Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Web Development Audio Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork
 
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
  continue reading
 
Artwork

1
The Weekly Dev's Brew

Jan-Niklas Wortmann | Web Development Enthusiast & Podcast Host

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join host Jan-Niklas Wortmann in 'The Weekly Dev's Brew, where we explore the latest in web development, JavaScript, TypeScript, and emerging technologies. Engage in coffee shop-style conversations with industry experts to learn about frameworks like React, Vue, Angular, and everything remotely related. Follow us on social media for more insights https://www.weeklybrew.dev/
  continue reading
 
Artwork

1
Software Testing Podcast

KiwiQA Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Software testing Podcast is a one-stop marketplace where you can listen to what is happening in the software QA testing industry. Subscribe us now for the best and most popular testing podcasts. Happy Podcasting!!
  continue reading
 
Artwork

1
yayQuery (audio only)

Paul Irish, Rebecca Murphey, Alex Sexton, Adam Sontag

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The yayQuery hosts have years of experience being neck-deep in their own jQuery development, as well as providing support and training to the community. The podcast tries to capture one of our favorite conference pastimes -- hanging out at a bar and talking code. About the hosts: From afar when you notice them at jquery conference, they look like the cool kids in high school. They just gather around and make fun of everybody.
  continue reading
 
The Learning Driven Development Podcast (LDD Pod) is hosted by Josh Cirre and features a variety of content by amazing authors throughout the web. It's a series where Josh gets the incredible opportunity to read, learn, and share with YOU articles, blogs, documentation, stories, or other forms of written content that exist in the tech space. At the end of each episode, Josh will share his observations and learnings and (probably) ramble about the topic we read together.
  continue reading
 
Get news you can use from thought leaders from the New York Annual Conference of The United Methodist Church (NYAC) and beyond. The All Things New podcast is designed to help NYAC laity and clergy get the information education, inspiration, and deep understanding needed to live more fully into their ministries and the life as United Methodists. The series, hosted by Rev. Doris K. Dalton, our NYAC Director of Connectional Ministries, aims to introduce listeners to a range of thought leaders, ...
  continue reading
 
Artwork

1
wgcompsci

wgcompsci

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hello Everyone! This podcast will feature weekly discussions covering everything computer science. Topics include: game design 2D and 3D using Unity3D, Web Design topics including HTML, CSS, JavaScript, SQL and Apache webserver, Android Application Development, computer programming with Java, C# and C++, video/audio and image editing, and so, so much more. New episodes will be released weekly on Sunday evenings. Subscribe and join in on the newest topics related to computer science and infor ...
  continue reading
 
Artwork

4
Note To Future Me

Circle270Media Podcast Consultants

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Each episode gives listeners insight on how to develop and implement a podcast into their business' marketing strategy. Brett Johnson is the owner and lead consultant at Circle270Media Podcast Consultants. With over 35+ years of experience in Marketing, Content Creation, Audio Production/Recording and Broadcasting, the podcast consultants at Circle270Media strategically bring these strengths together for their business Podcast clients. Subscribe to my free Open The Mic Newsletter at https:// ...
  continue reading
 
This is the audio version of 💌 Tiny Improvements: my weekly newsletter sharing one small yet impactful idea for product builders, startup founders, and indiehackers. It's your cheat code for building products your customers will love. Learn from the CTO of a Y Combinator-backed startup, with past experience at Google, Stripe, and Microsoft. About me: I'm Mike Bifulco. I live in Charlotte, North Carolina, where I work as the CTO and co-founder of Craftwork. I'm also a developer advocate, writ ...
  continue reading
 
Jeffery Combs is an internationally recognized trainer in the network marketing & direct sales industry. Jeff specializes in prospecting, leadership, personal breakthroughs, prosperity consciousness, scripts, mindset training, and all levels of effective marketing. His many audio training programs benefit entrepreneurs & direct sales people at all levels of conscious development. Jeff has personally consulted with over 8,000 clients as a personal coach and mentor, and is highly sought after ...
  continue reading
 
As the rise of audio is emerging, we decided to start sharing the knowledge we've gathered in the past decade. If you're a developer, marketer, salesperson, a manager or a business owner, we hope that you could be inspired and learn from this conversation and avoid the same mistakes we made. We will be posting many new podcasts with different members of our team. It would mean the world to us if you follow our channel. Let us know what you think!
  continue reading
 
Welcome to "The Rose Window," where we explore the fascinating world of our minds, brain health and the revolutionary science that’s improving human connection. Over six conversations, we'll join Dr. Daniel Weinberger (founder of The Lieber Institute for Brain Development) and Ryan Cummins (special advisor), as they dissect the intricate web of connections that define our inner and outer worlds. From personal struggles to societal bonds, this series examines the pivotal role the human brain ...
  continue reading
 
Artwork

1
Gary P Hayes

GaryPHayes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GaryPHayes's music is a rare hybrid of melodic progressive trance, celtic & world music and cinematic electronica. His versatility lies in his being able to exhibit the sensitivity in combining music of different cultures required for a wide range of film genre and being able to utilise both full orchestral scoring through arrangement and production to cutting edge electronic music realisation and sound design. Gary became interested in music at an early age and was playing guitar and clarin ...
  continue reading
 
Artwork

151
Stack Snacks

John Siwicki

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore the latest in tech each week with host John Siwicki on the Stack Snacks podcast. This snack-sized audio experience makes cutting-edge AI, product design, and development digestible. Get a peek behind the curtain at innovators like OpenAI, AWS, Google, and more. Learn how emerging technologies like AI chatbots, generative diffusion models, and advanced neural networks are transforming industries. Whether you're a tech enthusiast, developer, designer, or entrepreneur, the Stack Snacks ...
  continue reading
 
Loading …
show series
 
Strategic Technology Consultation Services This episode of The Modern .NET Show is supported, in part, by RJJ Software's Strategic Technology Consultation Services. If you're an SME (Small to Medium Enterprise) leader wondering why your technology investments aren't delivering, or you're facing critical decisions about AI, modernization, or team pr…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Ready to integrate build automation into your applications? Carl and Richard talk to Mattias Karlsson about the new Cake.SDK as an additional component of the Cake (C# Make) open source project. Mattias talks about integrating the Cake scripting experience into your .NET console applications. The conversation digs into speeding up the building of i…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: ⁠…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
How do you build quality software with LLMs? Carl and Richard talk to Den Delimarsky about the GitHub Spec Kit, which uses specifications to help LLMs generate code for you. Den discusses the iterative process of refining specifications to produce better code, and then being able to add your own code without disrupting the process. The conversation…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠ Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017. Learn more about y…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
Strategic Technology Consultation Services This episode of The Modern .NET Show is supported, in part, by RJJ Software's Strategic Technology Consultation Services. If you're an SME (Small to Medium Enterprise) leader wondering why your technology investments aren't delivering, or you're facing critical decisions about AI, modernization, or team pr…
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
The next version of CSLA is out! Carl and Richard talk to Rocky Lhotka about his business objects framework that pre-dates .NET itself! Rocky discusses the surge in development that occurred for version 9, where a company heavily dependent on CSLA contracted developers to clear some of the backlog. The result is a few new long-term contributors, re…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
Aspire has been around for almost two years. How do you use it effectively? Carl and Richard talk to Chris Klug about his experience with .NET Aspire. Chris discusses thinking cloud natively, whether you are going to the cloud or not - it's not just a place, but also an architecture. The conversation digs into the role of containers and Kubernetes,…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
When Bishop Bickerton toured the flood-ravaged areas in Vermont's Northeast Kingdom (a region composed of Caledonia, Essex, and Orleans counties), he returned with a made-up mind and a plan to put the collective impact of the newly-formed New Hope Episcopal Area into full gear. Bishop Bickerton tasked members of his Cabinets in New England and New …
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠ Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018. Learn more about your…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
Strategic Technology Consultation Services This episode of The Modern .NET Show is supported, in part, by RJJ Software's Strategic Technology Consultation Services. If you're an SME (Small to Medium Enterprise) leader wondering why your technology investments aren't delivering, or you're facing critical decisions about AI, modernization, or team pr…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
You write tests - but are they valuable tests? Carl and Richard talk to Egil Hansen about his approach to creating tests for applications. Egil discusses the types of testing and who they impact. Testing isn't only for you! Valuable tests are also durable, being able to persist between changes where it makes sense, and help to understand when updat…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play