Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Security Baselines Podcasts
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
1
Microsoft Account Hacks, WhatsApp Ghost Pairing, and Extensions Spy On AI
1:01:41
1:01:41
Play later
Play later
Lists
Like
Liked
1:01:41This week on The Awareness Angle, breaches, extortion, and quietly invasive tech all collide. From real estate firms leaking highly sensitive data to browser extensions secretly harvesting AI conversations, the theme this week is trust, and how easily it gets abused. Luke is back from holiday, and we kick off with Breach Watch, starting with a New …
…
continue reading
1
Vanity Metrics - Cary Johnson on Why Benchmarks Fail and Baselines Matter
1:09:40
1:09:40
Play later
Play later
Lists
Like
Liked
1:09:40Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle. This week on The Awareness Angle Interviews, Ant sits down with Cary Johnson, founder of Phishbusters, for a straight talking conversation about security awareness, human risk, and why so many programmes struggle to prove real impact. T…
…
continue reading
1
The Marriage between Defender and Sentinel
59:17
59:17
Play later
Play later
Lists
Like
Liked
59:17In this episode of The Collective Podcast, our host Jordy Decock sits down with MVPs Thijs Lecomte and Robbe van den Daele as they unpack the journey from traditional SIEM and XDR deployments to Microsoft's Unified Security Operations platform. The deprecation of the Sentinel UI by August 2026 makes this migration inevitable. Our experts share thei…
…
continue reading
1
Teaching the Next Generation: Software Supply Chain Security in Academia with Justin Cappos
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29On this episode of "What's in the SoSS," Yesenia Yser sits down with Justin Cappos, NYU professor and self-described "OG software supply chain guy" who's been working in this space since 2002. Justin reveals why most universities fail to teach fundamental security practices—from MFA to code signing—and how his groundbreaking software supply chain s…
…
continue reading
1
LG Copilot Update, Widespread Data Breaches, and Travel Privacy Fears
55:16
55:16
Play later
Play later
Lists
Like
Liked
55:16This week on The Awareness Angle, data breaches keep piling up, ransomware is still doing damage, and software updates are becoming an attack surface all of their own. Luke is on holiday, so I am flying solo, but there is plenty to dig into. We start with a classic insider risk failure at Coupang, where a former employee kept access after leaving, …
…
continue reading
In this episode, we wrap up the season, where we explore our favorite episodes of the season. We also talk about the what happened in 2025, and how the podcast has grown in terms of listenership and engagement. As we bid farewell to the season, we also reveal our future plans for the next season, which will start in January 2026. This episode is a …
…
continue reading
1
Bring your own model - Android Developers Backstage
58:26
58:26
Play later
Play later
Lists
Like
Liked
58:26In this episode Tor and Chet chat with Raluca Saucic and Eugene Yakavets about the new "Bring Your Own Model" feature in Android Studio which allows using other models than Gemini for agent mode, including models from Anthropic, OpenAI, and more. We also discuss using local models via Ollama and LM Studio. Resources: Use a remote model → https://go…
…
continue reading
1
Scientology Breach, Windows Chaos and a Live ChatGPT Scam
59:26
59:26
Play later
Play later
Lists
Like
Liked
59:26This week on The Awareness Angle, things get lively. We break down the Scientology ransomware attack, the ongoing chaos at Westminster Council, the five hundred million Windows 10 devices now left unsupported, and the ClickFix scam impersonating ChatGPT that we discovered live during the recording. We dig into what the Qilin gang claims to have tak…
…
continue reading
1
Securing the Future: AI, Open Source, and Collaboration with Jay White (Microsoft)
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32Jay White, a leader in the open source ecosystem at Microsoft, discusses his journey into open source, focusing on AI and machine learning. He highlights his role in the Azure office of the CTO, working on open source, security, and AI standards. White emphasizes the importance of model signing and transparency in AI development, mentioning ongoing…
…
continue reading
1
Cartels, Fake Updates and One Big Budget Oops
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle. 📢 This Week on The Awareness Angle A council incident affecting thousands of residents, emergency alerts taken offline, a vishing breach at Harvard, fake Windows updates, AI voice scam stories, and an industrial scale Black Friday cam…
…
continue reading
1
S6E29 - Ignite 2025 Recap - San Fran and what's hot off the press
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37This week, Alan and Sam talk about last weeks Microsoft Ignite event and the announcements that came out of it. Alan dives into the in-person experience in San Francisco. They dive into a couple of the announcements that peaked their interest. Some of the Microsoft product features and updates we covered: M365 Copilot Purview Microsoft Defender for…
…
continue reading
1
WhatsApp Leak, Rail Hack and CCTV Horror Stories | Weekly Cyber News, But Human
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle 📢 This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber st…
…
continue reading
1
SBOM Chaos and Software Sovereignty: The Hidden Challenges Facing Open Source with Stephanie Domas (Canonical)
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44Stephanie Domas, Canonical's Chief Security Officer, returns to What's in the SOSS to discuss critical open source challenges. She addresses the issues of third-party security patch versioning, the rise of software sovereignty, and how custom patches break SBOMs. Domas also explains why geographic code restrictions contradict open source principles…
…
continue reading
1
Can Attackers really turn safety tools into weapons?
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle This week on The Awareness Angle, Ant Davis and Luke Pettigrew break down a wild mix of stories that show how everyday tools are becoming attack surfaces. This episode digs into the human habits, design gaps and risky shortcuts that ma…
…
continue reading
1
S6E28 - Automate Your Security Baseline with Microsoft’s Open-Source Assessment Tool
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55In this episode, we dive into Microsoft’s Zero Trust Assessment - an open-source, automated tool that scans hundreds of Entra ID and Intune settings against NIST, CISA, CIS, and Microsoft’s own internal baselines. Discover how it aligns with the Secure Future Initiative, delivers actionable remediation, and turns Zero Trust from theory into measura…
…
continue reading
1
Human Risk, Real Talk - Dan Thornton on Keeping Security Simple
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04We are back with another interview and this one is a proper conversation about what security awareness should feel like. Honest, simple and human. This week I sat down with Dan Thornton, founder and CEO of Goldphish. Dan’s path into cyber started in the Royal Marine Commandos and moved through physical security and crisis management before one atta…
…
continue reading
1
Could Hackers Really Edit Your Teams Messages?
1:02:37
1:02:37
Play later
Play later
Lists
Like
Liked
1:02:37You are tuned in to The Awareness Angle, the weekly show where we cut through the cyber noise and get straight to the scams, slip ups, and stories that actually matter. In this episode, Ant and Luke dig into a fresh batch of breaches, some worrying policy decisions, and a few very human stories from inside the cyber world. From councils leaking res…
…
continue reading
1
S6E27 - Microsoft updates October- new products and features released
46:12
46:12
Play later
Play later
Lists
Like
Liked
46:12This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our interest. Some of the Microsoft product features and update we covered: Key Microsoft Entra, Intune and Defender features and updates Lots of Azure chan…
…
continue reading
1
A Deep Dive into the Open Source Project Security (OSPS) Baseline
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode of "What's in the SOSS," CRob, Ben Cotton, and Eddie Knight discuss the Open Source Project Security Baseline. This baseline provides a common language and control catalog for software security, enabling maintainers to demonstrate their project's security posture and fostering confidence in open source projects. They explore its int…
…
continue reading
1
Can Meta’s AI Scam Detector Actually Stop Them?
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack a wave of global cyber stories — from telecom breaches and AI-powered defence tools to sextortion scams and the emotional risks of “friendly” chatbots. It’s a mix of human stories, technical takeaways, and practical lessons for anyone trying to stay safe in an AI-shaped world. 📡 …
…
continue reading
1
Beyond Compliance: effective partnering to support NIS2 resilience
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43What does NIS2 really mean for your day-to-day security operations? In this episode of The Collective Podcast, host Jordy Decock sits down with Michael Van Horenbeeck, Microsoft Security MVP and CEO of The Collective, to unpack how organizations can move from NIS2 compliance checklists to measurable resilience. They explore why 24-hour incident rep…
…
continue reading
1
S6E26 - Classify and protect your data using Purview sensitivity labels
40:00
40:00
Play later
Play later
Lists
Like
Liked
40:00In this episode, Alan and Sam drive into the importance of classifying data in an organisation. Alan goes through the capability in Purview to tag files and encrypt them. Here are a few things we covered in this episode: Why is it important to classify data in an organisation How can Purview help with the applying labels to data How to get started …
…
continue reading
1
Can You Trust Open AI’s New ChatGPT Atlas Browser?
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18This week on The Awareness Angle, Ant Davis and Luke Pettigrew dive into the fast-moving collision between AI innovation, real-world breaches, and human behaviour. From Sotheby’s data leak to AI browsers that remember your every move, this episode explores where awareness, policy, and technology are all being stress-tested. 🏭 Sotheby’s, Muji & JLR …
…
continue reading
1
S6E25 - Securing Azure's Core: Microsoft Defender for Resource Manager, Key Vault, and APIs
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21In this episode, we dive into three key Cloud Workload Protection Platform (CWPP) offerings within Microsoft Defender for Cloud: Defender for Resource Manager, Defender for Key Vault, and Defender for APIs. Our Q&A format explores how these tools safeguard Azure environments against sophisticated threats, from management layer exploits to API vulne…
…
continue reading
1
Building Trust in Open Source: Seth Larson's Journey from Maintainer to Security Leader
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43In this episode of What’s in the SOSS, host Yesenia Yser sits down with Seth Larson, Security Developer in Residence at the Python Software Foundation, as he shares his unique perspective on open source security. From his Minneapolis base, Seth discusses his journey from urllib3 maintainer to leading security initiatives across the Python ecosystem…
…
continue reading
1
Are Employees Leaking Company Secrets to AI Tools? 77% Are Doing It
1:06:18
1:06:18
Play later
Play later
Lists
Like
Liked
1:06:18This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack a packed lineup of real-world cybersecurity stories — from paper-based recovery plans to AI data leaks, healthcare ransoms, and the human messiness behind governance and awareness. It’s all about what happens when the systems fail, the people improvise, and resilience gets real. …
…
continue reading
1
New Education Course: Secure AI/ML-Driven Software Development (LFEL1012) with David A. Wheeler
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44In this episode of “What’s In The SOSS,” Yesenia interviews David A. Wheeler, the Director of Open Source Supply Chain Security at the Linux Foundation. They discuss the importance of secure software development, particularly in the context of AI and machine learning. David shares insights from his extensive experience in the field, emphasizing the…
…
continue reading
1
From natural language to UI tests: A deep dive into Journeys for Android Studio
44:57
44:57
Play later
Play later
Lists
Like
Liked
44:57Hosts Tor and Chet are joined by Adarsh Fernando, a Product Manager, and Ray Buse, a Software Engineer, to discuss Journeys for Android Studio. Powered by Gemini's vision and reasoning, Journeys aims to simplify end-to-end test creation and maintenance by converting the natural language you provide to describe the steps and assertions for each test…
…
continue reading
1
The LinkedIn ‘Open to Work’ Trap: How Scammers Target Job Seekers
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack the latest in cybersecurity and human risk — from fake job recruiters flooding LinkedIn to deepfake chaos and a nursery hack that shocked the UK. Whether it’s scams, software flaws, or stolen art, this episode is all about where human behaviour meets digital consequence. 🕵️♂️ Li…
…
continue reading
1
The Remediation Revolution: How AI Agents Are Transforming Open Source Security with John Amaral of Root.io
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53In this episode of What's in the SOSS, CRob sits down with John Amaral from Root.io to explore the evolving landscape of open source security and vulnerability management. They discuss how AI and LLM technologies are revolutionizing the way we approach security challenges, from the shift away from traditional "scan and triage" methodologies to an e…
…
continue reading
1
Why Are Ransomware Victims Paying Millions But Still Losing Data?
55:23
55:23
Play later
Play later
Lists
Like
Liked
55:23This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dig into a packed line-up of stories that show just how wide the cyber threat landscape has become—from luxury retailers and carmakers taken offline, to insider risks, ransom trends, and the latest fights between governments and Big Tech. It’s not just about breaches and numbers; it…
…
continue reading
1
S6E24 - Microsoft updates September - new products and features released
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our interest. Some of the Microsoft product features and update we covered: Key Microsoft Entra, Intune and Defender features and updates Lots of Azure chan…
…
continue reading
To protect users from malware and scams, Android has announced a new layer of security: developer verification. While this is nothing new for Google Play Store apps, Android is extending this to the entire Android ecosystem. Host Tor is joined by Matthew, Patrick, Naheed, and Raz to discuss this latest security update that deters bad actors and cre…
…
continue reading
1
Children’s Data Stolen from Nursery—Published on Dark Web
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into everything from car factories grinding to a halt to ransomware crews dumping nursery data online. It’s a mix of big-business losses, government experiments with digital ID, and the human cost of attacks that don’t care who they hit. 🚗 Jaguar Land Rover Shutdown – Millions …
…
continue reading
1
Closing The Gaps: How Security Baselines Make The Difference
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
…
continue reading
1
From Manager to Open Source Security Pioneer: Kate Stewart's Journey Through SBOM, Safety, and the Zephyr Project
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47In this episode of What’s in the SOSS, CRob has an inspiring conversation with Kate Stewart, a Linux Foundation veteran who took an unconventional path into open source as a manager rather than a developer, navigating complex legal challenges to get Motorola's contributions upstream. Now a decade into her tenure at the Linux Foundation, Kate leads …
…
continue reading
1
From Cars to Chaos: Jaguar Land Rover Cyber Fallout
1:01:33
1:01:33
Play later
Play later
Lists
Like
Liked
1:01:33This week on The Awareness Angle, Anthony Davis and Luke Pettigrew hit episode 52—a year of weekly podcasts—by digging into some of the biggest cyber stories shaking business, government, and everyday users. From billion-record breaches to fake podcast invites delivering malware, it’s another mix of serious lessons and eyebrow-raising human behavio…
…
continue reading
1
S6E23 - Unified DLP Platform - Monitor, alert and protect data using Purview DLP
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09Alan and Sam discuss the topic of DLP and how Purview can help audit policy matches and provide preventions. Aland goes though the range of capability and data sources that can be integrated with Purview DLP and some of the preventative actions. Some of the areas we also covered: What is Data Loss Prevention and why is it important? What capability…
…
continue reading
1
Apple Calendar Invites Are Being Turned Into Phishing Scams
51:56
51:56
Play later
Play later
Lists
Like
Liked
51:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew kick off Cybersecurity Awareness Month with new short videos made in collaboration with Hoxhunt—covering spear phishing, deepfakes, and the psychology behind social engineering. Then it’s straight into the big security stories of the week: from iCloud phishing invites to Scattered S…
…
continue reading
1
S6E22 - Microsoft updates August - new products and features released
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our interest. Some of the Microsoft product features and update we covered: Key Microsoft Entra, Intune and Defender features and updates Lots of Azure chan…
…
continue reading
1
Racing Against Quantum: The Urgent Migration to Post-Quantum Cryptography with KeyFactor's Crypto Experts
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19The quantum threat is real, and the clock is ticking. With government deadlines set for 2030, organizations have just five years to migrate their cryptographic infrastructure before quantum computers can break current RSA and elliptic curve systems. In this episode of "What's in the SOSS," join host Yesenia Yser as she sits down with David Hook (VP…
…
continue reading
1
700+ Companies Hit by SalesLoft Drift Hack, Are You At Risk?
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14This week on The Awareness Angle, Anthony Davis and Luke Pettigrew celebrate the 50th episode with community shoutouts, fresh awareness content, and a packed lineup of security stories. From password manager flaws to the first AI-powered ransomware. Whether it’s car dealerships grinding to a halt or deepfakes making truth harder to pin down, this o…
…
continue reading
1
Grok Chatbot Leaks 370,000 Private Conversations
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew come together for a special in-person episode while filming new Cybersecurity Awareness Month videos. From exposed AI chats to insider sabotage, telecom breaches, and Denmark’s bold new deepfake law, the conversation digs into how human behaviour, weak controls, and patchy regulatio…
…
continue reading
1
S6E21 - Protecting Data within Storage Accounts with Microsoft Defender for Storage
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43In this episode, we dive into Microsoft Defender for Storage, a key component of Microsoft Defender for Cloud. We break down its features for threat detection and malware scanning, discuss real-world benefits, and touch on pricing considerations. We cover: Introduction to Defender for Storage: Overview of its role in Microsoft Defender for Cloud an…
…
continue reading
1
Microsoft Global Secure Access: The Identity First Approach to Network Security
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57Hybrid work, SaaS adoption, and multi-cloud environments have changed the rules. Traditional VPNs and perimeter firewalls are not enough to keep users and data safe. Microsoft’s Global Secure Access (GSA) introduces a new identity first model that ties access directly to who the user is, the device they are on, and the conditions of the request. In…
…
continue reading
1
Securing AI: A Conversation with Sarah Evans on OpenSSF's AI/ML Initiatives
14:59
14:59
Play later
Play later
Lists
Like
Liked
14:59In this episode of "What's in the SOSS," we welcome back Sarah Evans, Distinguished Engineer at Dell Technologies and a key figure in the OpenSSF's AI/ML working group. Sarah discusses the critical work being done to extend secure software development practices to the rapidly evolving field of AI. She dives into the AI Model Signing project, the gr…
…
continue reading
1
Your VPN Extension Might Be Watching You Right Now
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05This week on The Awareness Angle, Anthony Davis and Luke Pettigrew unpack the latest mix of cyber weirdness, policy drama, and awareness lessons—from fake law firm emails dropping malware to pro-Russian hackers playing with dam floodgates. It’s a week of scams, slips, and security culture stories you’ll want to hear. 🇬🇧 Age Verification Laws – UK a…
…
continue reading
1
S6E20 - Unified SecOps Platform - Sentinel integration
46:44
46:44
Play later
Play later
Lists
Like
Liked
46:44Alan and Sam discuss the integration of Microsoft Sentinel into the Defender XDR portal. Alan goes through the benefits of the integration and thing to watch out for when starting the migration. Here are a few things we covered: What is Microsoft’s Unified SecOps Platform? What are the announcements around Microsoft Sentinel’s interface moving? Wha…
…
continue reading
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew share their experiences from the SANS Security Awareness Summit, exploring the latest threats, innovative awareness strategies, and the ever-evolving cybersecurity landscape. From vulnerabilities in everyday devices to scams targeting car finance payouts, this episode is packed with…
…
continue reading
In this episode of Android Back Stage, Hosts Tor, and Chet are joined by Melba and Ralston, Software Engineers on the Compose Team, to talk about Autofill in Compose. Learn about Autofill services, best practices, and more! Chapters: 0:00 - Intro 0:40 - What is Autofill? 1:21 - Autofill team journey and semantics 2:15 - Defining semantics in Compos…
…
continue reading