Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Protocols Podcasts
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
BusinessTravel360 is home to the best podcasts in travel. You can access all our amazing podcasts on all major podcast platforms by searching 'Business Travel 360'. Our dynamic podcasts cover all the important topics in travel such as the news, live discussions, traveler wellness, exclusive interviews, diversity and equity, security, leadership and much more. Visit us at BusinessTravel360.com
…
continue reading
Technical interviews about software topics.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
…
continue reading
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
…
continue reading
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Biometric Update Podcast bridges the gap between industry insiders and a general interest audience with clear, compelling stories about the biometrics and digital identity industry.
…
continue reading
Breaking Point – Tensions at Home and Abroad March 18, 2025 | Your Voice – Voices of America Podcast Good morning, America! Today’s episode of Your Voice delivers the stories shaping our world—from escalating conflicts overseas to major political shake-ups right here at home. Buckle up, because this one’s packed with breaking news, critical insights, and the bold discussions you’ve come to expect. 🔥 Middle East on Edge: Overnight Israeli airstrikes hit multiple targets in Gaza following rene ...
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
ConTejas Code is a podcast in the web engineering space that has deep dives on various topics between frontend engineering with React, TypeScript, Next.js, and backend engineering with Kafka, Postgres, and more. The series is a mix of long-form content and guest episodes with industry leaders in the web engineering space. From the podcast, listeners will take away actionable best practices that you can integrate into your workflows as well as valuable insights from prominent people in the in ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Henri Arslanian brings you in-depth discussions and constructive analyses of the developments shaping the future of money and finance from Bitcoin and cryptocurrencies to CBDCs and DeFi
…
continue reading
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
A podcast about the people who keep you safe at events and beyond.
…
continue reading
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
…
continue reading
A life coach for men, is the guaranteed way to achieve true masculinity. Life Coaching for men has helped men from all backgrounds unleash the best version of themselves through a mentor ship by a mens coach.
…
continue reading

1
Episode 115: Security in Model Context Protocol (MCP)
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58In this episode, Michael, Sarah and Mark talk to Den Delimarksy about the current posture of Model Context Protocol. Den serves on the committee that oversees MCP. We also cover the latest security news about Azure Firewall, OpenTelemetry, Azure Front Door, Azure Database for PostgreSQL and Azure Kubernetes Service. https://aka.ms/azsecpod…
…
continue reading

1
Measuring the actual impact of AI coding (Friends)
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Abi Noda from DX is back to share some cold, hard data on just how productive AI coding tools are actually making developers. Teaser: the productivity increase isn’t as high as we expected. We also discuss Jevons paradox, AI agents as extensions of humans, which tools are winning in the enterprise, how development budgets are changing, and more. Jo…
…
continue reading

1
Launch, Deploy, Expand: Tanssi’s Game-Changing MainNet Moment
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31Fresh off MainNet and TGE, Francisco Agosti of Tanssi Network and Thiago Rüdiger of the Tanssi Foundation join the Pirate Pod to dive into why app chains are the future of blockchain development and deployment, insights and challenges (and triumphs!) of launching a mainnet and token, ecosystem growth and more. The conversation dives in on how Tanss…
…
continue reading

1
Biometric Update Podcast Ep. 7 - AVPA's Iain Corby on Age Assurance
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27It's the summer of age assurance. With major developments happening in the UK, EU, Australia and the U.S., age assurance is going mainstream. In this episode, we talk with Iain Corby, executive director of the Age Verification Providers Association, about what it all means for providers of age verification and age estimation services.…
…
continue reading

1
Licensed to Shill IV: Tokenized Securities - Ownership & Rights; Navigating Crypto Transparency | Blockcast 69
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59Takatoshi Shibayama, Lisa Jy Tan, and Nikhil Joshi look at a token transparency framework and the responsibilities of disclosure. They also chat about the implications of tokenized securities, the risks associated with tokenized assets and the future of tokenization in the financial ecosystem. Chapters 00:00 Introduction to Crypto Transparency 02:5…
…
continue reading

1
Linking the Travel Industry | Qantas Hit by Data Breach
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16Send us a text Linking the Travel Industry is a business travel podcast where we review the top travel industry stories that are posted on LinkedIn by LinkedIn members. We curate the top posts and discuss with them with travel industry veterans in a live session with audience members. You can join the live recording session by visiting BusinessTrav…
…
continue reading

1
Speaking Up: The Developer’s Guide to Conference Talks & Career Growth - JSJ 682
1:44:52
1:44:52
Play later
Play later
Lists
Like
Liked
1:44:52In this episode of JavaScript Jabber, I am joined by three incredible guests — Ariel Shulman, Liad Yosef, and Eviatar Alush — to dive into the world of public speaking in tech. From the jitters of their first talk to the professional and personal growth that comes with hitting the stage, we unpack the full journey of becoming a tech speaker. Whethe…
…
continue reading

1
SE Radio 676: Samuel Colvin on the Pydantic Ecosystem
1:02:06
1:02:06
Play later
Play later
Lists
Like
Liked
1:02:06Samuel Colvin, the CEO and founder of Pydantic, speaks with host Gregory M. Kapfhammer about the ecosystem of Pydantic’s Python frameworks, including Pydantic, Pydantic AI, and Pydantic Logfire. Along with discussing the design, implementation, and use of these frameworks, they dive into the refactoring of Pydantic and the follow-on performance imp…
…
continue reading

1
Lightspeed search built for devs (Interview)
1:38:30
1:38:30
Play later
Play later
Lists
Like
Liked
1:38:30We talk with Don MacKinnon, Co-founder and CTO of Searchcraft—a lightspeed search engine built in Rust. We dig into the future of search, how it blends vector embeddings with classic ranking, and what it takes to build developer-friendly, production-grade search from the ground up. Join the discussion Changelog++ members save 6 minutes on this epis…
…
continue reading

1
From DeFi to RWA: Centrifuge CEO Bhaji Illuminati on Scaling the Digital Asset Economy
37:17
37:17
Play later
Play later
Lists
Like
Liked
37:17Bhaji Illuminati, the CEO of Centrifuge, joins the Pirate Pod to discuss the evolution and current state of Real World Assets (RWAs) and the maturation of the digital asset landscape. Bhaji shares insights on the challenges and opportunities in tokenization, the tailwinds of the regulatory landscape, institutional readiness and the technological in…
…
continue reading
Wiz is a cloud security platform that helps organizations identify and remediate risks across their cloud environments. The company’s platform scans layers of the cloud stack, including virtual machines, containers, and serverless configurations, to detect vulnerabilities and misconfigurations in context. The Model Context Protocol, or MCP, is emer…
…
continue reading

1
Brand building matters in crypto — OKX bets on trust, design and culture with Haider Rafique
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21My Interview with Haider Rafique, CMO, OKX at #token2049 Why the crypto industry must call out bad behaviour to move from the wild wild West to the middle mile West OKX’s pivot from centralised exchange to Web3 wallet and why product design and self-custody matter The role of storytelling in rebuilding crypto’s reputation after scandals like FTX Wh…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortio…
…
continue reading

1
Vitalik Buterin: Ethereum, The [LAST] Steward of Decentralisation
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19The tradition of Epicenter x Vitalik Buterin continued this year as well at EthCC[8], where we got the chance of picking his brain about recent research, interests and Ethereum Foundation’s direction going forward. Join us for a fascinating discussion on biotech and how Vitalik’s Shiba ended up funding it, the utility of blockchains in nowadays soc…
…
continue reading
Sean Varga, current regional sales manager with noted ASPM company Cycode joins Ken (@cktricky) and Seth (@sethlaw) to discuss the dawning realization organizations are having that they need AppSec experience and tech help to accompany their swelling numbers of developers. Sean's introduces "the OWASP Top 10 for AppSec Sales" to the community Befor…
…
continue reading

1
SED News: Data Land Grabs, Copyright Fights, and the Great AI Talent War
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and the wider tech industry. In this episode, Gregor and Sean dig into Meta’s legal battle over AI training data, discuss the strategic implications of Meta’s $14…
…
continue reading

1
Cardlytics CEO Amit Gupta - transaction data and commerce media
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44Amit Gupta is the CEO of Cardlytics (NASDAQ: CDLX), a global commerce media platform that powers rewards programs with card-linked offers and enables brands to strengthen customer loyalty. In this episode of World of DaaS, Amit and Auren discuss: How card-linked offers strengthen customer loyalty Identity resolution and retail media Cardlytics' vie…
…
continue reading

1
adversary group naming (noun) [Word Notes]
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.By N2K Networks
…
continue reading

1
What's Up in Business Travel | Corporations Scale Back Perks, Not Travel
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Send us a text Welcome to What’s Up in Business Travel for Week 26 of 2025. This is a weekly podcast where we update you on what’s up this week in the world of business travel. This podcast is great for those who need to know what’s happening all in under 15 minutes. Topics covered during this podcast - Corporations to cut perks not travel Global l…
…
continue reading
Justin Searls describes the “full-breadth developer” and why they’ll win because AI, Cloudflare comes up with a way publishers can charge crawlers for access, Hugo Bowne-Anderson explains why building AI agents fails so often, the Job Worth Calculator tells you if your job is worth the grind, and Sam Lambert announces PlanetScale for Postgres. View…
…
continue reading

1
Pratim Bhosale: How to get into AI from Backend Engineering
1:32:26
1:32:26
Play later
Play later
Lists
Like
Liked
1:32:26Links - CodeCrafters (partner): https://tej.as/CodeCrafters - Pratim on X: https://x.com/bhosalepratim - Tejas on X: https://x.com/tejaskumar_ Summary In this conversation, we explore the journey from backend development to becoming a Google Developer Expert in Golang. We discuss the significance of microservices architecture, the importance of sea…
…
continue reading

1
#240 - From CruiseCon to AI Threats (with Ira Winkler)
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22Join us for an engaging episode of CISO Tradecraft, hosted by G Mark Hardy, featuring cybersecurity veteran Ira Winkler. In this episode, we dive deep into cybersecurity careers, discuss the unique CruiseCon cybersecurity event, and explore the evolution of information security. Hear firsthand accounts of career journey highlights, networking strat…
…
continue reading

1
Cracking Passwords for Fun and Profit (hackover2025)
1:01:44
1:01:44
Play later
Play later
Lists
Like
Liked
1:01:44Wieso kommen meine Passwörter Abhanden? Wieso sind Sie nicht mehr sicher, wenn sie "Verloren" wurden? Was passiert mit Ihnen, wenn Sie in die falschen Hände geraten? Wie geht man vor, wenn man Passwörter erhalten hat? Wie kann ich mich schützen? Was kann ich tun um meine Passwörter zu verbessern? Wieso sollen die auch immer so lang sein? Was hat es…
…
continue reading

1
The year 2024 in context of global climate change (hackover2025)
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34Auf dem Hackover 24 hatten wir uns das Jahr 2023 im Kontext des globalen Klimawandels angeschaut. Der Vortrag endete mir der Aussicht, dass wir im Jahr 2024 das häufig medial beschriebene 1,5 Grad Ziel zu überschreiten dürften. Das haben wir auch erfolgreich geschafft.Der Talk stellt eine aktualisierte Version des Talks vom letztem Jahr dar. Wir fa…
…
continue reading

1
Handheld Reverse Engineering am Beispiel des Game Boy Advance (hackover2025)
46:52
46:52
Play later
Play later
Lists
Like
Liked
46:52In diesem Vortrag schauen wir uns an, wie der Game Boy Advance Handheld grundlegend funktioniert und wie mit gezielten Softwaretests neue Erkenntnisse gewonnen und die Kompatibilität von Emulatoren verbessert werden kann.Nintendo veröffentlichte den Game Boy Advance im Jahr 2001. Seitdem verkaufte sich der Handheld über 80 Millionen Mal und ist dam…
…
continue reading

1
Domänenspezifische Sprachen zum Reverse Engineering von Datenformaten (hackover2025)
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Es existieren bereits einige Domänenspezifische Sprachen zum Beschreiben von Datenformaten. Dieser Talk geht auf die Grundlagen des Reverse Engineering von Datenformaten ein, welche DSLs zum Beschreiben von Datenformaten es gibt, wie sich diese beim Reverse Engineering benutzen lassen und welche Vorteile sie bieten können.Licensed to the public und…
…
continue reading

1
Verwaltung von Secrets mit SOPS (hackover2025)
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40Wer seine (Cloud-) Infrastruktur als Code pflegt, wird früher oder später vor der Herausforderung stehen, sich mit der Verwaltung von Passwörtern und sonstiges schützenswerten Informationen auseinanderzusetzen. Eine Möglichkeit besteht mit SOPS - dem Secrets OPerationS Tool von Mozilla.Dieser Talk wird einen ersten Überblick zu SOPS geben, welche V…
…
continue reading

1
Linking the Travel Industry | Google Donates Agent2Agent Protocol to The Linux Foundation
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06Send us a text Linking the Travel Industry is a business travel podcast where we review the top travel industry stories that are posted on LinkedIn by LinkedIn members. We curate the top posts and discuss with them with travel industry veterans in a live session with audience members. You can join the live recording session by visiting BusinessTrav…
…
continue reading

1
Rettung eines Redis Cache - Zugriffe synchronisieren mit RabbitMQ Topics (hackover2025)
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Microservices sind modern, eine Pipeline mit Message Queues und Cache wird da schnell mal hingeklatscht. In diesem Vortrag seht ihr ein anonymisiertes Fallbeispiel aus einem Projekt, bei dem der Cache inkonsistent wurde, fremde Devs mit Redis-Locks dagegen hielten bis das System lahmte und dann schnell die Firma verließen. Ich zeige euch, wie ich d…
…
continue reading

1
Patterns in Chaos: How Data Visualisation Helps To See the Invisible (hackover2025)
1:03:48
1:03:48
Play later
Play later
Lists
Like
Liked
1:03:48Hidden patterns are all around us — but they often stay buried within raw data. This talk explores how clever data visualisation techniques can uncover complex patterns and reveal hidden connections. Through practical examples, we will illuminate the intricate interplay between data, perception, and insight.Licensed to the public under https://crea…
…
continue reading

1
Selling mountain bikes all over the planet (Friends)
2:08:08
2:08:08
Play later
Play later
Lists
Like
Liked
2:08:08Jeff Cayley joins Adam to talk about selling mountain bikes all over the planet and making some of the best outdoor and mountain bike gear, parts, and accessories you can buy. They have a killer YouTube channel as well. Join the discussion Changelog++ members save 62 minutes on this episode because they made the ads disappear. Join today! Sponsors:…
…
continue reading

1
Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech comp…
…
continue reading

1
No Jet Stress | Exploring Airline Passenger Wellbeing with Alex Vukolova (Part 1)
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18Send us a text The NoJetStress Podcast is a traveler wellbeing podcast for frequent business travelers covering health and peak performance on the road as well as to help business travelers maintain optimal health and avoid burnout no matter how much they travel. Christopher Babayode, a Corporate Travel Wellness Expert shares his insights on Travel…
…
continue reading
Anaconda is a software company that’s well-known for its solutions for managing packages, environments, and security in large-scale data workflows. The company has played a major role in making Python-based data science more accessible, efficient, and scalable. Anaconda has also invested heavily in AI tool development. Greg Jennings is the VP of En…
…
continue reading

1
Brushed aside: The subtle scam you didn't order.
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a compl…
…
continue reading
Thorsten Ball returned to Sourcegraph to work on Amp because he believes being able to talk to an alien intelligence that edits your code changes everything. On this episode, Thorsten joins us to discuss exactly how coding agents work, recent advancements in AI tooling, Amp’s uniqueness in a sea of competitors, the divide between believers and skep…
…
continue reading
Ken returns after a week's hiatus to review the latest AppSec news with Seth. Specifically, the idea that authentication fatigue exists for both consumers and developers. The amount of choice to implement security controls can have unintended consequences and introduces risk that may or may not be considered. This is followed by research from Squar…
…
continue reading

1
SE Radio 675: Brian Demers on Observability into the Toolchain
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
…
continue reading

1
Stripe: The Stablecoin (R)Evolution - John Egan
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36Stripe has established itself as a leading payment solution for both enterprises as well as startups and individual sellers. By abstracting away all the complexities of traditional payment rails through simple plug-and-play APIs, Stripe created a facile route for cross-border payments, simplifying e-commerce. Similarly, Stripe’s recent integration …
…
continue reading

1
ByteDance’s Container Networking Stack with Chen Tang
47:57
47:57
Play later
Play later
Lists
Like
Liked
47:57ByteDance is a global technology company operating a wide range of content platforms around the world, and is best known for creating TikTok. The company operates at a massive scale, which naturally presents challenges in ensuring performance and stability across its data centers. It has over a million servers running containerized applications, an…
…
continue reading

1
Fabrice Grinda of FJ Labs - diversified portfolios, secondary sales and dinner parties
52:46
52:46
Play later
Play later
Lists
Like
Liked
52:46Fabrice Grinda is the co-founder and managing partner of FJ Labs, a venture capital firm that has invested in over 1,200 startups with more than 350 exits, including early investments in Alibaba, Flexport, and Delivery Hero. He previously built and sold three companies as CEO: Aucland (one of Europe's largest auction sites), Zingy (mobile media sta…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike.
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading

1
Exploring BTEX 2025: Insights and Innovations
58:21
58:21
Play later
Play later
Lists
Like
Liked
58:21In this episode, KJ discusses the insights and experiences shared by various presenters at CDW Canada's Business Technology Expo (BTEX) 2025, highlighting the significance of the event in showcasing technological advancements and strategies for businesses. Key themes include the transition to Windows 11, the importance of cybersecurity, the evoluti…
…
continue reading
David Singleton says coding agents have crossed a chasm, Anton Zaides explains how SWEs should approach the “squeeze”, Mat Duggan has ideas for Kubernetes 2.0, Sean Goedecke does a nice job elucidating the coding agent commoditization, and one more good reason to write, even though it’s hard. View the newsletter Join the discussion Changelog++ memb…
…
continue reading

1
Biometric Update Podcast Ep. 6 - No Phone Home
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27Biometric Upadate editor-in-chief Chris Burt speaks with three representatives from the No Phone Home campaign, which is warning against the potential privacy risks in digital identity systems that use "phone home" or server retrieval methods.By Biometric Update
…
continue reading

1
What's Up in Business Travel | Hawaiian Airlines Impacted by Cybersecurity Incident
14:49
14:49
Play later
Play later
Lists
Like
Liked
14:49Send us a text Welcome to What’s Up in Business Travel for Week 25 of 2025. This is a weekly podcast where we update you on what’s up this week in the world of business travel. This podcast is great for those who need to know what’s happening all in under 15 minutes. Topics covered during this podcast - Over 72M people expected to travel Travel Wee…
…
continue reading