A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Secure Supply Chain Podcasts
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There's a lot of good work happening that doesn't get attention because there's no marketing department behind it, they don't have a developer relations team posting on LinkedIn every two hours. Let's focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Welcome to The Printed Circuit, a Siemens Podcast. Hosted by Stephen Chavez, each episode will focus on trends, challenges, and opportunities across the printed circuit engineering industry. Topics range from achieving supply chain resilience, to learning PCB design best practices.
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
The editors of DC VELOCITY magazine bring you weekly updates on logistics, material handling, and supply chain news.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
The International Supply Chain Protection Organization (ISCPO) podcast is for those interested in learning about security in the supply chain and upcoming events.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Shine On Policycast is a podcast presented by SolarPower Europe. In these episodes, we bring you EU policy updates relevant to solar, in under 20 minutes. Our host, Bethany Meban, Head of Press and Policy Communications at SolarPower Europe, interviews different voices from our team of policy and market intelligence experts. As we enter a new political era in the EU, each episode dives into how solar is delivering on Europe's competitiveness, security and climate goals. The podcast is produc ...
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
1
Global Security Briefing by Factal and Emergent Risk International
Factal and Emergent Risk International
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
Technical interviews about software topics.
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
A weekly update on all that is new in the world of GDPR, plus interesting guests, some 'how to' slots and details of new GDPR related solutions. UK based but with items of interest to a worldwide audience.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
UPSTREAM is a podcast for those curious about the security of the software supply chain. In each episode, host Kim Weins speaks with experts, practitioners, and thought leaders about concrete ideas and approaches to improve software supply chain security. This podcast is for everyone inside and outside the world of security. Upstream is brought to you by Anchore.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Join host John Bryant, President of REDWIN Global, and Jermaine Whiteside, Ed.D. (candidate), Director of Research and Policy Analysis, for a rigorous examination of constitutional trade policy, economic security, and ethical governance frameworks. Each episode combines doctoral-level research with practical policy insights to examine how nations can develop resilient economic systems while upholding constitutional accountability. What You’ll Hear: •Constitutional analysis of emergency econo ...
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Big Boss Interview is where the most high-profile chief executives and entrepreneurs come to give you their insights and experiences of running the world's biggest and well-known businesses. The series is presented by Sean Farrington, Felicity Hannah and Will Bain, who you'd normally hear presenting the business news on BBC Radio 4's Today programme as well as BBC 5 Live's Wake Up To Money. Each week they'll be finding out just what it takes to run a huge organisation and what the day to day ...
…
continue reading
Shield of the Republic is a Bulwark podcast co-sponsored by the Miller Center of Public Affairs at the University of Virginia. We probe beyond the hive mind of Washington conventional wisdom on national security and foreign affairs.
…
continue reading
Cloudsmith is solving the challenges of artifact management and are on the path to becoming the software supply chain itself. In this weekly podcast, we share knowledge from Cloudsmith employees, customers, and other great guests from the software industry. Along the way, we’ll unpack topics like the cloud, security, supply chains, and the developer experience.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Stephen Giguere, a DevSecOps engineer at Aqua Security hosts conversations with cyber security influencers and front line DevOps warriors, to help provide us with a Cloud Native security blanket, for those who are entering the world of DevSecOps.
…
continue reading
Exploring the Kubernetes ecosystem in-depth with CNCF project leads and contributors.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Heavybit Podcast Network: Master Feed. This is where you can subscribe to all episodes of all shows in the Heavybit Podcast Network.
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
We already have many of the climate solutions we need. But scaling them is hard. The Green Blueprint is a show about the people who are architecting the clean economy. Every other week, host Lara Pierpoint profiles the founders, investors, and organizational leaders who are solving complex challenges in the quest to build climate technologies fast.
…
continue reading
LogisticsMatter is an independent platform that shares news and insights on trends and innovations in supply chain and logistics. LogisticsMatter's Founder Martijn Graat talks to thought leaders in the industy.
…
continue reading
Explore the critical aspects of software security with the ActiveState Podcast Series, focusing on mitigating supply chain attacks and navigating open source management in fintech. Discover strategies for balancing rapid development with robust security measures, leveraging AI, and understanding the Python ecosystem, empowering tech professionals to enhance enterprise security and innovation.
…
continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
A daily dose of irreverent, offbeat, and informative takes on business & tech news. Hosted by Jon Weigell and the rotating cast of The Hustle. Plus, expert insight on business strategies including marketing, scaling, sales, and overall entrepreneurship.
…
continue reading
1
Ep. #48, Unpacking Software Supply Chain Security with Justin Cappos
1:04:59
1:04:59
Play later
Play later
Lists
Like
Liked
1:04:59On episode 48 of The Kubelist Podcast, Marc Campbell and Benjie De Groot sit down with Justin Cappos, professor at NYU and a pioneer in software supply chain security. They explore the origins of modern package manager security, the real-world limits of SBOMs, and why systems should be designed assuming compromise. The conversation spans CNCF gover…
…
continue reading
1
We Need to Secure Our Supply Chains (w/ Mike Froman)
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06Eric welcomes Council on Foreign Relations President Mike Froman to discuss CFR's latest task force report on U.S. economic security. They explore the importance of AI, quantum computing and biotechnology as foundational technologies in today's strategic competition, the effort that China is investing in these technologies, and the market failures …
…
continue reading
1
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press In this episode of the Security Repo Podcast, Avi Press, founder and CEO of Scarf, dives deep into the evolving world of open source observability and its intersection with security. He unpacks how better visibility into software usage can inform both defen…
…
continue reading
1
VS Code and Agentic Development with Kai Maetzel
1:09:04
1:09:04
Play later
Play later
Lists
Like
Liked
1:09:04Visual Studio Code has become one of the most influential tools in modern software development. The open-source code editor has evolved into a platform used by millions of developers around the world, and it has reshaped expectations for what a modern development environment can be through its intuitive UX, rich extension marketplace, and deep inte…
…
continue reading
This episode of Explain IT explores the evolution of the smart workspace, moving beyond basic connectivity to create environments that act as a "magnet, not a mandate" for employees. Host Ashley Baker is joined by experts from Softcat and Cisco to discuss how integrated technology - ranging from seamless networking to AI-powered collaboration tools…
…
continue reading
Josh chats with Xe Iaso, the creator of Anubis the web AI firewall. We discuss how Anubis is tackling bots and scrapers. The discussion around the scrapers is fascinating and challenging, these things are everywhere and don't behave very nicely. There's also discussion about running a successful open source project. Xe has a lot of experience to sh…
…
continue reading
1
The Illusion of Security: How IAM Anti-Patterns Sneak into Every System
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
…
continue reading
1
CMMC Paperwork Without the Pain: How to Simplify Policies, SSP, and Evidence (Level 1 vs Level 2)
54:10
54:10
Play later
Play later
Lists
Like
Liked
54:10Submit any questions you would like answered on the podcast! Most small and mid-sized manufacturers do not fail CMMC because of “tech.” They fail because their documentation does not match how the shop actually runs. In this episode, Austin and Brooke break down how to build CMMC documentation that is concise, accurate, and assessor-friendly withou…
…
continue reading
1
The $50,000 PDF No One Reads: Why Your Security Audits Are Failing
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50This story was originally published on HackerNoon at: https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing. Security isn't about generating paperwork; it's about finding the cracks before the water gets in. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
Holiday Spending, Consumer Confidence, and Why Cash Still Matters
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37In this episode of The Cash News Podcast, Brad Moody and Shaun Ferrari unpack the data behind holiday spending, consumer confidence, and payment behavior as we close out the year. From Black Friday and Cyber Monday trends to inflation, unemployment, and credit usage, the conversation explores why spending is rising even as confidence falls. They al…
…
continue reading
1
Ep 18 - Brace Yourself for 2026: AI-Powered Mayhem and Coffee-Fueled Product Security Predictions
1:07:11
1:07:11
Play later
Play later
Lists
Like
Liked
1:07:11🎙️ Coffee, Chaos and ProdSec, Ep 18 2026 is getting closer, and security is already acting weird. So this week, Kurt and Cameron grab their mugs and talk through what they see coming next for Product Security and the teams trying to keep up. From AI agents showing up in the SOC, AppSec, DevSecOps, and GRC, to supply chain risks getting deeper and h…
…
continue reading
1
Ep. 37 - Emennet Pasargad Exposed: How Iran’s IRGC Cyber Unit Targets Organizations — and How to Stop Them
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07Emennet Pasargad is one of the most active and aggressive Iranian cyber threat groups operating today — tied directly to the Islamic Revolutionary Guard Corps (IRGC) Cyber Electronic Command. In this episode of Cyber Resilience Brief, SafeBreach Senior Sales Engineer Adrian Culley breaks down who Emennet Pasargad really is, how they operate through…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
Josh talk to Dirkjan and Joe about Rustls (pronounced rustles), a Rust-based TLS library. Dirkjan and Joe are developers on Rustls. We talk about the history that got us to this point. The many many challenges in writing a TLS library (Rust or not). We also chat about some of what's to come. Rustls has an OpenSSL compatibility layer which makes is …
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
How CMMC Became a Competitive Advantage for DoD Contractors
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Submit any questions you would like answered on the podcast! CMMC is no longer just a compliance requirement. It is now a competitive advantage that directly impacts who wins and who loses DoD contracts. In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down how the final 48 CFR rule has changed the contracting landscape…
…
continue reading
1
Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
…
continue reading
1
How Compliance Requirements Shape Modern Software Architecture
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
…
continue reading
1
Blender and Godot in Game Development with Simon Thommes
35:11
35:11
Play later
Play later
Lists
Like
Liked
35:11Blender Studio is the creative arm of the Blender Foundation and it’s dedicated to producing films, games, and other projects that showcase the full potential of Blender. The studio functions as both an art and technology lab and pushes the boundaries of 3D animation through open productions. All of their assets, production files, and workflows are…
…
continue reading
1
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
…
continue reading
1
Can You Really Trust AI-Generated Code? - JSJ 699
46:56
46:56
Play later
Play later
Lists
Like
Liked
46:56AI is writing more of our code than ever before—but should we actually trust it? In this episode of JavaScript Jabber, I sat down with Itamar Friedman from Codo (formerly Quoto) to dig into one of the biggest questions developers are wrestling with right now: What happens when AI is generating code, reviewing code, and shaping how we ship software?…
…
continue reading
1
Ep 17 - Breaking Into Product Security, AppSec, DevSecOps, and Cloud Security Without a Degree
1:11:35
1:11:35
Play later
Play later
Lists
Like
Liked
1:11:35🎙️ Coffee, Chaos and ProdSec, Ep 17 Breaking into cybersecurity without a degree feels impossible, yet people do it every single day. So this week, Cameron and Kurt grab their mugs and get real about how career changers actually break into Product Security, Application Security, DevSecOps, and Cloud Security when their background looks nothing like…
…
continue reading
In episode 307 of Absolute AppSec, hosts Ken and Seth conduct a retrospective on the application security landscape of 2025. They conclude that their previous predictions were largely accurate, particularly regarding the rise of prompt injection, AI-backed attacks, and the industry-wide shift toward per-token billing models. A major theme of the ye…
…
continue reading
1
Ep. 36 - TIBER-EU Explained: How Threat-Led Red Teaming Is Redefining Cyber Resilience
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14Threat-led red teaming is no longer optional in Europe — it’s becoming the foundation of cyber resilience. In this episode of The Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, SafeBreach’s offensive security expert for Europe and the UK, to break down the TIBER-EU framework and why it’s reshaping how financial institutions an…
…
continue reading
1
Ep. #5, The Identity Crisis of BI with Benn Stancil
1:10:11
1:10:11
Play later
Play later
Lists
Like
Liked
1:10:11On episode 5 of Data Renegades, CL Kao and Dori Wilson sit down with Benn Stancil to explore how data tools evolve, and sometimes lose their identity. Benn shares lessons from building Mode, the risks of drifting from an opinionated product vision, and why most companies struggle to turn data into meaningful decisions. The conversation also dives i…
…
continue reading
1
Ep. #48, Unpacking Software Supply Chain Security with Justin Cappos
1:04:59
1:04:59
Play later
Play later
Lists
Like
Liked
1:04:59On episode 48 of The Kubelist Podcast, Marc Campbell and Benjie De Groot sit down with Justin Cappos, professor at NYU and a pioneer in software supply chain security. They explore the origins of modern package manager security, the real-world limits of SBOMs, and why systems should be designed assuming compromise. The conversation spans CNCF gover…
…
continue reading
JavaScript has grown far beyond the browser. It now powers millions of backend systems, APIs, and cloud services through Node.js, which is one of the most widely deployed runtimes on the planet. Keeping such a critical piece of infrastructure fast, secure, and stable is a massive engineering challenge, and the work behind it is often invisible. Raf…
…
continue reading
1
Ep. #87, Augmented Coding Patterns with Lada Kesseler
48:23
48:23
Play later
Play later
Lists
Like
Liked
48:23On episode 87 of o11ycast, Ken Rimple and Jessica Kerr sit down with Lada Kesseler to explore how experienced engineers can work effectively with AI coding assistants. They discuss why AI feels like a fast, noisy black box, and how patterns like semantic zooming, feedback loops, testing, and observability can help developers stay in control. This e…
…
continue reading
1
The Markup's Blacklight Tool Now Has New Tracking Info and Caching Options
2:06
2:06
Play later
Play later
Lists
Like
Liked
2:06This story was originally published on HackerNoon at: https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options. Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. Check more stories related to cybersecur…
…
continue reading
On episode 28 of Open Source Ready, Brian Douglas and John McBride reflect on the biggest themes that shaped open source and AI in 2025. From sustainability and security to MCPs, agents, and infrastructure, they revisit key conversations with guests and unpack how the industry evolved over the year. The episode closes with bold predictions for what…
…
continue reading
1
Ep. #50, Defense Against Deepfakes with Joshua McKenty
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43In episode 50 of Generationship, Rachel Chalmers sits down with Joshua McKenty to unpack how AI-driven scams, deepfakes, and identity fraud are already reshaping our digital lives. From scam factories and nation-state actors to broken trust infrastructure, Josh explains why authenticity is the core problem, and what it will take to fix it. The conv…
…
continue reading
Mark Constantine, founder and chief executive of Lush, discusses the Christmas rush, family run businesses, being "woke" and his love of birdsong in an amazing interview for Big Boss. He offers a festive perspective on the realities of retail during the Christmas season and describes the intense preparations for the holiday rush as akin to “prepari…
…
continue reading
1
Daniel Thompson answers: Does the CRA apply to Santa?
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29Josh welcomes back Daniel Thompson explore the rather silly question of whether Santa Claus needs to be compliant with the Cyber Resilience Act (CRA). This episode was intended to be silly, but it ended up being an incredibly interesting conversation. Daniel explained a great deal about how the CRA works and how it could apply to Santa Claus. The T…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/should-you-trust-your-vpn-location. IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive…
…
continue reading
1
SAIS-GRC Framework: Establishing Trust and Enhancing Resilience in AI-Driven Supply Chains
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49This story was originally published on HackerNoon at: https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains. The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
Quantum Security Governance: Building a Framework for the Post-Quantum World
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28This story was originally published on HackerNoon at: https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world. The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. Check more stories related to cybersecurity at…
…
continue reading
1
A Special Holiday Message from The Security Repo Podcast
0:47
0:47
Play later
Play later
Lists
Like
Liked
0:47Hi everyone, It's Dwayne, host of the security repo podcast. The show is taking a 2-week break over the holidays to give you a chance to catch up on our backlog of security conversations. Our next new episode premieres January 7th, 2026. It's one to look forward to. And I wanted to say a huge thank you to each and every one of our listeners and sub…
…
continue reading
1
Guest: Jason Schenker of Prestige Economics with predictions for supply chains in 2026; Managing risks among shifting policies; Stabilizing your workforce
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Our guest on this week's episode is Jason Schenker, president of Prestige Economics and chairman of the Futurist Institute. In what has become an annual tradition, one of our nation’s leading economists joins us to review the economy of 2025 and preview economic trends for 2026. He also focuses on supply chains and the prospects for the material ha…
…
continue reading
1
Why One Lock Isn’t Enough: How Buburuza Designs Multi-Layer Security for AI Banking
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46This story was originally published on HackerNoon at: https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking. Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. Check more stories related to cybersecurity at: https://hacke…
…
continue reading
1
The Hidden Cost of Invalid Traffic: Why IP Data Is the Missing Link
4:43
4:43
Play later
Play later
Lists
Like
Liked
4:43This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link. IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. Check more stories related to cybersecurity at: https://hac…
…
continue reading
1
NIST 800-171 and CMMC 2.0: How Assessors Actually Score You
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17Submit any questions you would like answered on the podcast! Are assessors judging you on CMMC or NIST 800 171 when audit day arrives? In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down the real relationship between CMMC 2.0 and NIST 800 171 so you are not guessing when it matters most. We walk through how the 110 NI…
…
continue reading
1
The Battle for the Borders: How AI and Cyber Intelligence Are Reshaping Statecraft
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23This story was originally published on HackerNoon at: https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft. From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. Check more stories related to cybersecurity at: https://h…
…
continue reading
1
Designing Innovative Puzzle Games with Zach Barth
1:27:56
1:27:56
Play later
Play later
Lists
Like
Liked
1:27:56Zachtronics is a legendary independent game studio known for creating intricate, engineering-focused puzzle games that merge logic, creativity, and code. The studio was founded by Zach Barth in 2011, and it has become a cult favorite among programmers and tinkerers alike with titles such as SpaceChem, Infinifactory, TIS-100, and Shenzhen I/O. Most …
…
continue reading
1
2025 in review | The EU Grids Package and SolarPower Europe's vision for an EU Flexibility Strategy
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:382025 has been the year of putting energy system flexibility in the spotlight. As the EU launched its strategic priorities for the new EU political mandate: energy security, competitiveness, and climate. In this episode, our host Bethany Meban sits down with Dries Acke, Deputy CEO, SolarPower Europe, to discuss why flexibility is essential for meeti…
…
continue reading