Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Engineers Podcasts
Technical interviews about software topics.
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
We share the most critical perspectives, habits & examples of great software engineering leaders to help evolve leadership in the tech industry. Join our community of software engineering leaders @ www.sfelc.com!
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
...where Tech, Engineering, and The Culture intersects.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Little Fluffy PolyClouds: The Data Engineering Playbook is your essential guide to building cloud-agnostic data infrastructure. We provide practical, step-by-step strategies for designing and deploying resilient data systems across all major platforms, including AWS, Azure, and GCP.
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
A podcast for Architects and Engineers who want to thrive in this industry by creating more freedom, fulfillment and financial security. Join Scott Zurn, P.E. and guests in uncovering how to restore value and honor to the unique people who choose to be designers and caretakers of our built world and why it’s essential to the future of our society, our industry, and our planet.
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Honest conversations with the engineering leaders, CTOs, founders, and engineers building real software with real teams. No fluff, no hype — just the messy, human side of getting great products out the door.
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
1
How to Build Trust Between GRC and Engineering ft Tristan Ingold, Security GRC Program Manager at Meta
57:19
57:19
Play later
Play later
Lists
Like
Liked
57:19How do you build real trust between GRC and engineering? In this episode of Security & GRC Decoded, host Raj Krishnamurthy welcomes Tristan Ingold, Security GRC Program Manager at Meta. Tristan shares how consulting shaped his approach, why “policing” doesn’t work, and how GRC earns influence by acting as a partner to engineering -- not a blocker. …
…
continue reading
1
Episode 4: The Data Fortress: Securing and Governing Data for the DEA-C01
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Lock down your data platform! This is the final domain, Domain 4 (18% of the DEA-C01 exam). We cover essential security best practices: using IAM and Lake Formation for access control, enforcing encryption with KMS (at rest and in transit), and securing network access via VPC and Security Groups.By James
…
continue reading
1
Turning Trust into a Growth Engine with SafeBase by Drata
19:51
19:51
Play later
Play later
Lists
Like
Liked
19:51All links and images can be found on CISO Series. Earning and maintaining customer trust has become increasingly complex as organizations struggle with manual, repetitive security review processes that frustrate customers and slow revenue cycles. Despite decades of talking about customer trust in security, companies still rely on outdated approache…
…
continue reading
1
Ep. 325 - Security Awareness Series - A Crystal Ball for Mitigating Threats With Chris and Carter
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human…
…
continue reading
1
Using digital tools to enable SMEs to grow by doing what they do best
1:08:13
1:08:13
Play later
Play later
Lists
Like
Liked
1:08:13In this month’s episode we welcome the CEO of Projectworks, Mark Orttung, to discuss how his company’s software is facilitating growth among the construction and engineering sector’s vital small and medium enterprises (SMEs). We start by learning from Mark about why Projectworks’ offerings are particularly suited to SMEs and how it can help to prov…
…
continue reading
1
Why you need a digital estate plan (and where to start) with Erin Bury | ONLINE LEGACY WILL PLANNING
1:17:03
1:17:03
Play later
Play later
Lists
Like
Liked
1:17:03Ever wondered what happens to your online accounts when you’re gone? 💭 This week, we’re joined by Erin Bury, Co-founder and CEO of Willful, to talk about the importance of digital estate planning — what it is, why it matters, and how to make it easier. Erin breaks down how to protect your online accounts, manage your digital legacy, and give your l…
…
continue reading
1
Navigating AI Policy: Challenges in Privacy, Governance, and Regulation with Shane Tews Part 2
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Welcome back to Forcepoint's "To the Point Cybersecurity Podcast"! In this week's episode, hosts Rachael Lyon and Jonathan Knepher sit down for part two of their compelling conversation with Shane Tews, non-resident senior fellow at the American Enterprise Institute and president of Logan Circle Strategies. Together, they dive into the complex worl…
…
continue reading
1
Building an Open-Source Laptop with Byran Huang
53:56
53:56
Play later
Play later
Lists
Like
Liked
53:56Byran Huang is a full stack developer who recently made headlines in the hacker space when he created the anyon_e, which is a highly integrated, open source laptop. The effort was a massive undertaking and showcased great design, hardware, and software. In this episode, Byran joins the show with Gregor Vand to talk about his work on the anyon_e lap…
…
continue reading
1
Private Network Access (PNA) (noun) [Word Notes]
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.By N2K Networks
…
continue reading
1
Episode 127: Samantha Mabey on Crypto Agility and preparing for a Quantum-Safe Future
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03In Episode 127, Patrick and Ciprian speak with Samantha Mabey, Director of Product Marketing for the Data Security Solutions at Entrust, to discuss the evolving landscape of cryptography, particularly the transition to post-quantum cryptography (PQC). They explore the implications of moving away from traditional algorithms like RSA and ECC, the imp…
…
continue reading
1
From Data to Performance: Understanding and Improving Your AI Model
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction capabilities and automation through their capacity to analyze and classify data. To produce such results, these methods depend on correlations. However, an overreliance on correlations can lead to predic…
…
continue reading
1
Built by Humans: why developers should talk direct | Zhenya Rozinskiy, Max Kryzhanovskiy
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58Most outsourcing teams fail for one reason. Too many layers between the people who build and the people who decide. In this episode, Zhenya Rozinskiy talks with Max Kryzhanovskiy, CEO of MOS Creative, about what happens when agencies and startups build together and how to avoid losing tribal knowledge in the handoff. They cover: • Why gatekeeping t…
…
continue reading
1
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
…
continue reading
1
The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. Redd…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
…
continue reading
1
Investing on the Front Lines of the AI Arms Race | Nathan Benaich
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48In Episode 448 of Hidden Forces, Demetri Kofinas speaks with Nathan Benaich, founder and general partner of Air Street Capital and the creator of the annual State of AI Report, an open-access compendium that tracks advances across AI research, industry, policy, and geopolitics. Nathan Benaich and Demetri spend the first hour of their conversation e…
…
continue reading
1
Ep. 328 - Human Element Series - Empathy Communication and Storytelling with Tanya Van Cott
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44Today we're joined by Tanya Van Cott. Tanya is a New York–based architect, industrial designer, and educator whose work explores how design and storytelling can drive social change. A graduate of Pratt Institute, Tanya has been recognized by the National Endowment for the Arts with a Presidential Design Achievement Award and has been published for …
…
continue reading
Start your week with a laugh. And yes, it’s work-relevant. Today’s guests, John Fokker, Head of Threat Intelligence, and Jambul Tologonov, Security Researcher at Trellix, have spent years monitoring the dark web and have quite a few stories to tell. They are joining Robby to talk about their concept "Dark Web Roast", a satirical look at cyber crimi…
…
continue reading
This episode proves that nothing gold can stay, especially your 401k, as we kick things off with the revelation that October saw the worst tech layoffs since 2003, all while "Big Short" genius Michael Burry decided to bet a billion dollars on the inevitable AI bubble bursting. The villains of the week are legion: the FCC is officially making it eas…
…
continue reading
1
What Are The BIGGEST Cyber Security Risks In SaaS Platforms?
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-s…
…
continue reading
1
Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Can your organization truly trust every identity, human, machine, and AI? The traditional security perimeter is no longer a reliable boundary. As enterprises adopt hybrid infrastructures, cloud services, and autonomous AI systems, identity has emerged as the central element of effective cybersecurity. In the latest episode of The Security Strategis…
…
continue reading
1
Episode 545: No one cares about Chickens
1:12:45
1:12:45
Play later
Play later
Lists
Like
Liked
1:12:45This week, we discuss cloud earnings, Siri teaming up with Gemini, and AI bottlenecks. Plus, is cloning your dog weird? Watch the YouTube Live Recording of Episode 545 Runner-up Titles Stack the deck Pets and Chickens Blame it on Android They’re fungible Are they going to have to introduce a new principle? Managers of rocks The world we live in Mar…
…
continue reading
1
How AI is Expanding the CIO Role with Chetna Mahajan of Webflow
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30In this episode, Chetna explains how new automation strategies are evolving not only productivity, but the role of the CIO. Chetna emphasizes the importance of data quality and security when scaling a fast-growing company, as well as transparency and partnership in vendor relationships. About the Guest: Chetna is an award winning CIO, board member,…
…
continue reading
1
How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, talks with Stefanie Hammond, Head Nerd at N-able, and Jim Waggoner, Vice President of Product Management at N-able. They disc…
…
continue reading
1
The Architecture of the Internet with Erik Seidel
51:20
51:20
Play later
Play later
Lists
Like
Liked
51:20The modern internet is a vast web of independent networks bound together by billions of routing decisions made every second. It’s an architecture so reliable we mostly take it for granted, but behind the scenes it represents one of humanity’s greatest engineering achievements. Today’s internet is also dramatically more complex and capable than in i…
…
continue reading
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Julie Tsai, CISO-in-Residence, Balli…
…
continue reading
1
Teaching girls to find confidence and community in hacking with Bianca (BiaSciLab) Lewis
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Welcome to a new episode of Clearly Cyber, the PRPR podcast. We're really excited to bring you this new episode with Bianca, aka BiaSciLab, founder of Girls Who Hack. Bianca talks about how she first entered the world of cyber at age 11, and the challenges she faced being a girl in a male-dominated environment. She also reflects on her mission to i…
…
continue reading
1
A Practical History of Financial Markets | Russell Napier
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Demetri Kofinas speaks with financial historian and investor Russell Napier about his "Practical History of Financial Markets" online course, which is provided in conjunction with Edinburgh Business School. Hidden Forces premium subscribers can sign up using their subscriber email + code "HF50" for a generous 50% DISCOUNT. Genius members can access…
…
continue reading
1
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
…
continue reading
1
90% of AI Demos Fail. Here’s How to Build One that Won’t
59:22
59:22
Play later
Play later
Lists
Like
Liked
59:22If you’ve ever shipped an AI feature that looked great in testing — only to watch it behave unpredictably in production — you’re not alone. In this episode of IT Visionaries, host Chris Brandt talks with Lawrence Jones, Founding Engineer at incident.io, about the critical gap between AI that demos well and AI that works under pressure. Lawrence sha…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing s…
…
continue reading
1
SE Radio 693: Mark Williamson on AI-Assisted Debugging
54:12
54:12
Play later
Play later
Lists
Like
Liked
54:12Mark Williamson, CTO of Undo, joins host Priyanka Raghavan to discuss AI-assisted debugging. The conversation is structured around three main objectives: understanding how AI can serve as a debugging assistant; examining AI-powered debugging tools; exploring whether AI debuggers can independently find and fix bugs. Mark highlights how AI can suppor…
…
continue reading
1
Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥 The $550M AWS outage & how it spr…
…
continue reading
1
Accelerating Innovation: Wi-Fi HaLow for Industrial IoT & CodeFusion Studio for AI Development
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33Send us a text In this episode of Embedded Insiders, the VP of Sales and Business Development at Gateworks Corporation, Kelly Peralta, joins me to discuss the trends, challenges, and innovations surrounding Wi-Fi HaLow for industrial and IoT applications. The next segment is sponsored by Analog Devices, and Contributing Editor, Rich Nass, and Analo…
…
continue reading
1
The Impossible Job of Managers, Leadership Co-Pilots, Scaling Great Management & Augmenting Human Relationships w/ Jonathan Raymond #235
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09In today’s technology landscape, management as a skill is becoming more complex as teams become larger & managers must navigate the balance between relationships and strategic execution. So how can AI tools help managers level up their game? Jonathan Raymond (Founder & CEO @ Ren) shares insights that can help managers navigate their modern-day invi…
…
continue reading
1
Monthly News Update: DNS Did That Thing Again...
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20Send us a text Start with a simple truth: when the platform breaks, your clever architecture won’t save you. We dig into the AWS US‑East‑1 outage where DynamoDB’s role in DNS planning for load balancers collided with a race condition, leaving empty records and stalled EC2 instances. Forget the finger‑wagging about “well‑architected” apps—this was a…
…
continue reading
1
Guest Host: Kelsey Hightower - Beyond Pipelines: Infrastructure As Data
48:51
48:51
Play later
Play later
Lists
Like
Liked
48:51Is your Git repo really the source of truth for infrastructure - or just a suggestion? Guest host Kelsey Hightower sits down with Cory O’Daniel to unpack why many teams hit dead ends with CI/CD for provisioning, where GitOps struggles with drift, and when TicketOps helps or hurts. They explore a different model: infrastructure as data with typed co…
…
continue reading
China analyst and former policymaker Elizabeth Economy sits down with Ravi Agrawal to unpack the meeting that took place last week between U.S. President Donald Trump and Chinese President Xi Jinping. What was agreed to? What does it mean for the broader trajectory of the world’s most important bilateral relationship? Plus, Ravi’s One Thing on Trum…
…
continue reading
1
Understanding Ransomware Gangs: Key Information
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into Understanding Ransomware Gangs: Key Information. Including the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #…
…
continue reading
1
How to put AI agents safely into production (with Eric Olden)
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37AI agents can burn through budgets and trust in minutes. Eric Olden, Co-Founder and CEO of Strata Identity, breaks down the control plane founders need: policy-driven guardrails, intent/context/outcome audit, and lifecycle governance—so you can move from sandbox to production with confidence. Eric: https://www.linkedin.com/in/boughtnotsold Strata I…
…
continue reading
1
Navigating AI Policy: Challenges in Privacy, Governance, and Regulation with Shane Tews
21:16
21:16
Play later
Play later
Lists
Like
Liked
21:16Welcome to this week's Forcepoint podcast episode, where hosts Rachael Lyon and Jonathan Knepher dive into the ever-evolving landscape of cybersecurity, digital policy, and the intersection of innovation and regulation. Joining them is Shane Tews, non-resident senior fellow at the American Enterprise Institute and president of Logan Circle Strategi…
…
continue reading
1
SED News: AMD’s Big OpenAI Deal, Intel’s Struggles, and Apple’s AI Long Game
49:02
49:02
Play later
Play later
Lists
Like
Liked
49:02SED News is a monthly podcast from Software Engineering Daily where hosts Gregor Vand and Sean Falconer unpack the biggest stories shaping software engineering, Silicon Valley, and the broader tech industry. In this episode, they cover the $1.7B acquisition of Security AI, LangChain’s massive valuation, and the surprise $300M funding” round for Per…
…
continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
continue reading
1
Built by Humans: how to hire globally without losing control | Zhenya Rozinskiy, Brian Regienczuk
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46Outcomes suffer when incentives are wrong. Hours get billed. Problems get yes. In this episode, Zhenya Rozinskiy sits down with Brian Regienczuk, CEO and founder of SpotSource, to discuss building distributed teams without losing control over communication, culture, or results. They cover: • Regional communication styles, from reflexive yes to argu…
…
continue reading