Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Open Source Security Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There's a lot of good work happening that doesn't get attention because there's no marketing department behind it, they don't have a developer relations team posting on LinkedIn every two hours. Let's focus on those people and teams then learn what they do and how they do it. The goal is ...
  continue reading
 
The Angular Plus Show is the home of ng-conf's official all-Angular podcast. Come here to stay up to date on the latest changes in the Angular community. Expect to laugh and cry with us as we talk about our experiences as Angular developers.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
  continue reading
 
Hi, we’re Tim Berglund, Adi Polak, and Viktor Gamov and we’re excited to bring you the Confluent Developer podcast (formerly “Streaming Audio.”) Our hand-crafted weekly episodes feature in-depth interviews with our community of software developers (actual human beings - not AI) talking about some of the most interesting challenges they’ve faced in their careers. We aim to explore the conditions that gave rise to each person’s technical hurdles, as well as how their experiences transformed th ...
  continue reading
 
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
  continue reading
 
Artwork

1
The Dynamist

Foundation for American Innovation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
  continue reading
 
Artwork

101
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
Artwork
 
Each episode of Discursive takes one idea — from open source to FinOps, from AI agents to cloud cost models — and unpacks it through the lens of decades spent building the web, scaling infrastructure, and writing about how technology actually evolves. Recorded in Seattle, Discursive is a ten-minute conversation about where software has been and where it’s heading — across cloud, FinOps, open source, AI, and the culture that connects them.
  continue reading
 
Artwork

801
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
Artwork

1
Talk Python To Me

Michael Kennedy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
Artwork
 
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Artwork

1
Open Source Utopia

Mathias Bolt Lesniak

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
  continue reading
 
IT Talks (produced by Redpill Linpro) lets you in on how it is to work with us, how customers have solved IT challenges, the open source perspective, new industry trends by our partners, and much more. We have offices in Denmark, Norway, and Sweden – and we have recorded talks at all of our locations and the chats are held in local language.
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Artwork
 
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

101
Hacker Culture

Jaron Swab

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
  continue reading
 
Artwork

1
Opt Out

Seth For Privacy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
  continue reading
 
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
  continue reading
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
Artwork

1
Console DevTools

console.dev

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews with interesting people in the devtools space. From security to dev focused infrastructure, and from homomorphic encryption to privacy and decentralization, we discuss the technical details around devtools.
  continue reading
 
All Things LLM is your go-to podcast for demystifying Large Language Models! We break down their core concepts—like tokens, embeddings, and the self-attention that powers GPT-4 and Llama. Learn how LLMs are built, trained, and fine-tuned (SFT, RLHF, PEFT) on massive datasets. Discover real-world use cases in healthcare, finance, chatbots, code, RAG, and more. We explore the LLM ecosystem, covering open-source vs. closed models, LLMaaS, LangChain, and LLMOps tools. Plus, we tackle challenges— ...
  continue reading
 
Artwork

1
The Cyberlaw Podcast

Stewart Baker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
  continue reading
 
Loading …
show series
 
In this episode of "What's in the SOSS," CRob, Ben Cotton, and Eddie Knight discuss the Open Source Project Security Baseline. This baseline provides a common language and control catalog for software security, enabling maintainers to demonstrate their project's security posture and fostering confidence in open source projects. They explore its int…
  continue reading
 
In this episode, Josh and Otto dive into the world of Debian packaging, exploring the challenges of supply chain security and the importance of transparency in open source projects. They discuss Otto's blog post about the XZ backdoor and how it's a nearly impossible attack to detect. Otto does a great job breaking down an incredibly complex problem…
  continue reading
 
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
  continue reading
 
🚀 Get a sneak peek of how FINOS Common Cloud Controls (CCC) can move from policy docs to practical enforcement—through automation and open source.In this clip:Toni de la Fuente, Founder & CEO, ProwlerToni shares his journey from maintaining open source in his spare time to helping the community align cloud security with real frameworks like CCC. He…
  continue reading
 
"The Incredible Machine" was Bell Labs' 1968 promotional masterpiece—complete with scientists in full suits, dramatic red lighting, and demonstrations of light pens drawing circuits on graphics displays. The film showcased computer-generated music and the iconic "Daisy Bell" performance that inspired HAL 9000 in "2001: A Space Odyssey." It was corp…
  continue reading
 
Troy Hunt has processed the largest data breach corpus in Have I Been Pwned's history—nearly 2 billion unique email addresses and 1.3 billion passwords, with 625 million passwords never seen before. This isn't a single breach but rather credential stuffing data that criminals use to attempt logins across the internet. The scale is staggering: 32 mi…
  continue reading
 
In a world where cyber risk is business risk, today's Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner's Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decisi…
  continue reading
 
Guests: Endre Dingsør and Paal Hatledal Language: Norwegian Duration: 29:38 min In this episode, Endre Dingsør from Choose European and Redpill Linpro's Paal Hatledal discuss the importance of choosing European tech services instead of overseas providers. Investing in domestic technology not only saves money but also strengthens local competence. E…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Developer workstations have become treasure chests of credentials—API keys, database passwords, cloud tokens, SSH keys—essentially the keys to the kingdom. This episode examines why developers have become the softest target in the security landscape, with surveys showing 86% of developers don't prioritize security when writing code, and nearly one-…
  continue reading
 
In this episode, Katerina Skroumpelou joins us to talk all things Supabase — from what it is and how it simplifies life for everyday developers to why Angular devs are starting to love it. We chat about real-world use cases, security best practices, and how Katerina keeps learning new tools with confidence and curiosity. She also opens up about sta…
  continue reading
 
Once the king of VPNs, ExpressVPN has seen a dramatic fall of grace that started in 2021. This is the story of the rise and fall of one of the most well-known privacy and security apps. Start protecting your own online identity with our free email course: https://www.allthingssecured.com/email-course/ Recommended alternatives to ExpressVPN (affilia…
  continue reading
 
Git fundamentally transformed software development, enabling the open-source explosion we've witnessed over the past two decades. But as we approach Git's 20th birthday, it's worth examining where this beloved tool shows its age. Today's main segment digs into three key areas of discontent: Git's well-documented struggles with massive monorepos (fo…
  continue reading
 
Brian Fabian Crain and Michael Egorov, Curve Finance founder, discuss Curve's origins: solving inefficient DAI/USDC swaps after MakerDAO borrows by creating a DeFi AMM for stablecoins and LSTs. It hit 1M TVL with a bonding curve concentrating liquidity at 1:1, more effective for pegged assets than Uniswap. Features grew to include BTC wrappers, stE…
  continue reading
 
In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming the way InfoSec professionals discover global events, communities, and CFPs. We dive into the origin story of InfoSecMap, its recent growth surge, and its strategic partnerships with organizations like O…
  continue reading
 
There are lots of semiconductor vendors that do a great job of providing AI hardware. But unfortunately, for many of them, their offerings end there, requiring developers to source software and tools from multiple sources. It’s no secret that designing a system with AI is complex enough. Having to go to different vendors for different pieces just a…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
We often hear about AI's potential to generate text and code, but its application in healthcare and life sciences promises a more profound impact: solving our most fundamental challenges in disease and medicine. This isn't just about applying existing LLMs; it's about building entirely new foundation models that understand the complex language of b…
  continue reading
 
Modern aviation has a counterintuitive rule: keep the autopilot engaged during turbulence. After analyzing millions of flights, Airbus found that pilots who disconnect autopilot often make things worse through overcorrection and startle response. The machine, monitoring 88+ parameters simultaneously, handles the chaos better than human instinct. Th…
  continue reading
 
In this episode of "Nerding Out with Viktor," host Viktor Petersson sits down with Nick Selby, a security leader and advocate for practical security culture, to explore the reality behind software security compliance and why so many teams treat it as a checkbox rather than a mindset. The discussion unpacks how frameworks like SOC 2 and ISO 27001 of…
  continue reading
 
A quick introduction to Verbose Mode, the podcast from the team at TuxCare. Host Eric “The IT Guy” Hendricks shares what the show’s all about — real conversations about Linux, open source, and enterprise IT without the buzzwords or fluff. Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig…
  continue reading
 
For three decades, conservatives abandoned science policy. Now they have a chance to rebuild it. That rebuilding effort comes with political challenges. Republicans' trust in science dropped thirty points over those decades. DOGE recently slashed budgets at the National Science Foundation and National Institutes of Health. And HHS Sec RFK jr. is ca…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Listen: https://confluent.buzzsprout.com | Today, Adi Polak talks to her guest, Peter Bell (gather.dev), about his career in software engineering leadership, CTO community building, and AI-driven development. Peter’s first job: electronics lab technician at their school (alongside shifts at Tesco). His challenge/theme: working at scale with AI adop…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
The October 2025 AWS outage in us-east-1 was a 15-hour preview of life without the cloud. When a DNS resolution failure cascaded through DynamoDB, it didn't just take down websites – it disrupted daily life in unexpected ways. From Starbucks' mobile ordering to smart mattresses stuck at the wrong temperature, the outage revealed how deeply cloud in…
  continue reading
 
Update: Unite is Accessible Rounded Screenshots Part 2 — Rolling my Own and Shottr Update Shure MV7+ Microphone — by Eddie Tonkoi Support the Show Allister on Nitpicking (no blog post) Transcript of NC_2025_10_02 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donatio…
  continue reading
 
The main segment explores a milestone for the web platform: the Glasgow Haskell Compiler (GHC) now runs entirely in modern browsers via WebAssembly (Wasm). Developers can write, compile, and run Haskell without any local setup, lowering the barrier to entry for education and experimentation. Wasm provides a portable, memory‑safe execution sandbox t…
  continue reading
 
TORCHLIGHT, a research tool presented at USENIX Security 2025, discovered 29 zero-day exploits affecting 12.71 million IoT devices hidden on the Tor network by analyzing 26 terabytes of traffic over twelve months. These aren't just smart fridges—they're industrial controllers, security cameras, and network equipment controlling critical infrastruct…
  continue reading
 
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting de…
  continue reading
 
Today, we’re talking about building real AI products with foundation models. Not toy demos, not vibes. We’ll get into the boring dashboards that save launches, evals that change your mind, and the shift from analyst to AI app builder. Our guide is Hugo Bowne-Anderson, educator, podcaster, and data scientist, who’s been in the trenches from scalable…
  continue reading
 
Maven 4 is approaching its release, bringing many improvements to the build tool powering millions of Java projects. In this Foojay Podcast episode, we talk about Apache Maven 4, a significant milestone that has been years in the making. Maven has been the backbone of Java dependency management and build automation since the early 2000s; however, t…
  continue reading
 
Q&A243: Why don't people care about privacy? Is it true Proton is accepting Monero? How can you get involved in the fight for privacy? And more! Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepod Welcome to the Surveillance Report Q&A - featuring Techlore & The New …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
DHH's decision to move Basecamp and HEY out of the public cloud sparked intense debate in the tech community. Still, as someone who interviewed him back in 2008 (which ended with us literally running from Chicago police over a filming permit), I respect his position: real numbers and real success back his argument. For mature applications with pred…
  continue reading
 
Guest: Thea Stark Language: Norwegian Duration: 18:21 min Thea is a former participant in our DevOps Academy. Today, she works as a system administrator, platform engineer, and (self-proclaimed) Linux nerd. She describes her role as a bridge between development and operations. In this episode of IT Talks, Thea shares insights into her work - the hi…
  continue reading
 
Live from ng-conf 2025 — The Angular Plus Show! Join us for our annual game show episode where we show our Angular terminology prowess - or the lack thereof. With special guests: Michael Small & Alex Okrushko (volunteers from the audience), Chau Tran and Ankita Sood (former A+ Show hosts), Kirill Cherkashin from the Google Angular team, and our ver…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
In the main segment, Tim unpacks the deceptive nature of utilization reports that FinOps teams rely on to identify "waste" in infrastructure. While industry statistics show servers running at shockingly low utilization rates—often 12-50%—Tim argues that acting on these numbers without context is like "performing surgery with a chainsaw." He explore…
  continue reading
 
Sci-fi titan Neal Stephenson, whose Snow Crash coined the term 'metaverse' and Cryptonomicon, which foreshadowed crypto in 1999, joins Friederike to discuss his "hard sci-fi" method: building immersive, consistent worlds, not prophecy. He's now co-founder of Lamina1, aiming to restore Web1's ethos and give creators IP sovereignty with direct microp…
  continue reading
 
In the main segment, we unpack “The Humble Programmer” (1972) and why it still reads like a briefing for 2025. Dijkstra’s claim that “programming will remain very difficult” lands squarely in the age of AI code generation: as tools remove circumstantial cumbersomeness, our ambitions expand and the problems get harder. We connect his call to “prepar…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play