Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

NPM Podcasts

show episodes
 
Artwork

1
Ministry Monday

National Association of Pastoral Musicians (NPM)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An indispensable resource for all those engaged in ministry, this weekly podcast covers important practical issues for today's parish ministers.
  continue reading
 
Artwork

1
Mean Time To Insight

Enterprise Management Associates + APMdigest

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Plugging In The Holes

Maria Campbell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A show in which we address various issues that may come up with the technological tools that we depend on in our work or daily lives and how we can overcome them before they overcome us! We also cover JavaScript applications and workflows, both front end and backend (Node.js, npm, MongoDB, to name a few). And we have started introducing Python related subject matter as well. Please visit the blog on our website to view transcripts and embeds of our podcast episodes. Support this podcast: htt ...
  continue reading
 
The Untitled Linux Show covers the week's hottest Linux news for desktop, gaming, and even enterprise. ULS is the weekly update you don't want to miss, from the latest kernel development to the updates on your favorite apps! Each episode finishes with a killer command line tip from each host. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes ar ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

4
Raising Great Kids Podcast

North Point Ministries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
You want to raise great kids. We want to help. (Parenting advice for every stage: birth—high school) This podcast was designed to be a resource for all things parenting. We plan to bring you great content and the advice of leading experts on topics like technology, faith, sexuality, pandemic parenting and toddler temper tantrums as we work toward helping our kids grow in their faith.
  continue reading
 
Artwork

1
Modern Web

Modern Web

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The modern web is changing fast. Front-end frameworks evolve quickly, standards are emerging and old ones are fading out of favor. There are a lot of things to learn, but knowing the right thing is more critical than learning them all. Modern Web Podcast is an interview-style show where we learn about modern web development from industry experts. We’re committed to making it easy to digest lots of useful information!
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork
 
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There's a lot of good work happening that doesn't get attention because there's no marketing department behind it, they don't have a developer relations team posting on LinkedIn every two hours. Let's focus on those people and teams then learn what they do and how they do it. The goal is ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Мужчина средних лет ворчит про вещи, которые ему вроде бы нравятся. Дочерний подкаст сайта https://usilenie.plus; там примерно то же самое, но выраженное через возмутительно длинные тексты. Патреон: https://patreon.com/usilenie Да, ваш клиент или поисковик скорее всего не переваривает плюсик в названии при поиске. Я никуда не буду его убирать. Это принципиальный момент.
  continue reading
 
Loading …
show series
 
News for the week of December 1, 2025: Anthrophic acquired Bun, React2Shell is pretty darn bad (and that's not all), plus "elf spam" packages on npm. From the community: tRPC vs. oRPC, demystifying TSConfig, and hash-slash (#/) project-relative import support in Node. MCP in Practice Course Watch now. Kamran shows you how to build a practical enter…
  continue reading
 
On this week's episode, esVolta CEO Randy Mann joins Andrew Burnes to discuss some of the issues facing a well-established storage IPP in the 2025 market landscape. The conversation includes a look into the realities of FEOC and the status of domestic and alternative supply, including alternate chemistries, as well as a look at how storage values a…
  continue reading
 
Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
In this episode of the Modern Web Podcast, Rob Ocel talks with PlanetScale CEO Sam Lambert about what “database scale” actually looks like in 2026. Sam shares migration stories from companies that moved at the perfect time and others that waited until they were already in trouble, plus why sharding and reliability are never just “magic” if your que…
  continue reading
 
In this episode of JavaScript Jabber, I sat down with Shruti Kapoor, independent content creator and longtime React educator, to dig into what’s actually new — and worth getting excited about — in React 19.2. While it may sound like a “minor” release on paper, this update delivers some genuinely powerful improvements that can change how we build an…
  continue reading
 
A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
  continue reading
 
We’re joined by Sid Sijbrandij, founder of GitLab who led the all-in-one coding platform all the way to IPO. In late 2022, Sid discovered that he had bone cancer. That started a journey he’s been on ever since… a journey that he shares with us in great detail. Along the way, Sid continued founding companies including Kilo Code, an all-in-one agenti…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
  continue reading
 
In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
  continue reading
 
News for the weeks of December 22 and 29, 2025: MongoDB exploit drops on Christmas day in true Grinchy fashion, a new backend library called Vla that is far from blah, and starter templates for your next React Native app. From the community: NodeTLV keynote, strongly-typed events in gamedev, and a 6-hour deep dive into Doom in TS. Sponsored by Exca…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
Could Stuxnet happen again - this time at sea? In this Threat Talks episode, host Lieuwe Jan Koning sits down with Professor Stephen McCombie, global expert in maritime cybersecurity, to unpack real-world cyber attacks on critical infrastructure and why the maritime sector is dangerously exposed. From GPS spoofing and insider threats to aging ship …
  continue reading
 
Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
  continue reading
 
Brian Guthrie lists his seven rules for moving faster in software, Continuous-Claude-v2 is a context management system for Claude Code, Gas Town is Steve Yegge’s multi-agent orchestrator for Claude Code, Paul Dix sees a great engineering divergence in 2026, and Mattias Geniar thinks web development is fun again. View the newsletter Join the discuss…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
  continue reading
 
Josh chats with Xe Iaso, the creator of Anubis the web AI firewall. We discuss how Anubis is tackling bots and scrapers. The discussion around the scrapers is fascinating and challenging, these things are everywhere and don't behave very nicely. There's also discussion about running a successful open source project. Xe has a lot of experience to sh…
  continue reading
 
This week, we're talking accounting... while not giving any financial advice. Then we talk QEMU and virtualization, the Linux Steam Survey, and the CachyOS server. Then, Torvalds isn't super happy with the SFC lawsuit, Linux is headed to space, and Phoenix attempts to resurrect the ashes of X Server. You can find the show notes at https://bit.ly/49…
  continue reading
 
Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
  continue reading
 
2025 was the year detection stopped being enough. Because attacks stopped behaving the way detection was built to handle. OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late. In this special end-of-y…
  continue reading
 
For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
  continue reading
 
Josh talk to Dirkjan and Joe about Rustls (pronounced rustles), a Rust-based TLS library. Dirkjan and Joe are developers on Rustls. We talk about the history that got us to this point. The many many challenges in writing a TLS library (Rust or not). We also chat about some of what's to come. Rustls has an OpenSSL compatibility layer which makes is …
  continue reading
 
Why are forks, desktop wars, and Linux hardware launches making so much noise? And did last year's bold Linux predictions actually come true? We settle old bets, spotlight big surprises like Valve's hardware moves, and debate what's next for desktop, gaming, and beyond. Host: Jonathan Bennett Co-Hosts: Jeff Massie, Rob Campbell, and Ken McDonald Do…
  continue reading
 
MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
AI is writing more of our code than ever before—but should we actually trust it? In this episode of JavaScript Jabber, I sat down with Itamar Friedman from Qodo (formerly Quoto) to dig into one of the biggest questions developers are wrestling with right now: What happens when AI is generating code, reviewing code, and shaping how we ship software?…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Our last episode for 2025, see you in 2026! News for the week of December 15 2025: Microsoft's experimental JS/TS modernization agent, new Next.js and Bun releases, and how pnpm is tightening the security screws. From the community: when to use types vs. interfaces, actionable tips on securing your local dev environment, and tips on using TypeScrip…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play