The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
Microservices Podcasts
We talk to experienced architects and technology leaders about the architectural choices they’ve made — the good, the bad, and the costly. From scaling systems to integrating legacy platforms, from misaligned domains to governance gaps, we discuss how architecture impacts technical debt. You’ll hear honest stories of architectural missteps, what teams learned from them, and how they built systems designed not just to work, but to last.
…
continue reading
A podcast discussing everything cloud computing, serverless, microservices, and distributed systems that, each episode, starts with a discussion of a single academic paper and expands out to related academic research and industrial products and systems.
…
continue reading
Rawkode Live is a live, hands-on, stream that aims to teach you how to use the latest, freshest, shiniest Cloud Native and Kubernetes tools. This is an edited, sans live demo, version of this stream. Sharing with you the thoughts and ideas of the best founders, maintainers, and contributors within the Cloud Native eco-system.
…
continue reading
Learn the latest data science updates in the tech world.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The Tuesday Crew Returns in this Mecha and Mechwarrior inspired TTRPG. Mercenaries (Contractors) to Avari Military Solutions, the team find themselves involved in locking down a rebellion on a far rim system. How will this rag tag group of ”Solidiers” manage on the far rim, where the locals hate you and the corporation wont pay your bonus? Find out in Lancer; Its Just Business.
…
continue reading
Keep up with software engineering best practices and tradeoffs from tryexceptpass.org and around the web.
…
continue reading
eCommerce Talks is the latest podcast series by Divante. We discuss tech, current trends, and insights from around the eCommerce world. It features industry experts, business leaders, and interesting influencers who share their knowledge.
…
continue reading
A weekly podcast that helps to demystify technical concepts in plain English in under two minutes.
…
continue reading
Curious about what developer experience is and why it is important? Join Chris Weichel and Pauline Narvas with special guests as they deep dive into the ins and outs of developer experience.
…
continue reading
Software Craftsmanship Barcelona is a two days event which aims to attract and connect software development professionals, who feel the passion for their work and share the values and principles of the Craftsmanship movement.
…
continue reading
The Loosely Coupled Show is where James Hickey and Derek Comartin share their strongly held opinions about topics relating to software architecture and design: HTTP REST design, asynchronous messaging patterns, distributed systems, microservices, SOA, Domain-driven design, etc. From time-to-time, we chat with industry experts who have specific specializations within the field of software development & design.
…
continue reading
Boost your Software Engineering, DataOps, and SRE, career. podcast_v0.1 decodes the latest vital research, delivering essential insights in an easy audio format. Stay ahead of trends, inform your technical decisions, and accelerate your professional growth. Essential knowledge for curious engineers.
…
continue reading
The IT podcast where Grzegorz Godlewski, Artur Wolny and Marek Urbanowicz, together with their guests, talk about topics related to the world of IT. We are looking for ways of doing things right and having fun with it doing so. Software, architecture, soft skills, teamwork (and other, crazy, buzzwords).
…
continue reading
Kubernetes Bytes is a podcast bringing you the latest from the world of cloud native data management. Hosts Ryan Wallner and Bhavin Shah come to you from Boston, Massachusetts with experienced backgrounds in cloud-native tech. They'll be sharing their thoughts on recent cloud native news and talking to industry experts about their experiences and challenges managing the wealth of data in today's cloud-native ecosystem.
…
continue reading
Listen in as we discuss APIs, the web and network based software. In each episode we take on a new topic and try valiantly to find a shared understanding. Sometimes with guests.
…
continue reading
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
…
continue reading
Welcome to Craft Beer and Data™️, the show with data conversations that will leave you thirsty for more. In this Podcast, Talend's Director of Developer Evangelism, Nick Piette, and Mark Balkenende, Director of Technical Marketing, talk about anything from the importance of datavaults methodology to batch vs. streaming. Sit back, grab a beer, and enjoy!
…
continue reading
Andrzej Krzywda from Arkency talking about all things software, including but not limited to Ruby, JS, OOP, DDD, CQRS, AI, business, sales, marketing
…
continue reading
Recordings of presentations made at monthly meetings of the Adelaide .NET User Group
…
continue reading
The Art Of Building Sofware is about teaching you strategies for building better software.
…
continue reading
Wix Engineering Podcast. For developers, by Wix Engineering: Architecture, scaling, mobile and web development, management and more. The stories and the insights of our very own engineers, shoulder to shoulder, with some of the most prominent voices in the tech community.
…
continue reading
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
…
continue reading
Cockroach Lab’s Big Ideas in App Architecture is a podcast for architects and engineers building modern data-intensive applications and systems. In every weekly episode, an innovator joins the show to share useful insights from their experiences building reliable, scalable, maintainable systems. Welcome to Big Ideas in App Architecture!
…
continue reading
Ready to leverage resources outside your firewall? The Doppler podcasts cover all things cloud while focusing on how to prepare the traditional enterprise to look beyond conventional computing. We talk about what’s new, what’s working, and have expert guests who provide the advice you need to be successful in the clouds. Read by over 10,000 IT leaders, The Doppler weekly email reports and quarterly print editions answer your critical cloud questions and keep you informed on the cloud trends ...
…
continue reading
The New Relic Modern Software Podcast is designed to share insights and perspectives on the most important things happening in the world of software analytics, cloud computing, application monitoring, development methodologies, programming languages, and related topics. New Relic execs, customers, and industry experts participate in lively discussions on how to create, deliver, and manage great software experiences. New Relic, because you need to know what's happening in your software and sy ...
…
continue reading
1
How To Power AI, Analytics, and Microservices Using the Same Data
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51This story was originally published on HackerNoon at: https://hackernoon.com/how-to-power-ai-analytics-and-microservices-using-the-same-data. Adam Bellemare explains how data streaming unifies AI, analytics, and microservices—solving data access challenges through real-time, scalable pipelines. Check more stories related to data-science at: https:/…
…
continue reading
1
Securing Java Microservices with Zero Trust Architecture
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38This story was originally published on HackerNoon at: https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture. Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading
In this Foojay Podcast, we're exploring a critical topic that's becoming increasingly important in our industry: developing sustainable software that is both performant and environmentally friendly. At the Devoxx and JFall conferences, I had fascinating conversations about how we as Java developers can make a real impact on both our cloud costs and…
…
continue reading
1
Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
…
continue reading
1
When "Just Following Guidelines" Isn't Enough
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
…
continue reading
1
When APIs Talk Too Much – A Lesson About Hidden Paths
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
…
continue reading
1
Why the MITRE ATT&CK Framework Actually Works
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10This story was originally published on HackerNoon at: https://hackernoon.com/why-the-mitre-attandck-framework-actually-works. ATT&CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
OpenJDK Evolutions plus Tips and Tricks (#83)
47:12
47:12
Play later
Play later
Lists
Like
Liked
47:12Welcome to another episode of the Foojay Podcast! Just like in the previous episode, I bring you conversations from two of Europe's premier Java conferences - Devoxx in Belgium and JFall in the Netherlands. At these conferences, I had the opportunity to speak with members of the Java community about topics ranging from the evolution of Java itself …
…
continue reading
1
Security Is A Practice, Not A One-Time Project
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40This story was originally published on HackerNoon at: https://hackernoon.com/security-is-a-practice-not-a-one-time-project. Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11This story was originally published on HackerNoon at: https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. Check more stories rela…
…
continue reading
1
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22This story was originally published on HackerNoon at: https://hackernoon.com/data-platform-as-a-service-a-three-pillar-model-for-scaling-enterprise-data-systems. DPaaS solves the enterprise data scalability paradox with declarative policies, multi-plane architecture, and continuous reconciliation. Check more stories related to data-science at: http…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-rag-improves-database-management. RAG is transforming database management with accurate retrieval, real-time insights, and natural language querying to help teams manage and understand data inte Check more stories related to data-science at: https://hackernoon.com/c/da…
…
continue reading
1
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26This story was originally published on HackerNoon at: https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. Check more stories rel…
…
continue reading
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/componentcast Join the Discord! - https://discord.gg/NVmHBXNfBX Buy some Merch! - https://component-cast.myspreadshop.co.uk/ ***************************************** Cast: Commissar Roach as our Game Host Midgeman as Eoghan "Padre" O'Kirwan - @Midgeman RivalzoneGaming as Harrison "D…
…
continue reading
1
OpenJDK Projects (Leyden, Babylon, Panama) and TornadoVM (#82)
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48In this Foojay Podcast, we're diving deep into some of the most exciting developments happening within the OpenJDK and TornadoVM projects. At the Devoxx and JFall conferences, we spoke with several speakers and visitors about some of the major themes that are shaping the future of Java development. The first guest is Moritz Halbritter from the Spri…
…
continue reading
1
Take A Virtual Tour of Surveillance Tech Along the U.S./Mexico Border
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56This story was originally published on HackerNoon at: https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border. We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. Check more stories related to cybersecurity at:…
…
continue reading
1
Interserve case: when communication debt becomes a security breach
16:46
16:46
Play later
Play later
Lists
Like
Liked
16:46What happens when a company’s biggest vulnerability isn’t its software, but its communication? In this episode of Technical Debt: Design, Risk and Beyond, hosts Maxim Silaev and Nikita Golovko explore the collapse of Interserve, a UK-based outsourcing and construction giant that suffered a major data breach in 2020, exposing the personal data of ov…
…
continue reading
1
I Built a Password Tool in 2 Weekends (And Got 1,000 Users)
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
1
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
…
continue reading
1
GodLoader Malware Loader: What You Need to Be Aware of
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/componentcast Join the Discord! - https://discord.gg/NVmHBXNfBX Buy some Merch! - https://component-cast.myspreadshop.co.uk/ ***************************************** Cast: Commissar Roach as our Game Host Midgeman as Eoghan "Padre" O'Kirwan - @Midgeman RivalzoneGaming as Harrison "D…
…
continue reading
1
Maven 4 - The Future of Java Build Automation (#81)
1:06:59
1:06:59
Play later
Play later
Lists
Like
Liked
1:06:59Maven 4 is approaching its release, bringing many improvements to the build tool powering millions of Java projects. In this Foojay Podcast episode, we talk about Apache Maven 4, a significant milestone that has been years in the making. Maven has been the backbone of Java dependency management and build automation since the early 2000s; however, t…
…
continue reading
1
From Data Fragmentation to Billion-Dollar Insights: The Vision of Manish Ravindra Sharath
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19This story was originally published on HackerNoon at: https://hackernoon.com/from-data-fragmentation-to-billion-dollar-insights-the-vision-of-manish-ravindra-sharath. Manish Ravindra Sharath unified fragmented enterprise data using PySpark & cloud-native systems,boosting efficiency 99% and driving multimillion-dollar growth. Check more stories rela…
…
continue reading
1
Building a Layered Defense Against Web Scraping
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43This story was originally published on HackerNoon at: https://hackernoon.com/building-a-layered-defense-against-web-scraping. Discover how a three-layer data-protection model blends AI, risk-based gating, and legal context to stop web scraping while preserving user trust. Check more stories related to data-science at: https://hackernoon.com/c/data-…
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
What Every E-Commerce Brand Should Know About Prompt Injection Attacks
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
…
continue reading
1
How IPinfo Turns Registry Data into Real Intelligence
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
How to Protect Your Kids Online When They're Playing Video Games
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
1
Security That Moves at Dev Speed: Practical Ways to Shift Left
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
…
continue reading
1
Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
…
continue reading
1
Cosmo: The Graph Visualization Tool Built for Your Terminal
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56This story was originally published on HackerNoon at: https://hackernoon.com/cosmo-the-graph-visualization-tool-built-for-your-terminal. Cosmo is a terminal-based interactive graph visualizer that automatically layouts and displays complex data structures for quick exploration. Check more stories related to data-science at: https://hackernoon.com/c…
…
continue reading
This is part 2 of the interviews recorded on September 19th, 2025, at the first AI4Devs Conference (https://amsterdam.ai4devs.io/) in Amsterdam. In Part 1, we explored many AI-related topics as libraries, security, infrastructure, use cases, and more. In this second part, we'll dive into data science, tools for better AI development, Java in the cl…
…
continue reading
1
Beyond Dashboards: How AI Is Redefining Developer Productivity with Adeeb Valiulla
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33In this episode of ShipTalk, host Dewan Ahmed sits down with Adeeb Valiulla, a leader in developer productivity and engineering excellence at Harness, to explore how AI is transforming the very definition of software productivity. Adeeb shares his journey from building early engineering metrics systems at Sensormatic to leading developer efficiency…
…
continue reading
1
How Businesses Are Turning Space Data into a Tool for Risk, Resilience, and Sustainability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06This story was originally published on HackerNoon at: https://hackernoon.com/how-businesses-are-turning-space-data-into-a-tool-for-risk-resilience-and-sustainability. Satellites are reshaping insurance, supply chains, and sustainability—here’s how space data became core to global business strategy. Check more stories related to data-science at: htt…
…
continue reading
1
How Data Innovation Changed a State’s Infrastructure Engine
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44This story was originally published on HackerNoon at: https://hackernoon.com/how-data-innovation-changed-a-states-infrastructure-engine. Deepak Chanda modernized Massachusetts’ infrastructure systems through data-driven process innovation—turning inefficiency into lasting operational reform. Check more stories related to data-science at: https://ha…
…
continue reading
1
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
…
continue reading
1
Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
…
continue reading
1
The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
…
continue reading
1
Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
Secure boot: debt, trust, and the future of firmware security
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36Secure Boot was designed to solve one of the most fundamental security problems in computing: how to ensure that only trusted software starts your machine. But like any architectural decision, it came with its own trade-offs, and its own technical debt. In this episode of Technical Debt: Design, Risk and Beyond, Maxim Silaev and Nikita Golovko expl…
…
continue reading
1
INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
…
continue reading
1
Building Resilient Operations Through ITIL-Based Incident Management
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
…
continue reading
On September 19th, 2025, the first AI4Devs conference (https://amsterdam.ai4devs.io/) took place in Amsterdam. I grabbed my camera and microphone to talk with speakers and attendees about the revolution in AI-powered coding and application development. In this first part, we'll explore Spring libraries, security, infrastructure and scaling, real-wo…
…
continue reading
1
Quantum Photons Deliver the Ultimate Random Number Generator
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49This story was originally published on HackerNoon at: https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator. HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices Check more stories related to cybersecurity at: ht…
…
continue reading
1
Inside the AI-Driven Supply Chain: How Scribe Security Is Building Trust at Code Speed
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-ai-driven-supply-chain-how-scribe-security-is-building-trust-at-code-speed. Scribe Security’s ScribeHub combines signed provenance, SBOMs, and AI agents to secure AI-generated code and meet global supply chain regulations. Check more stories related to cybersecu…
…
continue reading