Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Discussing Stupid returns to the airwaves to transform digital facepalms into teachable moments—all in the time it takes to enjoy your coffee break! Sponsored by High Monkey, this podcast dives into ‘stupid’ practices across websites and Microsoft collaboration tools, among other digital realms. Our "byte-sized" bi-weekly episodes are packed with expert insights and a healthy dose of humor. Discussions focus on five key areas: Business Process & Collaboration, UX/IA, Inclusive Design, Conten ...
  continue reading
 
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
  continue reading
 
Is it possible to learn something new in 10 minutes? Listen to the 10 minutes of UX Podcast with Praiz UX. Learn something interesting about UX in 10 minutes every Sunday. UX Design, User research, UI Design and everything related with User Experience.
  continue reading
 
Artwork
 
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
  continue reading
 
Artwork

1
UXchange

Jeremy

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to "UXChange" the podcast where we (ex)change experiences! I am a firm believer that sharing is caring. As we UX professionals are all aspiring to change User Experiences for the better, I have put together this podcast to accelerate learning and improvement! In this podcast, I will:- Share learning experiences from myself and UX professionals- Answer most common questions- Read famous blogs- Interview UX Professionals- And much more!For more info, head over to ux-change.com
  continue reading
 
Artwork
 
Steadcast is a podcast all about UX, startups, and making users happy. Each week we bring on a new guest to share their tips about how to make users smile. The SteadfastCast is produced by SteadfastBeta, a user research startup helping companies test their ideas and products. If you have a product that needs great user feedback, get in touch at steadfastbeta.com. Thanks to our venue and technology sponsor the DMZ at Ryerson University.
  continue reading
 
Artwork

1
The Front End

Rob Kendal

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In The Front End, we explore the in's and out's of life as a developer. We delve into challenging topics around modern-day development and technology including learning and professional growth, programming languages, frameworks, tools, techniques, UX/UI, and careers.
  continue reading
 
Artwork

1
Mobile App Makers

Olivier Destrebecq

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast for SaaS CEOs who want to create a mobile app version of their service. You'll learn about everything it takes to make a successful mobile app. You hear experts in fields like security, UX design, recruitment, product design, and more to help you move forward in your mobile app project.
  continue reading
 
Artwork

1
Mixed Methods

Aryel Cianflone

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast interested in the how's and why's of user experience research. Through interviews with industry experts and hands-on trial and error, we indulge and celebrate curiosity. Expect to test assumptions, examine methods, and engage in some old fashion experiments.
  continue reading
 
Join Veronica Lane, CEO of Veronica Lane Consulting, LLC and Project Manager Guru, Inc. as she holds after-hours conversations with industry professionals about project management, their businesses, and their impacts on their communities. Text 813-296-5453 to join our community.
  continue reading
 
Balderton Capital are one of Europe's largest tech VCs, investing the best breakthrough technology companies in the continent. This podcast will share weekly insights for those at the forefront of the European technology scene: our partners, investment team, portfolio companies, and other selected experts and contributors. The 'cast will be a worthwhile listen for anyone who is looking to raise venture capital investment, building a technology company from the ground up, or is enthusiastic a ...
  continue reading
 
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
  continue reading
 
Artwork

1
Userpeek TALKS

Userpeek.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Tina Banerjee, co-founder of Userpeek, talks to some of the world's most interesting people in the fields of user experience, SaaS, digital business and marketing about how to design and drive the best and most successful products and business models.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Guaranteed to Grow

Patrick Parker

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Guaranteed to Grow podcast is for entrepreneurs at all stages of the game who are looking for the actionable steps they can take to validate, test, launch, and scale their software idea. Whether you have a clear vision of an app that could revolutionize your business, or you’re wanting to learn more about how software can help take your product or service to the next level, you’re going to walk away from this show with an entirely new perception of what’s possible. Join serial entreprene ...
  continue reading
 
Loading …
show series
 
In this episode of Discussing Stupid, Virgil and Cole are joined by a new guest—High Monkey’s Project Manager and QA specialist, Seth Moline. Together, they dig into the often-overlooked world of quality assurance (QA) and why it can make or break a digital project. From accessibility issues to ripple effects caused by last-minute code changes, Set…
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
I know that Epic React 2 and Epic Web are completely different courses. Given that I’m already on the verge of completing Epic React 1, I’m currently confused about how to proceed next. Should I go for Epic React 2 to solidify my React knowledge and learn about React 19?Or should I pivot towards Epic Web, which offers a broader, full-stack curricul…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
What does it take to build product features that hold up under massive traffic while still delivering a great user experience? Karen Risvig, Head of Product & UX at Queue-it, joins Smooth Scaling to share how her team designs for scalability, resilience, and security from day one. From invite-only waiting rooms to real-time visitor analytics, Karen…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
In this recording, I talk about a recurring challenge I face when building proprietary solutions—constantly switching between frameworks like Next.js, React Router, and TanStack. I tend to shift tools when I hit roadblocks (like authentication issues), which makes it hard to commit and go deep with one tech stack. I’m reaching out to ask Kent for a…
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
In this episode, I was honoured to be joined by Maddy Montaquila to chat about the amazing .NET Aspire! We covered a lot of stuff in this episode - from what Aspire is, and its features - to various stories about the decisions made and the future plans for Aspire. We also took a few tangents, chatting about AI and vibe coding! It was such a fun con…
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
  continue reading
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
In this episode, Yam Shal-Bar, CTO at Radview, discusses the the evolving world of load testing and how it's used to prepare for peak traffic. He covers the most common system bottlenecks, the importance of iterative testing, and strategies for accurately simulating user journeys. Yam shares insights into common misconceptions around testing, best …
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
In Episode 14, host Virgil Carroll and co-host Cole dig into a core truth behind most UX mistakes: people don’t pay attention. From sending a message to the wrong person to confusing web forms, today’s digital missteps often stem from one thing—poorly designed experiences that expect users to be careful, focused, or even logical. But here’s the har…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
I’m transitioning from SPAs with REST APIs to SSR applications using React Router Framework. While I’ve used layout routes and tools like SWR/React Query for route protection in React Router DOM, I just found out that actions in React Router Framework are still vulnerable to unauthorized POST requests. I use JWT auth with tokens stored in cookies—d…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
What makes a system scalable? In this episode, Mojtaba Saroonghi explains why simplicity is the secret to scalability. Saroonghi explains why avoiding complexity helps minimize the risk of failure while improving troubleshooting, deployment, and the overall scalability of a system. He walks though how Queue-it has maintained simplicity as it has gr…
  continue reading
 
No system has 100% reliability. Failures and faults are inevitable. At scale, everything breaks. In this episode, Martin Larsen explains the design for failure approach behind Queue-it’s architecture and how it increases the platform’s availability and resilience. Larsen explores the principles behind designing for failure, the tradeoffs involved, …
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
In Episode 13.1, host Virgil Carroll is joined by co-host Cole and developer Chad to talk about something deceptively complicated: color. Specifically, the intersection of color palettes, visual design, and accessibility—and why getting it wrong can tank your user experience. While color choices often get made in design tools or branding meetings, …
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
  continue reading
 
Loading …
Listen to this show while you explore
Play