Learn about Bluetooth Technology and how today's enterprises are leveraging this technology to scale their IoT applications.
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Insightful audio from the global tech advisory firm.
…
continue reading
Welcome to "Analyze Happy: Crafting Your Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a data st ...
…
continue reading
The term "Jom Pakai IoT" in the Malay Language mean "Let's Do IoT" (English). The Podcast is meant to share the issues, challenges, and tips on how to start your Internet of Things Journey.
…
continue reading
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
…
continue reading
Podcast by Cycling Industry News
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
IoT on Tap is a weekly podcast focusing on the Internet of Things from a developers perspective. Chris Herrera and Randy Pitcher from Hashmap, Inc will be talking about how someone can reasonably go from the "hello world" of IoT to actually doing advanced analytics and machine learning on their device data. Music: https://www.bensound.com
…
continue reading
DM Radio is the world's longest-running show about data! Since 2008, we've interviewed the industry's brightest minds about AI, analytics, big data, cloud, data warehousing, digital transformation, Internet of Things (IoT), streaming and many other topics. Now broadcasting coast-to-coast, we're always looking for new voices. Send an email to [email protected]!
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
…
continue reading
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
…
continue reading
Community run ServerlessPodcast.com
…
continue reading
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
…
continue reading
Podcast by Quectel
…
continue reading
Real people, real stories - Ericsson Conversations. Internal podcasts about our people, products, and solutions.
…
continue reading
Welcome to the most electrifying technology podcast on the planet! Buckle up as we dive headfirst into the thrilling world of Blockchain, Bitcoin, Crypto, DeFi, Web3, Artificial Intelligence, IoT, and the Metaverse. We've got the hottest tech startups, the coolest CEOs, the most innovative founders, the most influential influencers and the savviest investors, all sharing their wisdom with us every single week. So buckle up and join your host Brandon Zemp for a technology deep-dive. Ready to ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Elevate the Edge helps companies understand what edge computing is and how the market will evolve. The podcast will help technology leaders build successful strategies that deliver business value by learning what works from the masters and how to avoid pitfalls. ElevateTheEdge.com
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
EE Journal's Amelia Dalton breaks down each week's EE news in an informative, fun and engaging style.
…
continue reading
D-Ron provides comprehensive CCTV security cameras and video surveillance systems to secure facilities. For two decades, we have been a trusted specialist, delivering tailored CCTV camera solutions in Singapore. Our CCTV for offices packages feature scalable video management software, analytics, and the networking equipment needed.
…
continue reading
Going “smart” is an aspiration of many cities around the world. Today, smart technology solutions are connecting citizens to their communities in new ways, solving issues to do with efficiency, sustainability and security. The City of Tomorrow Podcast series explores how different stakeholders in the Smart City ecosystem can come together to build safer, more efficient and sustainable cities of the future. Led by Digital Transformation Expert, Manuela Krull, who is also the Managing Director ...
…
continue reading
EngCast delivers the latest tips and insight into the telecommunication sector. With guest hosts and contributions from the Enghouse Networks team, EngCast is designed to help you keep your business at the cutting edge. For more information on Enghouse Networks visit https://enghousenetworks.com/
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Want to know how to build market-leading technology products? Want to know how to take a startup from nothing multi-billion dollar exit? Zero To Exit is the best business and technology podcast series that will share deep insights from industry leaders on how they successfully led multiple products and companies to critical success. We will invite guests who have been on the battlefield for many years and can share their unique insights on building products, sales machines, company culture, ...
…
continue reading

1
The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
…
continue reading

1
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
…
continue reading

1
Identity, AI, and the Unseen Threats in Healthcare Cybersecurity – with vCISO Jason Taule
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Healthcare IoT systems are increasingly targeted by cyber threats, necessitating a shift in strategy from isolated, organization-specific responses to a collaborative, ecosystem-wide approach. James McCarthy sits down with vCISO and 30-year information assurance and cybersecurity veteran Jason Taule. Taule brings important insights into the challen…
…
continue reading

1
Securely Bridging the Edge: Connecting Kepware KEPServerEX to Azure IoT Edge
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56Send us a text This episode explores the crucial steps involved in securely connecting PTC/Kepware's KEPServerEX, a leader in industrial connectivity, to Microsoft Azure IoT Hub through Azure IoT Edge. Learn how leveraging Azure IoT Edge as a gateway enhances security by isolating KEPServerEX from the internet and enables powerful edge processing c…
…
continue reading

1
SN 1020: Multi-Perspective Issuance Corroboration - IoT Done Right, France Phishes, Gmails E2EE
3:08:26
3:08:26
Play later
Play later
Lists
Like
Liked
3:08:26Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's go…
…
continue reading

1
Ep. 513 Clayton Menzel | Bitcoin Secured Networks with Babylon
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11For episode 513, Brandon Zemp is joined by Clayton Menzel, the Head of Business Development at Babylon, an ecosystem of developers, finality providers, and technology providers committed to building native use-cases for Bitcoin. Previously, he was Head of Strategy at Rio Foundation, where he led strategic initiatives before the organization was acq…
…
continue reading

1
Secure Your Spring Boot App: Spring Security, CORS, CSRF and Method-Level Annotations
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Secure Your Spring Boot App: Spring Security, CORS, CSRF and Method-Level Annotations https://knowledge.businesscompassllc.com/secure-your-spring-boot-app-spring-security-cors-csrf-method-level-annotations/ Are you tired of sleepless nights worrying about the security of your Spring Boot application? 😰 In today’s digital landscape, protecting your …
…
continue reading

1
Unlock High-Performance Apps: Fix Slow I/O with Event Demultiplexers
14:52
14:52
Play later
Play later
Lists
Like
Liked
14:52Unlock High-Performance Apps: Fix Slow I/O with Event Demultiplexers https://knowledge.businesscompassllc.com/unlock-high-performance-apps-fix-slow-i-o-with-event-demultiplexers/ Is your high-performance app crawling at a snail’s pace? 🐌 You’re not alone. Many developers face the frustrating challenge of slow I/O operations hampering their applicat…
…
continue reading

1
MCP Explained: Powering Smarter, Context-Aware AI Agents
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44MCP Explained: Powering Smarter, Context-Aware AI Agents https://knowledge.businesscompassllc.com/mcp-explained-powering-smarter-context-aware-ai-agents/ Have you ever wished for an AI assistant that truly understands you and your needs? One that doesn’t just respond to commands, but anticipates your desires and adapts to your unique situation? Ent…
…
continue reading

1
How Bounded Contexts Solve Chaos in Software Architecture: A Domain-Driven Design Deep Dive
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27How Bounded Contexts Solve Chaos in Software Architecture: A Domain-Driven Design Deep Dive https://knowledge.businesscompassllc.com/how-bounded-contexts-solve-chaos-in-software-architecture-a-domain-driven-design-deep-dive/ Imagine a bustling city without borders, where buildings overlap, streets intertwine chaotically, and residents struggle to n…
…
continue reading

1
Master SQL Joins: Link Customers to Orders and Build High-Performance Databases
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29Master SQL Joins: Link Customers to Orders and Build High-Performance Databases https://knowledge.businesscompassllc.com/master-sql-joins-link-customers-to-orders-and-build-high-performance-databases/ Are you tired of struggling with complex database relationships? 🤔 Do you find yourself getting lost in a sea of tables, unsure how to connect custom…
…
continue reading

1
REST or gRPC? The Ultimate Guide to Microservices Communication and System Design
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37REST or gRPC? The Ultimate Guide to Microservices Communication and System Design https://knowledge.businesscompassllc.com/rest-or-grpc-the-ultimate-guide-to-microservices-communication-and-system-design/ 🔍 Are you grappling with the complexities of microservices communication? You’re not alone. In today’s rapidly evolving tech landscape, choosing …
…
continue reading

1
How Hackers Use XSS to Steal Sessions & Inject Code — and How YOU Can Stop Them
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09How Hackers Use XSS to Steal Sessions & Inject Code — and How YOU Can Stop Them https://knowledge.businesscompassllc.com/how-hackers-use-xss-to-steal-sessions-inject-code-and-how-you-can-stop-them/ Have you ever felt uneasy about entering your personal information on a website? You’re not alone. In today’s digital world, cyber threats are lurking a…
…
continue reading

1
AWS Amplify Gen 2: Top 7 Upgrades You Need to Know
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26AWS Amplify Gen 2: Top 7 Upgrades You Need to Know https://knowledge.businesscompassllc.com/building-serverless-web-and-mobile-apps-with-aws-amplify-gen-2/ Are you tired of wrestling with complex backend infrastructure for your web and mobile apps? 🤔 Enter AWS Amplify Gen 2 – a game-changing solution that’s revolutionizing the way developers build …
…
continue reading

1
Compare and Contrast as well as Best Practices of Popular API Protocols - HTTP/HTTPS, REST API, GraphQL, Websocket, Webhook, MQTT, Soap, GRPC and Outro
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34Compare and Contrast as well as Best Practices of Popular API Protocols - HTTP/HTTPS, REST API, GraphQL, Websocket, Webhook, MQTT, Soap, GRPC and Outro https://knowledge.businesscompassllc.com/compare-and-contrast-as-well-as-best-practices-of-popular-api-protocols-http-https-rest-api-graphql-websocket-webhook-mqtt-soap-grpc-and-outro/ 🌐 In the ever…
…
continue reading

1
Compare and Contrast Web Servers - Apache, Nginx, TomCat, IIS, Websphere, and Open Light Speed
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02Compare and Contrast Web Servers - Apache, Nginx, TomCat, IIS, Websphere, and Open Light Speed https://knowledge.businesscompassllc.com/compare-and-contrast-web-servers-apache-nginx-tomcat-iis-websphere-and-open-light-speed/ Have you ever wondered why some websites load faster than others? 🚀 Or why certain web applications seem more secure and reli…
…
continue reading

1
The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meanin…
…
continue reading

1
How to design and implement in-app purchases with iOS Apps
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12How to design and implement in-app purchases with iOS Apps https://knowledge.businesscompassllc.com/how-to-design-and-implement-in-app-purchase-with-ios-apps/ 💡 Have you ever wondered how those little “Buy Now” buttons in your favorite iOS apps actually work? In-app purchases have revolutionized the way we interact with mobile applications, offerin…
…
continue reading

1
Compare and contrast different APIs - HTTP, REST, and WebSocket
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Compare and contrast different APIs - HTTP, REST, and WebSocket https://knowledge.businesscompassllc.com/compare-and-contract-different-apis-http-rest-and-websocket/ Have you ever found yourself lost in the sea of API options, unsure which one to choose for your project? You’re not alone. In today’s digital landscape, APIs are the backbone of moder…
…
continue reading

1
Build automated data pipeline in AWS using S3, Lambda, Glue Crawler, Glue ETL, Glue Workflow, RedShift, Aurora, DynamoDB, etc.
27:46
27:46
Play later
Play later
Lists
Like
Liked
27:46Build automated data pipeline in AWS using S3, Lambda, Glue Crawler, Glue ETL, Glue Workflow, RedShift, Aurora, DynamoDB, etc. https://knowledge.businesscompassllc.com/build-automated-data-pipeline-in-aws-using-s3-lambda-glue-crawler-glue-etl-glue-workflow-redshift-aurora-dynamodb-etc/ 🚀 Data pipelines are the unsung heroes of modern business intel…
…
continue reading
API Best Practices https://knowledge.businesscompassllc.com/best-practices-for-api-security/ In an era where APIs form the backbone of modern software applications, ensuring their security is paramount. With cyber threats evolving at an alarming rate, organizations can’t afford to leave their APIs vulnerable. But how can you fortify your APIs again…
…
continue reading

1
Comparison of AWS, Azure, and GCP Services
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54Comparison of AWS, Azure, and GCP Services https://knowledge.businesscompassllc.com/comparison-of-aws-azure-and-gcp-services/ Are you overwhelmed by the myriad of cloud service providers available today? 🤔 With tech giants like Amazon, Microsoft, and Google all vying for your attention, choosing the right cloud platform can feel like navigating a l…
…
continue reading

1
Webhooks Explained with GitHub and AWS: Build Real-Time Event-Driven Systems
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11Webhooks Explained with GitHub and AWS: Build Real-Time Event-Driven Systems https://knowledge.businesscompassllc.com/webhooks-explained-with-github-aws-build-real-time-event-driven-systems/ Have you ever wished your applications could instantly react to changes in other systems? 🚀 Imagine a world where your software automatically updates, notifies…
…
continue reading

1
Semantic Versioning Explained: MAJOR.MINOR.PATCH and How to Version Your Code Right
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Semantic Versioning Explained: MAJOR.MINOR.PATCH and How to Version Your Code Right https://knowledge.businesscompassllc.com/semantic-versioning-explained-major-minor-patch-how-to-version-your-code-right/ Have you ever found yourself drowning in a sea of version numbers, unsure which update to use or how to properly label your own software releases…
…
continue reading

1
SMTP, IMAP & Spam Filters Explained: Mail Server Architecture for System Designers
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05SMTP, IMAP & Spam Filters Explained: Mail Server Architecture for System Designers https://knowledge.businesscompassllc.com/smtp-imap-spam-filters-explained-mail-server-architecture-for-system-designers/ Have you ever wondered how your emails magically appear in your inbox, accessible from any device, while spam stays mysteriously at bay? 🤔 Welcome…
…
continue reading

1
Erasure Coding for Distributed Systems: Efficient, Reliable Storage at Scale
16:57
16:57
Play later
Play later
Lists
Like
Liked
16:57Erasure Coding for Distributed Systems: Efficient, Reliable Storage at Scale https://knowledge.businesscompassllc.com/erasure-coding-for-distributed-systems-efficient-reliable-storage-at-scale/ Imagine a world where data loss is a thing of the past, and storage efficiency reaches unprecedented levels. 🚀 Welcome to the realm of Erasure Coding in Dis…
…
continue reading

1
Optimize REST APIs Like a Pro: Rate Limiting & Throttling Demystified
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Optimize REST APIs Like a Pro: Rate Limiting & Throttling Demystified https://knowledge.businesscompassllc.com/optimize-rest-apis-like-a-pro-rate-limiting-throttling-demystified/ Have you ever wondered why your API requests suddenly start failing after a certain number of calls? 🤔 Or perhaps you’ve experienced the frustration of your application sl…
…
continue reading
The annual RSA Conference on information security is coming up and it arrives during a very active security market. Analysts Garrett Bekker, Dan Kennedy and research director Scott Crawford return to the podcast to discuss what they expect to see in San Franscisco with host Eric Hanselman. The largest transaction ever in the information security wo…
…
continue reading

1
Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
…
continue reading

1
Beyond the Blueprint: Learning Cyber Resilience Together
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
…
continue reading

1
EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
…
continue reading

1
Ep. 512 Theodore Agranat | In-game Digital Assets with Gunzilla Games
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35For episode 512, Brandon Zemp is joined by Theodore Agranat of Gunzilla Games, a game developer founded on the desire to innovate, break down technological boundaries, and create gaming experiences that players will remember forever. In Early 2024, they will launch Off The Grid (OTG), a next-gen cyberpunk Battle Royale for PC, PS5 and Xbox Series. …
…
continue reading

1
Brazil Special: Reinventing Cold Chain Logistics with IoT
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02When transporting refrigerated goods across South America, it is essential to have a reliable cold chain management solution. In Brazil, where 30% of transported cargo requires precise temperature control, a single point of failure can result in losses worth millions. Neokohm CTO Luis Lorenzi joins this Portuguese podcast special to explain how his…
…
continue reading

1
From Backup to Hot Standby: Mastering Cloud Disaster Recovery (AWS, Azure, GCP)
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25From Backup to Hot Standby: Mastering Cloud Disaster Recovery (AWS, Azure, GCP) https://knowledge.businesscompassllc.com/from-backup-to-hot-standby-mastering-cloud-disaster-recovery-aws-azure-gcp/ 📊 In today’s digital landscape, data is the lifeblood of businesses. But what happens when disaster strikes? From natural calamities to cyber-attacks, th…
…
continue reading

1
The Algorithm Behind Big Data Giants: HyperLogLog Step-by-Step with Code
20:39
20:39
Play later
Play later
Lists
Like
Liked
20:39The Algorithm Behind Big Data Giants: HyperLogLog Step-by-Step with Code https://knowledge.businesscompassllc.com/the-algorithm-behind-big-data-giants-hyperloglog-step-by-step-with-code/ 🔍 Ever wondered how tech giants like Google, Facebook, and Amazon handle the mind-boggling task of counting unique visitors across their vast platforms? Enter Hype…
…
continue reading

1
Decentralized & Smart: The Future of Blockchain with AI & Real Code Examples
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32Decentralized & Smart: The Future of Blockchain with AI & Real Code Examples https://knowledge.businesscompassllc.com/decentralized-smart-the-future-of-blockchain-with-ai-real-code-examples/ 🚀 Blockchain and Artificial Intelligence are two of the most groundbreaking technologies of our time. But what happens when these titans join forces? Imagine a…
…
continue reading

1
Think Binary: How This Classic Algorithm Supercharges Modern Systems
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12Think Binary: How This Classic Algorithm Supercharges Modern Systems https://knowledge.businesscompassllc.com/think-binary-how-this-classic-algorithm-supercharges-modern-systems/ Have you ever wondered how your smartphone can search through thousands of contacts in the blink of an eye? Or how search engines sift through billions of web pages almost…
…
continue reading

1
Spring MVC Made Simple: Build Scalable Java Apps with IoC, DI & Annotations
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37Spring MVC Made Simple: Build Scalable Java Apps with IoC, DI & Annotations https://knowledge.businesscompassllc.com/spring-mvc-made-simple-build-scalable-java-apps-with-ioc-di-annotations/ 🌱 Are you tired of wrestling with complex Java web applications? Do you find yourself drowning in a sea of code, struggling to create scalable and maintainable …
…
continue reading

1
Embedded Software Academy: How Beningo is Educating the Next Generation of Embedded Developers
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Embedded Software is the name of the game this week my friends! My podcast guest is Jacob Beningo of the Beningo Embedded Group. Jacob and I chat about what the three elements of embedded software Jacob believes everyone should know and how each of these elements can affect development. We also explore what motivated Jacob to develop the Embedded S…
…
continue reading

1
Reverse Proxy vs Forward Proxy: How Tech Giants Manage Global Traffic
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Reverse Proxy vs Forward Proxy: How Tech Giants Manage Global Traffic https://knowledge.businesscompassllc.com/reverse-proxy-vs-forward-proxy-how-tech-giants-manage-global-traffic/ Have you ever wondered how tech giants like Google, Amazon, and Facebook manage the colossal amount of global traffic flowing through their networks? 🌐 The secret lies i…
…
continue reading

1
The System Design Behind Global Payments: Scale, Security & Speed Explained
13:01
13:01
Play later
Play later
Lists
Like
Liked
13:01The System Design Behind Global Payments: Scale, Security & Speed Explained https://knowledge.businesscompassllc.com/the-system-design-behind-global-payments-scale-security-speed-explained/ Picture this: millions of transactions happening every second, money zipping across borders at lightning speed, and a complex web of systems working tirelessly …
…
continue reading

1
Crush Latency in Node.js & Java: A Deep Dive into Non-Blocking I/O
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Crush Latency in Node.js & Java: A Deep Dive into Non-Blocking I/O https://knowledge.businesscompassllc.com/crush-latency-in-node-js-java-a-deep-dive-into-non-blocking-i-o/ Are you tired of your Node.js and Java applications crawling at a snail’s pace? 🐌 Latency can be the silent killer of performance, frustrating users and hampering your system’s …
…
continue reading

1
Implementing Automated Code Build, Test, and Deployment Using AWS CI/CD Services
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23Implementing Automated Code Build, Test, and Deployment Using AWS CI/CD Services https://knowledge.businesscompassllc.com/implementing-automated-code-build-test-and-deployment-using-aws-ci-cd-services/ Are you tired of manual code deployments that eat up your time and introduce errors? 🤔 Imagine a world where your code flows seamlessly from develop…
…
continue reading

1
Session vs. Token Authentication: What’s Best for Securing Your Web App?
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50Session vs. Token Authentication: What’s Best for Securing Your Web App? https://knowledge.businesscompassllc.com/session-vs-token-authentication-whats-best-for-securing-your-web-app/ 🔐 In the ever-evolving landscape of web security, choosing the right authentication method can make or break your application’s defenses. Are you grappling with the d…
…
continue reading

1
The 2024 IC3 Report: Unpacking Record Cybercrime Losses
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
…
continue reading

1
Ep. 511 Neil Fitzhugh | Bitcoin-native Smart Contracts with TAP Protocol
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18For episode 511, Head of Marketing Neil Fitzhugh joins Brandon Zemp to discuss TAP Protocol, which is enabling advanced programmability, bringing DeFi, smart contracts, and decentralized applications directly to the Bitcoin network. Its mission is to create the most secure and programmable infrastructure on Bitcoin, transforming it from a static st…
…
continue reading

1
Single Thread, Massive Power: How Node.js Handles Async Like a Champ 💪
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13Single Thread, Massive Power: How Node.js Handles Async Like a Champ 💪 https://knowledge.businesscompassllc.com/single-thread-massive-power-how-node-js-handles-async-like-a-champ-%f0%9f%92%aa/ Have you ever wondered how Node.js manages to handle thousands of concurrent connections with just a single thread? 🤔 It’s like watching a master juggler kee…
…
continue reading

1
Unlock True Parallelism in Node.js with Worker Threads 🚀 | Fix CPU Bottlenecks Fast
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Unlock True Parallelism in Node.js with Worker Threads 🚀 | Fix CPU Bottlenecks Fast https://knowledge.businesscompassllc.com/unlock-true-parallelism-in-node-js-with-worker-threads-%f0%9f%9a%80-fix-cpu-bottlenecks-fast/ Are you tired of your Node.js applications hitting a performance wall? 🛑 Despite its efficiency in handling I/O operations, Node.js…
…
continue reading

1
SQL Injection EXPLAINED: How Hackers Steal Data—and How to Stop Them 🛡️
17:08
17:08
Play later
Play later
Lists
Like
Liked
17:08SQL Injection EXPLAINED: How Hackers Steal Data—and How to Stop Them 🛡️ https://knowledge.businesscompassllc.com/sql-injection-explained-how-hackers-steal-data-and-how-to-stop-them-%f0%9f%9b%a1%ef%b8%8f/ Imagine a world where your sensitive data—credit card numbers, personal information, and confidential business details—are all up for grabs. 😱 Thi…
…
continue reading