Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Software Management Podcasts

1
Agile and Project Management - DrunkenPM Radio
Dave Prior, Agile Trainer, Consultant and Project Manager
A podcast about Agile and Project Management
…
continue reading
SPaMCAST explores the varied world of software process improvement and measurement. The cast covers topics that deal with the challenges found in information technology organizations as they grow and evolve.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A deep and nuanced conversational podcast focused on technology, software, and computing.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Exploring the observability side of software development.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Deliver It is a podcast for agile Product Owners. Hosted by Cory Bryan and guests bring their experience and ideas on how to improve the role and techniques they use to deliver value within an agile framework. The show brings together relevant news, discussion, around a central topic and your feedback in a fun and supportive way.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Bob Galen and Josh Anderson use their decades of coaching experience to power your organization's need for agility and scale. If our 200+ episodes don't have what you need, ask us a question and we'll help you out!
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Welcome to Awkward Silences by User Interviews, where we interview the people who interview people. Listen as we geek out on all things UX research, qualitative data, and the craft of understanding people to build better products and businesses. Hosted by Erin May and Carol Guest, VPs of growth/marketing and product at User Interviews. Take this survey and let us know what topics you want to hear next! userinterviews.com/awkwardsurvey
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Picking up where Self-Hosted left off. Reviewing Free and Open Source Software that you would want to run at home. Except this time even though we aren't sponsored its going to be entirely centered around Tailscale.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
Weekly interviews with world-class engineering leaders about writing great software and working well with humans.
…
continue reading
Dive into the Funsize Show, formally The Hustle Podcast, for a vibrant journey through design. Engage with everyone from industry newcomers to veterans, leaders to clients, as our team unveils diverse, real-world perspectives and transformative stories. We'll explore your lingering thoughts on product design, design leadership, innovation, and much more.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Simple, shop management software. Discover amazing lessons from fellow print shop owners.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
Custom Manufacturing Industry podcast is an entrepreneurship and motivational podcast on all platforms, hosted by Aaron Clippinger. Being CEO of multiple companies including the signage industry and the software industry, Aaron has over 20 years of consulting and business management. His software has grown internationally and with over a billion dollars annually going through the software. Using his Accounting degree, Aaron will be talking about his organizational ways to get things done. Hi ...
…
continue reading
Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros. The show airs on Wednesdays at 2: ...
…
continue reading
Welcome to Students of Storage — the podcast that pulls back the curtain on the self-storage industry. This isn’t your typical business banter — it’s raw, real, and packed with insights from the movers and shakers who’ve built empires behind the roll-up doors. Join us as we sit down with CEOs, owners, and top third-party operators to dive deep into the wins, losses, and lessons that come with building lasting success in storage. From solving industry puzzles to revealing the strategies that ...
…
continue reading
Money shouldn’t be this hard - and it isn’t! Join YNAB founder Jesse Mecham each week as he dives into spendfulness, a mindset that will help you stop second-guessing, spend more confidently, and live the life you want.
…
continue reading
Hosted by Product School Founder & CEO Carlos Gonzalez de Villaumbrosia, The Product Podcast features candid conversations with product management executives from the world's best tech companies like Google, Meta, Netflix, Airbnb, and Amazon. New episodes release weekly, unveiling actionable frameworks, unconventional best practices, and real-world examples you can implement immediately. Perfect for senior product managers, directors, and VPs hungry to build better products, stronger teams, ...
…
continue reading
Need quick, actionable insights to sharpen your UX leadership and strategy? Short on time but eager to grow your influence? UX strategist Paul Boag delivers concise, practical episodes designed to enhance your strategic thinking, leadership skills, and impact in user experience. Each bite-sized podcast is just 6-10 minutes—perfect for busy UX leaders and advocates on the go.
…
continue reading
Project Insight's project portfolio management software centralizes your organization's project data across teams and software tools to give you a complete real-time picture of collaboration, budgets, resources, initiatives, and project status.
…
continue reading
The Proposal Manager Podcast contains a wealth of information about all things related to the public sector bidding process. From the C-Suite to a GovCon newbie, this show has something for everyone. Each episode will discuss topics related to government business development, capture, and proposal management.
…
continue reading
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
…
continue reading
Conversations about Software Engineering (CaSE) is a podcast for software engineers about technology, software engineering, software architecture, reliability engineering, and data engineering. The three of us regularly come together to discuss recent events or articles, exchange on our learnings, and reflect on our professional and personal experiences. Additionally our guest episodes feature engaging conversations with interesting people from the world of software engineering.
…
continue reading
Your destination for intelligent conversations from a techie perspective.
…
continue reading
Vibrant chats with brilliant Nixers
…
continue reading
Designed & engineered specifically for Dental Practices. Adit is the only dental software that integrates Calls, Texts, Emails, Patient Forms, Online Scheduling, Analytics, Reviews, Payments and more, all in one place! These features are all manageable within Adit's centralized platform, along with detailed insights on all marketing campaigns – Google Ads, social media marketing, or even billboards and flyers. https://www.adit.com
…
continue reading

1
When Management Won’t Buy In, A Panel Discussion, SPaMCAST 871
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50Pushing cooked spaghetti uphill…is exhausting. Why it matters: It is hard to make change happen if leaders provide lip service to the cause. It is impossible if they actively oppose change. So what are you going to do? Panelists include: Jeremy Berriault - - Jon M Quigley - - Me - Mastering Work Intake sponsors SPaMCAST! Starting Everything Means F…
…
continue reading

1
Discover how dental practice management software transforms multi-location DSOs by streamlining workflows, enhancing patient care, and boosting efficiency.
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07Pleae visit : https://adit.com/streamlining-dental-operations-unified-software-dsos?utm_source=organic&utm_medium=google_organic&utm_campaign=podcastrj Discover how dental practice management software transforms multi-location DSOs by streamlining workflows, enhancing patient care, and boosting efficiency.…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading

1
Revolutionizing Team Coordination with Steady featuring Henry Poydar
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this conversation, Henry Poydar joins Dave on the podcast to discuss the innovative platform Steady, which aims to enhance team coordination and communication in the workplace. Henry shares his extensive background in engineering and web development, emphasizing the importance of context and intentions in project management. They explore the cha…
…
continue reading

1
From Gut Feel to Guided Intelligence: Reinventing Talent and Sales with AI
43:20
43:20
Play later
Play later
Lists
Like
Liked
43:20In this conversation, Juan Betancourt, CEO of Humantelligence, discusses the transformative impact of AI on talent management, leadership development, and coaching. He highlights the challenges faced in these areas before the advent of AI, including the limitations of psychometric assessments and the exclusivity of coaching for top executives. Juan…
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
…
continue reading
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and in…
…
continue reading
How do you make change happen effectively? In this episode, Matt is joined by Alex Sims to discuss championing a cause and making change happen within your organization. They discuss various strategies, including how to get started, different technical approaches, and how to deal with those who resist change. We've also have a new episode of Break!…
…
continue reading

1
Episode 472: Should my junior dev use AI and thrown in to ETL
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59In this episode, Dave and Jamison answer these questions: I’m the CTO of a small startup. We’re 3 devs including me and one of them is a junior developer. My current policy is to discourage the use of AI tools for the junior dev to make sure they build actual skills and don’t just prompt their way through tasks. However I’m more and more questionin…
…
continue reading

1
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more…
…
continue reading

1
NB537: Palo Alto Networks IDs New Market With $25 Billion CyberArk Buy; Intel to Shed Networking Biz
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54Take a Network Break! Guest opinionator Tom Hollingsworth joins Johna Johnson to opine on the latest tech news. On the vulnerability front, several versions of BentoML are open to a server side request forgery. Looking at tech news, Intel will spin out its networking and edge group as it continues cost-cutting, Palo Alto Networks makes... Read more…
…
continue reading
In this powerful episode, Josh and Bob go all-in on the responsibility of leadership—especially when it’s uncomfortable. Prompted by listener feedback questioning whether it’s “worth it” to speak truth to power, they deliver a no-nonsense masterclass on the cost and courage of real leadership. This conversation is blunt, passionate, and grounded in…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
Barney changed USCIS’s cyber culture by putting the user first
43:25
43:25
Play later
Play later
Lists
Like
Liked
43:25Shane Barney, the former CISO at USCIS and currently the CISO for Keeper Security, said the move to zero trust received wide support from the program leaders. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Nerd Joy, A Panel Discussion, SPaMCAST 872
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54The work has to get done, be miserable, or find JOY in it – it’s your choice. Why it matters: It is hard to motivate yourself and your team if you do not find joy in the work you do day in and day out. Our panel finds a joyful path: Jeremy Berriault - Jon M Quigley - - Me - Mastering Work Intake sponsors SPaMCAST! Starting Everything Means Finishin…
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
…
continue reading

1
Zaineb Aljumayaat, 3d Artist for NASA and formerly Riot Games
58:29
58:29
Play later
Play later
Lists
Like
Liked
58:29Please visit us at https://coderconvos.comBy Kevin Miller, Brian Russick
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Ras…
…
continue reading

1
HN790: From Rule-Based to Goal-Based: Rethinking Autonomous AI Operations (Sponsored)
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45On Heavy Networking today, AI operations for networking. That is, how do we delegate some amount of responsibility for network operations to artificial intelligence? Cisco is our sponsor, and our guests are Omar Sultan, Director for Product Management of Automation and AI; and Javier Antich, Chief Mad Scientist for AI (yes, that’s his title!). We t…
…
continue reading

1
HN790: From Rule-Based to Goal-Based: Rethinking Autonomous AI Operations (Sponsored)
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45On Heavy Networking today, AI operations for networking. That is, how do we delegate some amount of responsibility for network operations to artificial intelligence? Cisco is our sponsor, and our guests are Omar Sultan, Director for Product Management of Automation and AI; and Javier Antich, Chief Mad Scientist for AI (yes, that’s his title!). We t…
…
continue reading

1
A New Step on the Pathway to Violence, Plus Outdoor Security and Vendor Cybersecurity Management
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40This month’s Security Management Highlights episode features three compelling conversations with industry experts, starting with a chat with Ontic’s Cynthia Marble about a new step on the pathway to violence—step zero—and how it provides an even earlier opportunity to prevent escalation, if you’re paying attention. Then, Jeff Krull from Baker Tilly…
…
continue reading

1
TNO037: The Next Era of Network Management and Operations
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF…
…
continue reading

1
TNO037: The Next Era of Network Management and Operations
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF…
…
continue reading

1
Thinking in Bets for Engineers 🎲— with Annie Duke
1:11:55
1:11:55
Play later
Play later
Lists
Like
Liked
1:11:55Today's guest is Annie Duke, who is a former world-class professional poker player and one of the world's top experts on decision-making.She's a bestseller author and coach of many tech founders and teams.With Annie we talked about her journey from studying decision science to becoming a top poker player and back to decision-making. We explored how…
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
…
continue reading

1
Hacking Washing Machines - PSW #885
1:58:07
1:58:07
Play later
Play later
Lists
Like
Liked
1:58:07In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
…
continue reading

1
How is AlmaLinux OS is community-driven? with benny Vasquez
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14In this episode, Scott Hanselman sits down with Benny Vasquez, Chair of the AlmaLinux OS Foundation, to explore the project's journey since the shift away from CentOS. Benny shares insights into how AlmaLinux stays community-driven, transparent, and enterprise-ready—all while navigating the evolving world of open-source licensing. It's a candid and…
…
continue reading

1
Hacking Washing Machines - PSW #885
1:58:07
1:58:07
Play later
Play later
Lists
Like
Liked
1:58:07In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
…
continue reading
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo…
…
continue reading
We’re continuing our IPv6 Basics series discussing on this episode deployment. We’ll help you sort out why you should deploy IPv6, things to consider before starting a deployment, and what approach you should take such as “inside out” vs. “outside in” and when you should deploy IPv6. Lastly we explain why you should seek out... Read more »…
…
continue reading

1
183: Landing a Software Job in 2025
1:46:53
1:46:53
Play later
Play later
Lists
Like
Liked
1:46:5300:00:00 Intro 00:01:58 Introducing Mark Cunningham 00:07:01 How Do You Find A Job? 00:15:43 How to Get the Best Interview 00:33:06 Tips on How To Pass An Interview 00:38:38 How to Have a Good Interview 00:48:12 What is the Reverse Interview? 00:54:24 What Is The Hiring Manager's Role? 00:57:12 Reverse Interviews: Red Flags 01:14:45 How to Negotiat…
…
continue reading

1
OMNIBUS IV Small Business On-Ramp- Department of Defense Defense Health Agency (DHA)
25:24
25:24
Play later
Play later
Lists
Like
Liked
25:24The Defense Health Agency (DHA) is launching the OMNIBUS IV Small Business On-Ramp, a $10B MA-IDIQ to support military medical research and development. With an RFP expected in September 2025, this episode breaks down how small businesses can qualify—from technical segments to past performance tips. Key Details: • Opportunity: OMNIBUS IV Small Busi…
…
continue reading

1
N4N035: Well Actually . . . Listener Comments and Corrections
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35We ask listeners for follow up and you’ve sent it in. On today’s show we respond to listener comments and corrections on tunneling, the link aggregation control protocol, link aggregation in general, and DHCP options. We also talk about the network engineering certification journey. If you’ve got a “Well, actually” or any other follow up,... Read m…
…
continue reading

1
N4N035: Well Actually . . . Listener Comments and Corrections
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35We ask listeners for follow up and you’ve sent it in. On today’s show we respond to listener comments and corrections on tunneling, the link aggregation control protocol, link aggregation in general, and DHCP options. We also talk about the network engineering certification journey. If you’ve got a “Well, actually” or any other follow up,... Read m…
…
continue reading

1
622: Interview with Mark Phillips - Technical Marketing Manager at the FreeBSD Foundation
55:10
55:10
Play later
Play later
Lists
Like
Liked
55:10This week Benedict interviews Mark Phillips , the Technical Marketing Manager at the FreeBSD Foundation, while they both are at a Hackathon in Germany. NOTES This episode of BSDNow is brought to you by Tarsnap and the BSDNow Patreon Interview Mark Phillips - Technical Marketing Manager at the FreeBSD Foundation Personal website Tarsnap This weeks e…
…
continue reading

1
Make Research Reusable: How to Build a User Research Repository
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03In our last few lessons, we’ve been building out the ecosystem that supports a scalable UX strategy. We’ve covered services, tools, design systems, and even preferred suppliers. But there’s one more piece of infrastructure that can have a surprisingly big impact; your user research repository. If you want to empower others to take on UX work withou…
…
continue reading

1
#117 Why Your Website Isn’t Converting (and What to Do About It)
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40This week on *The AC Method*, Aaron sits down with Ryan from Striventa and Hyperdrive to unpack why most business websites fail to generate leads—and what you can do to fix it fast. Whether you’re in blue-collar services or scaling a national brand, this episode breaks down the real-world digital strategies that get results. Ryan shares what most a…
…
continue reading
Flying airplanes is serious business. Mistakes are costly, not just because of the cost of the aircraft; if you're flying people, their lives are on the line. Jesse knows this better than most, having two brothers who are pilots. One day he overheard them talking shop and narrowed in on a common occurence they had teaching student pilots to fly -- …
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock …
…
continue reading

1
D2DO278: The Future of HashiCorp Inside IBM
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10On today’s show, we talk to Armon Dadgar, co-founder and CTO of HashiCorp regarding HashiCorp’s future within IBM. We start with a quick recap of IBM’s acquisition of HashiCorp and then move on to the challenges of bringing a small, young tech company into a huge corporation that makes lots of its revenue on legacy... Read more »…
…
continue reading