A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
  continue reading
Software Development Industry Podcasts
SPaMCAST explores the varied world of software process improvement and measurement. The cast covers topics that deal with the challenges found in information technology organizations as they grow and evolve.
…
  continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
  continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
  continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
  continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
  continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
  continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
  continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
Exploring the intersection of digital infrastructure and the humans who depend on it. https://underlay.show
…
  continue reading
A Podcast About Cloud Native Software Development, AWS, and Distributed Systems
…
  continue reading
Each episode Chris and Chris will be discussing topics and news from the world of SQL Server, while enjoying and chatting about beer! So, grab yourself a beer and tune in, cheers.
…
  continue reading
For solo professionals who want to make more and work less without hiring.
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
…
  continue reading
Level-Up Engineering brings you actionable management insights straight from top tech leaders. Each episode tackles real challenges faced by engineering managers—like hiring, motivating teams, and scaling organizations—and shares how they have navigated them. Discover best practices in management and leadership to master the art of understanding people and organizations, just as well as you understand code. Brought to you by **Apex Lab**, a software development agency creating stress-free, e ...
…
  continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
  continue reading
Learning How To Program Robots With ROS
…
  continue reading
The podcast that covers the latest news, notes, commentary and listener questions on Microsoft cloud technologies including Windows Azure, Office 365 and SharePoint.
…
  continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
  continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
  continue reading
Interviews & insights with experienced developer's across all aspects of App Development. Whether you're a veteran developer or just getting started - listen weekly as I go in depth with professionals on topics ranging from Flutter, Cyber Security, Freelancing, Android, iOS & much much more!
…
  continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
  continue reading
Inside iOS dev is a weekly show about real world iOS development. Your hosts, Alex Bush and Sandeep Aggarwal, draw from their experiences ranging from 4+ year old legacy codebases, to small startup green field projects, to working on apps at places like Uber, Wayfair, and Upkeep with millions of active users. They discuss everything from implementing specific features, to creating flexible designs, to utilizing refactoring techniques, and more. This is THE show for professional iOS developers.
…
  continue reading
Each episode we discuss the latest news regarding how to reduce the emissions of software and how the industry is dealing with its own environmental impact. Brought to you by The Green Software Foundation. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec,  ...
…
  continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
  continue reading
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
…
  continue reading
Five times winner of the Publisher Podcast Awards, including Best Technology Podcast, Engineering Matters celebrates the work of engineers who use ingenuity, practicality, science, theory and determination to build a better world. In the UK alone 5.7million people work in engineering related enterprises from manufacturing and agriculture to construction and transportation. Their work ensures that the country has sustainable power supplies, better connectivity between cities, increasing effic ...
…
  continue reading
The software industry has a short memory. It warps good ideas, quickly obfuscating their context and intent. Dead Code seeks to extract the good ideas from the chaos of modern software development. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
  continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
  continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
  continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
  continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
  continue reading
Deep-dive discussions with the smartest developers we know, explaining what they're working on, how they're trying to move the industry forward, and what we can learn from them. You might find the solution to your next architectural headache, pick up a new programming language, or just hear some good war stories from the frontline of technology. Join your host Kris Jenkins as we try to figure out what tomorrow's computing will look like the best way we know how - by listening directly to the ...
…
  continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
  continue reading

1
Boagworld: UX, Design Leadership, Marketing & Conversion Optimization
Paul Boag, Marcus Lillington
Boagworld: The podcast where digital best practices meets a terrible sense of humor! Join us for a relaxed chat about all things digital design. We dish out practical advice and industry insights, all wrapped up in friendly conversation. Whether you're looking to improve your user experience, boost your conversion or be a better design lead, we've got something for you. With over 400 episodes, we're like the cool grandads of web design podcasts – experienced, slightly inappropriate, but alwa ...
…
  continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
  continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
  continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
  continue reading
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. As web development agency owners for the better part of a decade, they’ve worked with all sorts of technologies, through the rise of responsive web design, the revolution of serverless computing, and the popularity gain of many no-code tools for small business owners. They commonly discuss foundational web development technologies like HTML, CSS, and JavaScript - in ...
…
  continue reading

1
Amazing Apps - learn how to build agile Dynamics 365 and Power Platform business apps using Scrum
Neil Benson
Amazing Apps is for Microsoft Dynamics 365 and Power Platform builders who want to use the Scrum framework to build amazing business apps that everyone will love. The podcast is hosted by Microsoft MVP, Neil Benson, and produced by Customery. [Dynamics365, D365, Power Apps, PowerApps, Power Pages, Power Apps Portals, Power Automate, Flow, Power Virtual Agents, PVA, PowerBI]
…
  continue reading
Helping aspiring developers get jobs and junior developers grow. Raw and unfiltered conversations with industry professionals that dive deep into how developers can find success and growth in their careers.
…
  continue reading

1
Episode 544: The Enterprise Turing Test
1:02:21
1:02:21
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:21This week, we discuss Claude’s new Excel skills, whether AI is augmenting or automating humans, and the latest developer surveys. Plus, AI making the command line cool again! Watch the YouTube Live Recording of Episode 544 Runner-up Titles Cote’ shock jock mode Art with squids Command-Line Life Style AI isn’t for experts. The triumph of the command…
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading
Share Episode Microsoft's John Papa, Partner General Manager of Developer Relations for all things dev and code joins the show to talk developer relations...from his Mac. He reveals his small part in the birth of VS Code (back when its codename was Ticino) after he spent a year trying a new editor every month. The conversation dives deep into "Agen…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
  continue reading
Are you struggling with motivation on your learning to code journey? It could be poor goal setting. It could be that trying to find a job is suppressing your curiosity and excitement for coding. It could very well be that software engineering isn't what you initially thought it was. But almost certainly, what I share in this has or is hurting your …
…
  continue reading

1
#350 Living in Space: The Next Generation of Astronauts
33:18
33:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:18Dr Meganne Christian is a scientist and adventurer. In her research, she has studied the performance of novel materials including the use of nanoscale metals for hydrogen storage, and the use of graphene across a diverse range of applications. But her career has taken her far from the traditional university lab. In 2018-2019, Meganne was a member o…
…
  continue reading

1
How to See Your Organization Like a Hacker with Chris Dale
25:18
25:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:18To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
…
  continue reading

1
"Is there an AI bubble?” Gavin Baker and David George
31:50
31:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
31:50In this conversation from a16z’s Runtime conference, Gavin Baker, Managing Partner and CIO of Atreides Management, joins David George, General Partner at a16z, to unpack the macro view of AI: the trillion-dollar data center buildout, the new economics of GPUs, and what this boom means for investors, founders, and the global economy. Resources: Foll…
…
  continue reading
In every Thoughtworks Technology Radar we feature three to five themes that represent the core issues and topics that emerged from the conversations we had when putting the publication together. This time (Fall 2025) they're all united by AI. They are: infrastructure automation arriving for AI, the rise of agents elevated by MCP, AI coding workflow…
…
  continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
  continue reading

1
Building the Real-World Infrastructure for AI, with Google, Cisco & a16z
32:44
32:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:44AI isn’t just changing software, it’s causing the biggest buildout of physical infrastructure in modern history. In this episode, Raghu Raghuram (a16z) speaks with Amin Vahdat, VP and GM of AI and Infrastructure at Google, and Jeetu Patel, President and Chief Product Officer at Cisco, about the unprecedented scale of what’s being built — from chips…
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading

1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
  continue reading

1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
  continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
  continue reading
In this episode, Seth and Ken debate OpenAI's Atlas browser, which embeds AI into web browsing. Ken views it as a major privacy concern, potentially accelerating invasive data collection and surveillance. Seth noted that new browsers historically have critical flaws. They acknowledged that AI is very useful for generic and technical internet search…
…
  continue reading

1
Google DeepMind Developers: How Nano Banana Was Made
54:19
54:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:19Google DeepMind’s new image model Nano Banana took the internet by storm. In this episode, we sit down with Principal Scientist Oliver Wang and Group Product Manager Nicole Brichtova to discuss how Nano Banana was created, why it’s so viral, and the future of image and video editing. Resources: Follow Oliver on X: https://x.com/oliver_wang2 Follow …
…
  continue reading

1
Joel Clermont - The Pros And Cons Of Selling Software Development As A Subscription
54:39
54:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:39Laravel expert Joel Clermont joined me on Ditching Hourly to share how he and his co-founder run their successful dev subscription business. Chapters (00:00) - Introduction and Guest Introduction (00:16) - Joel's Background and Business Model Transition (01:54) - Launching the Dev Subscription Model (04:47) - Marketing and Initial Success (07:44) -…
…
  continue reading

1
935: Global Issues Accelerated by AI (with Solutions), feat. Stephanie Hare
1:17:27
1:17:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:17:27Jon Krohn speaks to researcher, broadcaster and author Stephanie Hare about how the Hippocratic Oath might apply to artificial intelligence, and a guiding ethos for pushing innovation while protecting users from harm. A code of conduct, she says, could be one approach to ensuring that people are using technology more mindfully and ethically, as wel…
…
  continue reading

1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
  continue reading

1
The Art of Client Research: Turning Client Needs Into Actionable Plans
1:02:12
1:02:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:12In this episode of the HTML All The Things Podcast, Matt dives into the nuances of researching for a client. Learn how to take a client's diverse needs, turn them into actionable plans, and present solutions that fit perfectly—all while balancing technical expertise with a client-friendly approach. Show Notes: https://www.htmlallthethings.com/podca…
…
  continue reading

1
The UN’s big push for global cybercrime rules.
24:41
24:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
  continue reading

1
Do You Feel Like an Imposter as an Aspiring Developer?
26:02
26:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:02Imposter syndrome as a junior developer has been normalized WAY TO OFTEN. Imposter syndrome is a signal that there's a more deeply rooted issue that needs to be resolved. Sometimes, and a lot of people aren't going to like this, it's actually just a skill issue. --------------------------------------------------- 💻 Learn Frontend (20% off): https:/…
…
  continue reading

1
Raghu Raghuram: AI, Robotics, and the Rebirth of Infrastructure
30:12
30:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:12From Netscape to VMware, Raghu Raghuram has been at the center of nearly every major inflection point in enterprise technology. In this episode, Raghu joins Ben Horowitz, Martin Casado and David George to reflect on the early internet wars with Microsoft, how Netscape’s browser battles shaped a generation of founders, and the inside story of one of…
…
  continue reading

1
Going to War with Burnout - Less Hours Isn't Your Only Option
18:09
18:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
18:09I'm tackling a massive challenge today: burnout. While the standard advice usually involves working less, I want to show you a practical dimension of burnout you have more control over, focusing on increasing your agency and autonomy to manage chronic workplace stress more effectively. Burnout is classified by the ICD-11 as a syndrome resulting fro…
…
  continue reading

1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
  continue reading

1
Lee Brownhill: The Data Community - Episode 373
38:41
38:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:41Lee Brownhill is a Principal Cloud DBA at Cloud Rede with deep expertise in SQL Server performance tuning and automation. With years of experience across Azure and AWS, Lee helps clients optimize their cloud data platforms. His journey began in IT support, quickly evolving into a passion for SQL Server that led him through roles as a Production and…
…
  continue reading

1
It’s Always DNS: Lessons from the AWS Outage
19:07
19:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic f…
…
  continue reading

1
Jetsons and Pinocchio - Work Life Balance, SPaMCAST 877
39:13
39:13
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
39:13Many firms are bringing everyone back to the office and demanding longer hours. They are conflating effort and productivity. Why this matters: Increasing productivity is NECESSARY for profitability and growth. Our panel flows with: Jeremy Berriault - https://berriaultandassociates.com/ Daniel Doiron - https://www.linkedin.com/in/danieldoiron/ Jerem…
…
  continue reading

1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
  continue reading
In this Web News, Matt and Mike discusses the recent AWS outage and what it says about our overreliance on centralized services. From fragile cloud infrastructure to “move fast and break things” culture, this episode explores how we built systems that can take entire industries offline — and what developers can do to make technology more resilient,…
…
  continue reading

1
A look behind the lens. [Research Saturday]
24:30
24:30
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
  continue reading

1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
  continue reading
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
…
  continue reading

1
Unsecurity Episode 249: Navigating Holiday Threats with AI and VPN Vulnerabilities w/ Pinky
37:04
37:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:04In this episode of the Unsecurity Podcast, hosted by Megan Larkins and Brad Nigh from FRSecure, we are joined by Pinky from the IR team to dive deep into the pressing cybersecurity challenges as the holiday season approaches. From early breaches to the increasing sophistication of AI in phishing attacks, discover how attackers are evolving their ta…
…
  continue reading

1
Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA
2:11:23
2:11:23
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:11:23Three Buddy Problem - Episode 69: We dig into news that Apple's iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters. Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit develo…
…
  continue reading

1
Marc Andreessen: How Movies Explain America
1:15:30
1:15:30
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:15:30In this episode of Monitoring the Situation, Marc Andreessen, Katherine Boyle, and Erik Torenberg dive into the movies that best explain America, from Once Upon a Time in Hollywood to Tropic Thunder to Fight Club. They explore how Tarantino’s revisionist masterpiece reimagines 1969 and the end of America’s cultural innocence, why Tropic Thunder was…
…
  continue reading
 
 
 
