Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Tech Developments Podcasts
Technical interviews about software topics.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
On The Bike Shed, hosts Joël Quenneville, Sally Hall, and Aji Slater discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
next generation web podcast
…
continue reading
Exploring the observability side of software development.
…
continue reading
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
continue reading
4
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
A podcast about web design and development.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
.net, c#, azure, AI
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
The best panels and seminars about analog game design & publishing.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A biweekly podcast on the Django Web Framework by Will Vincent and Carlton Gibson.
…
continue reading
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
1
Microsoft enforces admin MFA, Cisco patches ISE, Illinois breaches self
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Microsoft to enforce MFA for Microsoft 365 admin center sign-ins Cisco patches ISE security vulnerability after PoC release Illinois state agency breaches itself Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt…
…
continue reading
1
Blockchain buzzkill — one miner’s lament.
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37We return to a story about bitcoin mining in Kentucky. When Richard Hunter heard about the state's generous crypto incentives, he packed up his bitcoin machines and pointed them south. He imagined a booming business, jobs for locals, and maybe — just maybe — a shot at redemption. But what he got … was a buzzkill. Learn about your ad choices: doveta…
…
continue reading
Cybersecurity Today: Sideloaded App Issues, Fake Blue Screen Attacks, and Rising Ransomware Threats In this episode of Cybersecurity Today, host Jim Love discusses HSBC blocking sideloaded apps with its banking app, new social engineering attacks using fake Windows blue screens to install malware, and the discovery of long-standing compromised Chro…
…
continue reading
Ryan is joined by Vanessa Lee, VP of Product at Shopify, to discuss how AI is a tech renaissance and how these new technologies are affecting the ecommerce world. They cover the development of Sidekick, their new tool, along with the general challenges of building AI tools, the importance of maintaining human oversight in AI, and what the future ho…
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
The many reasons why email shouldn’t be trusted. Plus how to stop your kids accessing inappropriate content online, and why the answer probably isn’t a technical one. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes What We Built: Top ZFS Capabilities Delivered by Klara in 2025 Discussion Please STOP trusting em…
…
continue reading
1
Angular v21, from signals to testing with Mark Techson
35:57
35:57
Play later
Play later
Lists
Like
Liked
35:57Paul sits down with Mark Techson to break down Angular v21. They explore how Angular signals power new features like Angular signal forms, improve scalability, and simplify state management. The conversation dives deep into Angular AI tooling, including the Angular MCP server, Angular AI tutor, and the Angular Gemini CLI extension, explaining how A…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode: Consequence, not…
…
continue reading
1
Architecture antipatterns and pitfalls: Good intentions, bad habits and ugly consequences
35:22
35:22
Play later
Play later
Lists
Like
Liked
35:22You can grasp the basics of software architecture by learning design patterns but you probably won't master it — to do that you have to get to grips with antipatterns too. Often these lessons are hard-won through experience, derived from seeing what happens when architectural decisions (or the lack of them) collide with the messy reality of the rea…
…
continue reading
1
Flox, Nix, and Reproducible Software Systems with Michael Stahnke
55:16
55:16
Play later
Play later
Lists
Like
Liked
55:16Modern software development is more complex than ever. Teams work across different operating systems, chip architectures, and cloud environments, each with its own dependency quirks and version mismatches. Ensuring that code runs reproducibly across these environments has become a major challenge that’s made even harder by growing concerns around s…
…
continue reading
1
ESA confirms new data heist, Ni8mare lets hackers hijack n8n servers, Taiwan blames 'cyber army' for intrusion attempts
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03ESA confirms new data heist Ni8mare lets hackers hijack n8n servers Taiwan blames 'cyber army' for intrusion attempts Huge thanks to our sponsor, Hoxhunt Traditional security training fails because it treats employees like the problem. Hoxhunt treats them like the solution. AI-powered simulations mirror actual attacks hitting your inbox. Instant co…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineerin…
…
continue reading
On today’s episode, Ben and Dave dive into the wave of new privacy legislation taking effect across the U.S., with California, Texas, and Virginia leading the way. We explore how these laws are giving consumers more control over their personal data—like California’s new “Delete Act” that lets residents remove their information from data brokers in …
…
continue reading
1
Uno and .NET 10 with Sam Basu and Jerome Laban
58:00
58:00
Play later
Play later
Lists
Like
Liked
58:00What's happening with Uno now that .NET 10 is released? Carl and Richard talk to Jérôme Laban and Sam Basu about the latest developments in Uno, including their collaboration with Microsoft on MAUI, WASM, and more! The conversation also digs into the role of AI in the Uno Platform, bringing MCPs into play to build applications faster and make migra…
…
continue reading
1
SE Radio 702: Derick Schaefer on Modern CLIs
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05Derick Schaefer, author of CLI: A Practical Guide to Creating Modern Command-Line Interfaces, talks with host Robert Blumen about command-line interfaces old and new. Starting with a short review of the origin of commands in the early unix systems, they trace the evolution of commands into modern CLIs. Following the historic rise, fall, and re-emer…
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
1
From GitLab to Kilo Code (Interview)
1:17:18
1:17:18
Play later
Play later
Lists
Like
Liked
1:17:18We’re joined by Sid Sijbrandij, founder of GitLab who led the all-in-one coding platform all the way to IPO. In late 2022, Sid discovered that he had bone cancer. That started a journey he’s been on ever since… a journey that he shares with us in great detail. Along the way, Sid continued founding companies including Kilo Code, an all-in-one agenti…
…
continue reading
1
Human Cognition Can’t Keep Up with Modern Networks. What’s Next?
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16IBM’s recent acquisitions of Red Hat, HashiCorp, and its planned purchase of Confluent reflect a deliberate strategy to build the infrastructure required for enterprise AI. According to IBM’s Sanil Nambiar, AI depends on consistent hybrid cloud runtimes (Red Hat), programmable and automated infrastructure (HashiCorp), and real-time, trustworthy dat…
…
continue reading
1
968: Habits and Changes We Want to Make in 2026
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36Wes and Scott talk about setting realistic goals for the new year, building habits through small, sustainable changes, creating systems that actually stick, and why incremental progress beats big resolutions every time. Show Notes 00:00 Welcome to Syntax! 00:26 Wes: Stand more 06:55 Wes: Learn to wake up early 10:04 Scott: Embrace daily TODOs Tweek…
…
continue reading
#332: AI adoption in enterprise software development is accelerating, but operations teams are lagging behind. While application developers embrace AI tools at a rapid pace, those on the ops side remain skeptical—citing concerns about determinism, control, and a general resistance to change. This mirrors previous technology waves like containers, c…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
UK cyber reset, no MFA is a problem, US cyberattacks on display
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19The UK hits reset on cybersecurity No MFA, Know Problems US may have coordinated cyberattacks with Maduro's arrest Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from…
…
continue reading
Live from Dubai with Scott Helme! My Changing View on Sponsorships; Scott on Moving to Dubai; On the Overhead of Support https://www.troyhunt.com/weekly-update-485/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
You need quality engineers to turn AI into ROI
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03SPONSORED BY MONGODB Pete Johnson, Field CTO, Artificial Intelligence at MongoDB, joins the podcast to talk about a recent OpenAI paper on the impact that AI will have on jobs and overall GDP. Pete, who reads the papers (and datasets) so you don’t have to, says that looking at AI’s impact as a job killer is a flawed metric. Instead, he and Ryan tal…
…
continue reading
1
Kimwolf Bot Strikes - "Routers Will Not Protect You"
13:05
13:05
Play later
Play later
Lists
Like
Liked
13:05In this episode of Cybersecurity Today, host Jim Love discusses the latest in cybersecurity threats including the rapidly growing Kim Wolf botnet affecting millions of devices, the rising threats to file-sharing environments, and the intersection of cybercrime with physical supply chains. He also covers an audacious hacktivist takedown of white sup…
…
continue reading
1
SN 1059: MongoBleed - Code Signing Under Siege
3:16:33
3:16:33
Play later
Play later
Lists
Like
Liked
3:16:33Why are code signing certificates suddenly getting shorter, pricier, and more restrictive? Steve Gibson and Leo Laporte expose the "cabal" rewriting the rules for everyone who builds software—and what it means for your security and your wallet. Code-signing certificate lifetimes shortened by two years. Sadly, ChatGPT is heading toward an advertisin…
…
continue reading
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/ https://cybersecuritynews.com/mongobleed-poc-exploit-mongodb/ https://cybersecuritynews.com/fortigate-firewall-vulnerability/ …
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading
1
How the World Got Owned Episode 1: The 1980s
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
…
continue reading
1
Imagine Scaling Mistakes 5x Faster. Thank You, Automation! (LIVE in NY)
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Matt Southworth, CISO, Priceline. Joining us is our sponsored guest, Leslie Nielsen, CISO, Mimecast. In this episode: Automating dysfunction Leading without dominating Unglamorous wins Code without comprehension Huge thank…
…
continue reading
1
VS Code and Agentic Development with Kai Maetzel
1:09:04
1:09:04
Play later
Play later
Lists
Like
Liked
1:09:04Visual Studio Code has become one of the most influential tools in modern software development. The open-source code editor has evolved into a platform used by millions of developers around the world, and it has reshaped expectations for what a modern development environment can be through its intuitive UX, rich extension marketplace, and deep inte…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
Please enjoy this encore of Word Notes. An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. CyberWire Glossary link: https://thecyberwire.com/glossary/apple-lockdown-mode Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khash…
…
continue reading
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security culture today. Sponsors Support for this show comes from ThreatLocker®. …
…
continue reading
1
European hospitality blue screen of death, Brightspeed investigates breach, Convicted Bitfinex launderer freed
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15European hospitality blue screen of death Brightspeed investigates breach Convicted Bitfinex launderer freed Huge thanks to our sponsor, Hoxhunt Traditional security training fails because it treats employees like the problem. Hoxhunt treats them like the solution. AI-powered simulations mirror actual attacks hitting your inbox. Instant coaching tu…
…
continue reading
1
488: The Playful Portland Programming Paradigm
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47Aji and Joël talk all things hackerthons and why taking the time to have a little having fun with your work every now and then is important for developers. Our hosts reflect on their shared experience at a previous RailsConf where they entered a mini hackerthon, why playing around in a creative sandbox is crucial to honing your skills as a dev, and…
…
continue reading
Since the collapse of coal, Eastern Kentucky has lived through a procession of supposed revivals. Each new idea was treated as something close to salvation. But things like cryptocurrency and AI data centers may not offer a break with history – just a continuation of it. We return to a story we did last year about Kentucky's crypto mining industry.…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west …
…
continue reading
1
Search engine bots crawled so AI bots could run
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27Ryan hosts Akamai data scientist Robert Lester on the show to discuss how the growth of AI bots affects internet traffic, the ways these AI bots differ from the original search engine optimization ones, and why you might not want to mitigate AI bots on your websites. Episode notes: Akamai is a CDN, full-stack cloud computing, and cybersecurity comp…
…
continue reading