Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Solutions Podcasts

show episodes
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

4
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

4
Philosophize This!

Stephen West

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
  continue reading
 
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
  continue reading
 
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Artwork
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
The IQT Podcast explores and offers insight about rapidly evolving technology trends and their impact and contributions to national security. Subscribe to hear from IQT and other thought leaders across a variety of tech domains, including AI and machine learning, biotechnology, autonomous systems, and more. IQT identifies, adapts, and delivers technology solutions from commercial startups to support the national security missions of the U.S. and its allies. Learn more at www.iqt.org.
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

4
CollisionCast

FenderBender

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CollisionCast is the premier collision repair industry podcast, helping shop owners and operators improve their businesses with real-world solutions to common problems, delivered by leading industry experts and elite shop leaders.
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

51
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
  continue reading
 
Artwork

1
CloudNext

GlobalDots

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Loading …
show series
 
Semper Valens Solutions designs DevSecOps infrastructure for DISA, develops cyber weapons systems for the Air Force, supports the Army’s deployment of force protection platforms and C2 systems, plus does non-cleared work for DHA, VA, and the FBI. Company COO Nick Brown shares the importance of treating candidates well in the hiring process, doing m…
  continue reading
 
In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growin…
  continue reading
 
ePlus Security + F5 API Security Podcast Series where ePlus’ David Tumlin and F5’s Chuck Herrin share why visibility is the foundation of modern security—and how together, ePlus & F5 are helping organizations manage the real challenges of API security in today’s hybrid, multi-cloud world.By David Tumlin, ePlus and Chuck Herrin, F5
  continue reading
 
Star Link Communication is revolutionizing workforce management by offering AI-powered facial recognition systems to eliminate proxy attendance and ensure data accuracy. To support a smooth upgrade from outdated fingerprint systems, the company provides buyback options. Responding to client feedback, Star Link has enhanced device durability with re…
  continue reading
 
Security orchestration sounds great in theory, but in practice, coordinating between different security tools remains a headache. As workflows need to move faster to keep pace with AI-driven attacks, security professionals find themselves overwhelmed with manual "muck work" rather than focusing on business enablement. In this episode, Matt Muller, …
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
In this episode of Talking Cloud, Yair Herling and I discuss the evolving landscape of cybersecurity, focusing on exposure management and the importance of remediation strategies. We explore the challenges of cyber war, the balance between fear and hope in security, and the role of AI in enhancing cybersecurity measures. The conversation emphasizes…
  continue reading
 
Securely Deploying HumanGov on AWS EC2 Across States Using Ansible and GitOps with CodeCommit https://knowledge.businesscompassllc.com/securely-deploying-humangov-on-aws-ec2-across-states-using-ansible-and-gitops-with-codecommit/ Ever stared at your screen for hours trying to deploy HumanGov across multiple state servers, wondering if there’s a bet…
  continue reading
 
Automate FreeBSD Image Creation for AWS EC2 with Packer and EC2 AMI Tools https://knowledge.businesscompassllc.com/automate-freebsd-image-creation-for-aws-ec2-with-packer-and-ec2-ami-tools/ Ever spent hours manually creating custom FreeBSD images for AWS only to end up with something that breaks in production? Yeah, me too. It’s a special kind of f…
  continue reading
 
LocalStack for SDETs: Seamless Spring Boot Testing with DynamoDB Integration https://knowledge.businesscompassllc.com/localstack-for-sdets-seamless-spring-boot-testing-with-dynamodb-integration/ Ever spent hours battling mock services for your Spring Boot tests, only to have everything break in production anyway? Yeah, me too. It’s the special kind…
  continue reading
 
Manage Complex AWS Setups Using Terragrunt and Terraform the Right Way https://knowledge.businesscompassllc.com/manage-complex-aws-setups-using-terragrunt-and-terraform-the-right-way/ Ever stared at your AWS infrastructure and thought, “This is a mess, and I have no idea how to manage it properly”? You’re not alone. Thousands of DevOps engineers st…
  continue reading
 
Simplify Data Lakehouse Architecture Using Iceberg and AWS Glue Catalog https://knowledge.businesscompassllc.com/simplify-data-lakehouse-architecture-using-iceberg-and-aws-glue-catalog/ You’re probably spending 60% of your engineering time just wrestling with data inconsistencies across your lakehouse architecture. Am I right? Data teams everywhere…
  continue reading
 
Terraform Code Hygiene: Automate Quality Checks with TFLint and FMT https://schedule.businesscompassllc.com/ Infrastructure as Code (IaC) has revolutionized cloud provisioning, with Terraform emerging as a dominant tool for managing cloud infrastructure. However, maintaining code quality and consistency becomes crucial as teams grow and codebases e…
  continue reading
 
Build and Provision a Web Server with Terraform on AWS, Azure, or GCP https://schedule.businesscompassllc.com/ Provisioning cloud infrastructure manually can be time-consuming and error-prone. Enter Terraform, an open-source Infrastructure as Code (IaC) tool that enables you to automate and manage your infrastructure reliably across multiple cloud …
  continue reading
 
Build and Configure a Kafka Cluster on AWS EC2: A DevOps Guide https://schedule.businesscompassllc.com/ Apache Kafka is a powerful distributed streaming platform for building real-time data pipelines and streaming applications. Deploying Kafka on AWS EC2 offers flexibility and control, making it a preferred choice for DevOps professionals who want …
  continue reading
 
Image Intelligence at Scale: VisualInsight’s AI-Powered Automation Explained https://schedule.businesscompassllc.com/ In the ever-evolving digital landscape, the ability to analyze and understand images at scale has become essential. Whether for content moderation, product tagging, security surveillance, or visual search, businesses increasingly us…
  continue reading
 
Secure AWS Credentials in GitLab CI/CD Using HashiCorp Vault https://schedule.businesscompassllc.com/ As organizations shift towards DevSecOps and adopt cloud-native CI/CD pipelines, securing cloud credentials becomes a top priority. This podcast walks you through the best practices for securely managing and injecting AWS credentials into GitLab CI…
  continue reading
 
In Episode 10, we take an in-depth look at the latest report from cybersecurity researcher Francis Odum, uncovering the key insights behind the numbers. We discuss: How third-party and credential-based risks are evolving What the report reveals about attacker tactics and system intrusion trends The growing risk surface of browsers and unmanaged end…
  continue reading
 
Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~ In today’s DailyCyber Podcast, I’m joined by Paul Caron, Head of Cyber Security, Americas at S-RM. Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Res…
  continue reading
 
The Lighthouse IT Podcast - July 11th, 2025 This week, Matt and Griff dive into: 🏎️ Apple's F1 Movie Races to the Big Screen, and Controversy 🪦 RIP Blue Screen of Death. Meet Its Dark Successor 🖼️ PNG Format Is Back, and It's Better Than Ever 🗣️ Branding 101: Should Your Company Yell or Whisper? 🤑 Cloudflare Tells Bots to Pay Up 📈 Bots Buying Ads? …
  continue reading
 
Vietnam has been clawing its way up the American import leaderboard. With Trump's July 9 tariff decision-day quickly approaching, let's look at why Vietnam is next in line to China. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/made-in-china-becomes-made-in-vietnam…
  continue reading
 
We’re looking today at how a fake McDonald’s led security researchers to real sensitive info on 64 million real people. It’s a lesson on how NOT to do it. Then, is it smart to buy smart devices? As Belkin prepares to kill support for most of its Wemo line, we’ll revisit the topic. That’s all on this edition of The Checklist, brought to you by Secur…
  continue reading
 
OCI Web Application Firewall is the top choice in this episode as Bizionic Tech compares it with AWS and Azure to determine what's best for Detroit’s cybersecurity needs. Tune in to explore why OCI WAF stands out for local enterprises—from performance and scalability to pricing and compliance. 🔒 Don’t miss this crucial insight—Listen now and secure…
  continue reading
 
Authenticate Docker to Amazon ECR on Ubuntu with ECR Credential Helper https://knowledge.businesscompassllc.com/authenticate-docker-to-amazon-ecr-on-ubuntu-with-ecr-credential-helper/ Ever pulled your hair out trying to authenticate Docker with Amazon ECR on Ubuntu? You’re not alone. Developers everywhere are silently cursing at their terminals whi…
  continue reading
 
Secure Your Kubernetes Cluster: External Secrets Operator on AWS EKS with Terraform https://knowledge.businesscompassllc.com/secure-your-kubernetes-cluster-external-secrets-operator-on-aws-eks-with-terraform/ You’re staring at your Kubernetes cluster, feeling that constant security anxiety. “Are my secrets really safe?” It’s the question that haunt…
  continue reading
 
Amazon EKS Auto Mode: Effortless Kubernetes Management in the Cloud https://knowledge.businesscompassllc.com/amazon-eks-auto-mode-effortless-kubernetes-management-in-the-cloud/ Ever spent 20 hours troubleshooting Kubernetes node configurations when you should’ve been building actual features? Yeah, you’re not alone.…
  continue reading
 
Customizing API Gateway Requests and Responses Using Velocity Template Language (VTL) https://knowledge.businesscompassllc.com/customizing-api-gateway-requests-and-responses-using-velocity-template-language-vtl/ Ever stared at API Gateway integration code wondering if there’s a better way to massage that request before it hits your backend? If you’…
  continue reading
 
Unlocking the Power of AWS CloudWatch: Real-Time Monitoring Made Simple https://knowledge.businesscompassllc.com/unlocking-the-power-of-aws-cloudwatch-real-time-monitoring-made-simple/ Ever waited on hold with IT for 40 minutes while your cloud service was down, costing your company thousands in lost productivity? Yeah, that’s the nightmare AWS Clo…
  continue reading
 
How to Enable FinOps During the Deploy Phase of DevOps https://schedule.businesscompassllc.com/ The deployment phase of DevOps is where applications go live, resources are provisioned, and real cloud spending begins. This stage also presents a golden opportunity to integrate FinOps (Financial Operations) principles, bridging the technical and finan…
  continue reading
 
Automate Release Documentation: Python Scripts and Confluence Wiki Integration https://schedule.businesscompassllc.com/ Managing release documentation can be time-consuming and error-prone, especially in fast-paced development environments. Automating this process using Python and integrating it with Confluence—a popular team collaboration tool—can…
  continue reading
 
Generative AI in the Cloud: How to Use AWS Bedrock for Real-World Applications https://schedule.businesscompassllc.com/ The landscape of artificial intelligence is rapidly evolving, with Generative AI emerging as a transformative force across industries. Whether it's generating text, code, images, or even synthetic data, businesses are finding new …
  continue reading
 
Terraform Best Practices: Using cidrsubnet and Loops for Scalable Subnet Management https://schedule.businesscompassllc.com/ Managing scalable and maintainable subnets is a cornerstone of efficient infrastructure as code (IaC) with Terraform. Rather than hardcoding subnet CIDRs manually, using cidrsubnet in conjunction with Terraform loops (like fo…
  continue reading
 
Leveraging Open Source to Build Scalable Internal Tools: A Real-World Guide https://schedule.businesscompassllc.com/ In today’s fast-paced tech landscape, building internal tools is no longer a luxury—it's a necessity for operational efficiency. However, the costs and complexities of custom development can often be a barrier. That's where open-sour…
  continue reading
 
New York Times columnist Thomas Friedman sits down with Ravi Agrawal to debrief this week’s meeting between U.S. President Donald Trump and Israeli Prime Minister Benjamin Netanyahu at the White House. Friedman is also the author of From Beirut to Jerusalem, among other books. Thomas L. Friedman: How Trump’s ‘Big, Beautiful Bill’ Will Make China Gr…
  continue reading
 
The future of the Democratic Party in the US isn't looking too bright. When strategy and targeting don't change for over half a century, I suppose that's what they get. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/why-do-the-democrats-keep-losing-ground…
  continue reading
 
Building Fault-Tolerant Systems with DLQs: A Hands-On Example https://schedule.businesscompassllc.com/ In the world of distributed systems and microservices, failure is inevitable. Systems must be built to withstand and gracefully handle errors without losing data or crashing critical processes. The Dead Letter Queue (DLQ) is a powerful pattern tha…
  continue reading
 
Infrastructure as Code: Provisioning EKS Node Groups on AWS with Pulumi and Go https://schedule.businesscompassllc.com/ Provisioning Kubernetes clusters in the cloud has never been more efficient, thanks to the rise of Infrastructure as Code (IaC) tools. Pulumi stands out by enabling developers to use familiar programming languages such as Go, Pyth…
  continue reading
 
The Role of DynamoDB in Zoom’s Infrastructure at Scale https://schedule.businesscompassllc.com/ As one of the world’s most widely used video conferencing platforms, Zoom handles an enormous volume of real-time data traffic. From managing user metadata to ensuring seamless meeting operations, scalability and low-latency performance are key. At the h…
  continue reading
 
The AWS Optimization Stack: Tools for Performance, Cost, and Resource Management https://schedule.businesscompassllc.com/ As cloud environments scale, organizations face mounting pressure to deliver performance, manage resources efficiently, and keep costs under control. AWS offers a rich ecosystem of tools designed to address these exact challenge…
  continue reading
 
Deploy React in Dev, Test, and Prod Using AWS CDK: A Complete Guide https://schedule.businesscompassllc.com/ React applications power some of the most dynamic user interfaces in today’s digital world. While developing a React app is relatively straightforward, managing its deployment lifecycle across Dev, Test, and Production environments can be co…
  continue reading
 
Dynamic Data Catalogs Explained: Storing Metadata and Retrieving Data at Scale https://schedule.businesscompassllc.com/ In today’s data-driven world, organizations generate and process data at an unprecedented scale. Efficient data discovery, governance, and retrieval have become critical, and dynamic data catalogs are the linchpin of modern data a…
  continue reading
 
Kubernetes Workloads Explained: When to Use Deployments, StatefulSets, and DaemonSets https://schedule.businesscompassllc.com/ Kubernetes is a powerful container orchestration platform designed to automate the' deployment, scaling, and management of containerized applications. Among its many components, workloads define how containers run on your c…
  continue reading
 
3-Tier Web Application Architecture: The Secret to High-Performance Web Apps https://schedule.businesscompassllc.com/ In today's fast-paced digital world, delivering reliable, scalable, and high-performing web applications is no longer optional—it's essential. One of the most time-tested and powerful architectural patterns to achieve this is the 3-…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play