Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Protocols Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
  continue reading
 
Artwork

1
Packet Protector

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Ambassador at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuse ...
  continue reading
 
Artwork
 
here i uh think and stuff about Grapheneos i forgot i have a Peertube site i run freedom.fossfarmers.company https://www.youtube.com/@notafbihoneypot8487 send me xmr 46toA11xGi15Zo3LnGdMjL9GJTPavic3EdderjyE7aU9KGFK38mZv1YSmjo8RoKPRohjRtubkiFxL3bVXABT7N2ZBdDocLD here is my link stack! https://glowinglist.linksta.cc/@notafbihoneypot.bsky.social my blog (still being worked on) blog.notafbihoneypot.com
  continue reading
 
Artwork
 
Blockchain Germany™, powered by Startuprad.io, is your front-row seat to the European blockchain revolution. From Berlin to Zug, Frankfurt to Vienna, host Joe Menninger dives deep into how Web3, crypto startups, and venture capital are transforming the continent’s innovation landscape. Every episode delivers founder stories, investor strategies, and insider intelligence from the beating heart of Europe’s decentralized economy. Whether you’re a founder building in blockchain, a VC exploring t ...
  continue reading
 
Artwork

1
Bloom Fireside

Bloom Protocol

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Almost Diplomatic

Almost Diplomatic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
The Pirate Pod

Arrington Capital

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
  continue reading
 
Artwork

1
Governance Futures

Governance Futures Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Governance Futures - a podcast where we explore how governance works (and fails) in Web3 and beyond. Hosted by Eugene Leventhal and Jamilya Kamalova, each episode dives deep into the evolving principles of coordination, accountability, and collective decision-making in decentralized ecosystems. From DAOs to ancient constitutions, Wikipedia mods to protocol politics, we talk with builders, researchers, organizers, and rebels who are shaping how power is distributed - and who gets t ...
  continue reading
 
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
  continue reading
 
The Network+ Audio Course is your comprehensive audio training series for mastering the CompTIA Network+ certification. Designed for learners on the go, this Audio Course transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
  continue reading
 
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
  continue reading
 
Artwork

1
The Trident

U.S. Naval War College

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Artwork

1
Web 3 Native

LongHash Ventures

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by Emma and Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Payments on Fire™

Glenbrook Partners, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Podcasts from Glenbrook Partners on the latest developments in payments and fintech. Featuring interviews with opinion leaders, Glenbrook's own take on emerging technologies and industry trends, other news and views on this dynamic industry.
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Artwork

1
Urban Odyssey

Urban (@officialurbanus)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
A place to discuss different topics involving science, religion, philosophy, computers, and more. I find resources and make them available to the public FOR 100% FREE! Make sure to check out my bio for free resources: https://bio.link/officialurban Urban Odyssey Substack: https://theofficialurban.substack.com Urban on Twitch: https://twitch.tv/theurbanodyssey Facebook Page: https://www.facebook.com/theurbanodyssey Urban on X: https://x.com/officialurbanus YouTube: https://youtube.com/@Master ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Artwork

1
Badge Cam Daily

Badge Cam Daily

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Badge Cam Daily: America's Premier Police Body Camera Analysis Podcast The only daily podcast dedicated to professional analysis of police body camera footage from across the United States. Badge Cam Daily delivers authoritative briefings on the most compelling law enforcement encounters, investigative techniques, and public safety incidents captured on body-worn cameras. What You'll Get: Daily 5-minute professional briefings on breaking body cam cases Expert analysis of police procedures, s ...
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Tech 4 Thought

Sahib, Chris, Jacob, and Aidan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tech 4 Thought is your go-to podcast for breaking down the biggest headlines in AI, tech, and finance. Each week, our hosts explore trending stories—from AI breakthroughs and market disruptions to energy challenges and ethical dilemmas. We also dive deep into one major topic each episode to unpack how technology is shaping our future. Whether you're an AI nerd, tech investor, or just curious about the digital world, this podcast keeps you informed, inspired, and ahead of the curve.
  continue reading
 
Artwork

1
Azure Friday

Scott Hanselman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
  continue reading
 
Artwork
 
Shadow Me Next! is a podcast where we take you behind the scenes of the medical world. I'm Ashley Love, a Physician Assistant, and I will be sharing my journey in medicine and exploring the lives of various healthcare professionals. Each episode, I'll interview doctors, NPs, PAs, nurses, and allied health workers, uncovering their unique stories, the joys and challenges they face, and what drives them in their careers. Whether you're a pre-med student or simply curious about the healthcare f ...
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Welcome to the Guide to Short-Term Rental (STR) Management, a resource tailored for professional property managers. Unlike casual hosting, this role demands business expertise, profitability focus, and consistent value delivery to property owners. Laying the Foundation Start by establishing a strong legal and financial structure. Secure essential insurance policies like General Liability and Errors & Omissions (Professional Liability). Understand licensing and zoning rules by region, address ...
  continue reading
 
Loading …
show series
 
Operation Gladio Documentary Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substack (Biodigital Convergence)…
  continue reading
 
Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s p…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
In this episode Michael, Sarah and Mark discuss security-related topics from the recent Microsoft Ignite 2025 event. Lots of AI-related security topics, including using AI for security and defending AI systems. Bitlocker, Windows and so much more! This is the last episode of 2025! It was a blast, and thanks for listening! We hope you find this mate…
  continue reading
 
Follow Sabrina on Odysee || or Rumble Full Series Playlist Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substa…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
We start with a simple question: what is your why? Today we sit down with Dr. Ken Botelho, a seasoned primary care PA and the founding director behind a new Doctor of Medical Science program, to explore how purpose, presence, and mentorship shape better clinicians and healthier teams. From the first lab review of the morning to the final patient ca…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we'll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
https://texemarrs.com Show Date: December 13th, 2025 Jerry on X: https://x.com/jerryradioguy Pat McShay: https://x.com/j_mcshay Texe Marrs Drive: ⁠https://drive.google.com/drive/folders/17VWhqXyWxm3W6w9cM0q-HALRmAZwX-3P?usp=drive_link%E2%81%A0 Texe Marrs Playlist: https://open.spotify.com/playlist/6PnxvYt5hW5iUhVhuncOjo…
  continue reading
 
Watch Urban + Juxtaposition Interview Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substack (Biodigital Conver…
  continue reading
 
Follow Sabrina on Odysee || or Rumble Full Series Playlist Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substa…
  continue reading
 
Read the Article Human Husbandry The integration of Web3 and gamification under the guidance of NRx accelerationism is a calculated assault on human sovereignty. It leverages dopamine loops to manufacture consent for a “Unified Ledger” that functions as a global Skinner box, where financial survival is conditional on total obedience to the algorith…
  continue reading
 
Follow Sabrina on Odysee || or Rumble Full Series Playlist Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substa…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
Ethereum co-founder Joe Lubin joins Friederike Ernst to discuss why we are at the "end of a supercycle," a chaotic transition period where legacy institutions are finally adopting blockchain rails not just for efficiency, but for survival. They explore the "inevitable convergence" where the US government may actively rely on stablecoins to absorb d…
  continue reading
 
In this episode of JavaScript Jabber, Steve Edwards and I kick things off by catching up on life — from winter weather and marathon training to health journeys, CrossFit, and some behind-the-scenes personal stories that shaped how we think about wellness and longevity. After warming up, we shift our focus to the state of the tech job market, someth…
  continue reading
 
Ever wondered how hyperscale data centers like Microsoft’s run their networks with unmatched flexibility and control? Meet Sonic (Software for Open Networking in the Cloud)—the open-source network operating system (NOS) that’s revolutionizing modern networking by breaking free from vendor lock-in and monolithic systems. In this deep-dive breakdown,…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
#328: The build versus buy decision isn't as binary as most companies think. Every technology choice involves elements of both - you might use Linux (buy) but still configure and customize it extensively (build). The real question isn't whether to build or buy, but finding the right balance between the two approaches based on your company's resourc…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
Substack Article Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substack (Biodigital Convergence)…
  continue reading
 
In this episode of Software Engineering Radio, Srujana Merugu, an AI researcher with decades of experience, speaks with host Priyanka Raghavan about building LLM-based applications. The discussion begins by clarifying essential concepts like generative vs. predictive AI, pre-training vs. fine-tuning, and the transformer architecture that powers mod…
  continue reading
 
Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
  continue reading
 
Watch Urban + Juxtaposition Interview Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substack (Biodigital Conver…
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
Follow Sabrina on Odysee || or Rumble Full Series Playlist Follow Juxtaposition1 on Substack: juxtaposition1.substack.com/?r=3kr5wz Juxtaposition1 Archive (2,000k+ free Podcasts): https://archive.org/details/juxtaposition-1-audio Urban's Drive on Biodigital Convergence, Transhumanism & Human Husbandry Urban's Notes Database Posts by Urban on Substa…
  continue reading
 
Fluid is rapidly becoming one of the most important DeFi protocols on Ethereum — combining a money market, DEX, smart collateral, smart debt, and an industry-leading liquidation engine into one unified financial layer.In this episode of Web3 Native, we explore:• How Fluid reached $5B TVL and $22B in trading volume in 30 days• The architecture behin…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play