Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork
 
Is it possible to learn something new in 10 minutes? Listen to the 10 minutes of UX Podcast with Praiz UX. Learn something interesting about UX in 10 minutes every Sunday. UX Design, User research, UI Design and everything related with User Experience.
  continue reading
 
Artwork
 
Welcome to "UXChange" the podcast where we (ex)change experiences! I am a firm believer that sharing is caring. As we UX professionals are all aspiring to change User Experiences for the better, I have put together this podcast to accelerate learning and improvement! In this podcast, I will:- Share learning experiences from myself and UX professionals- Answer most common questions- Read famous blogs- Interview UX Professionals- And much more!For more info, head over to ux-change.com
  continue reading
 
Artwork
 
Steadcast is a podcast all about UX, startups, and making users happy. Each week we bring on a new guest to share their tips about how to make users smile. The SteadfastCast is produced by SteadfastBeta, a user research startup helping companies test their ideas and products. If you have a product that needs great user feedback, get in touch at steadfastbeta.com. Thanks to our venue and technology sponsor the DMZ at Ryerson University.
  continue reading
 
Artwork

1
The Front End

Rob Kendal

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In The Front End, we explore the in's and out's of life as a developer. We delve into challenging topics around modern-day development and technology including learning and professional growth, programming languages, frameworks, tools, techniques, UX/UI, and careers.
  continue reading
 
Artwork

1
Mobile App Makers

Olivier Destrebecq

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast for SaaS CEOs who want to create a mobile app version of their service. You'll learn about everything it takes to make a successful mobile app. You hear experts in fields like security, UX design, recruitment, product design, and more to help you move forward in your mobile app project.
  continue reading
 
Artwork

1
Mixed Methods

Aryel Cianflone

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast interested in the how's and why's of user experience research. Through interviews with industry experts and hands-on trial and error, we indulge and celebrate curiosity. Expect to test assumptions, examine methods, and engage in some old fashion experiments.
  continue reading
 
Join Veronica Lane, CEO of Veronica Lane Consulting, LLC and Project Manager Guru, Inc. as she holds after-hours conversations with industry professionals about project management, their businesses, and their impacts on their communities. Text 813-296-5453 to join our community.
  continue reading
 
Balderton Capital are one of Europe's largest tech VCs, investing the best breakthrough technology companies in the continent. This podcast will share weekly insights for those at the forefront of the European technology scene: our partners, investment team, portfolio companies, and other selected experts and contributors. The 'cast will be a worthwhile listen for anyone who is looking to raise venture capital investment, building a technology company from the ground up, or is enthusiastic a ...
  continue reading
 
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
  continue reading
 
Artwork
 
Tina Banerjee, co-founder of Userpeek, talks to some of the world's most interesting people in the fields of user experience, SaaS, digital business and marketing about how to design and drive the best and most successful products and business models.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Welcome to Gilmedia Podcasts - your go-to source for expert insights on digital marketing and website design! Join us as we uncover the tips, tricks, and secrets behind successful online marketing strategies. Whether you’re navigating SEO, mastering Google Ads, or building your brand on social media, we’ve got actionable advice to help you grow your business and crush your marketing goals. Each episode, the marketing pros at Gilmedia, a leading digital agency, share their expertise, industry ...
  continue reading
 
Artwork

1
Guaranteed to Grow

Patrick Parker

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Guaranteed to Grow podcast is for entrepreneurs at all stages of the game who are looking for the actionable steps they can take to validate, test, launch, and scale their software idea. Whether you have a clear vision of an app that could revolutionize your business, or you’re wanting to learn more about how software can help take your product or service to the next level, you’re going to walk away from this show with an entirely new perception of what’s possible. Join serial entreprene ...
  continue reading
 
Loading …
show series
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
In this week's episode, Drew and Joe explore ethical considerations to running research. They'll cover everything from PII, to delicate topics, to ensuring you're treating your participants right. Send us a text Support the show Send your questions to [email protected] Visit us on LinkedIn, or our website, at www.insideUXR.com Credits: Art by Kam…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
This episode of Inside UXR dives into the art of professionally standing up for your research and advocating for its impact. Joe and Drew break down why fact-based arguments are essential—but not always persuasive on their own. They discuss the power of listening, understanding stakeholder concerns, and framing research insights in a way that reson…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
  continue reading
 
In this episode of Inside UXR, Joe and Drew dive into the art of preparing for a big presentation or research readout. Joe shares his experience crafting a conference talk, from refining his story with a speaking coach to mastering stage presence and anticipating tough questions. They explore what makes a presentation "big" and why strong storytell…
  continue reading
 
In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid …
  continue reading
 
This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
  continue reading
 
In this episode of Inside UXR, Joe and Drew welcome Research Operations expert Mia Mishek to break down the fundamentals of Research Ops. They tackle common misconceptions—like the idea that Research Ops is just recruitment—and explore best practices for setting up and maintaining a successful Research Ops function. Whether you're a researcher look…
  continue reading
 
Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
  continue reading
 
Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
In this episode of Inside UXR, Drew and Joe dive into the complexities of researching AI-based products. They explore how AI research differs from traditional UX research, from recruitment challenges and user biases to the importance of trust and accuracy in AI-generated outputs. They also discuss why diary studies and co-design sessions are partic…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
In this episode of Inside UXR, Drew and Joe dive into diary studies—what they are, when to use them, and how to run them effectively. They break down the best use cases, from tracking user behavior over time to uncovering long-term pain points that traditional research methods might miss. They also share practical tips on setup, analysis, and avoid…
  continue reading
 
What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
  continue reading
 
This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
  continue reading
 
Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
  continue reading
 
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
  continue reading
 
In this episode of Inside UXR, Drew and Joe tackle one of the biggest challenges in research: choosing the right method for the job. They break down key factors like research objectives, timelines, budget constraints, and level of certainty to help you make informed decisions. Through real-world scenarios, they walk through how to balance ideal met…
  continue reading
 
Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm. Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet…
  continue reading
 
Sounil Yu joins us to kick things off with AI defenses: Enterprise AI search tools like Copilot for Microsoft 365 lack the in-depth access controls required to ensure that query responses align with the user’s need-to-know boundaries. Without proper controls, these tools accelerate the discovery of improperly secured sensitive files within the orga…
  continue reading
 
Loading …
Listen to this show while you explore
Play