Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
The Data on Kubernetes Community (DoKC) is where users go to run data on Kubernetes. We facilitate the creation and sharing of best practices to help users advance in their DoK journey. Here you can enjoy the audio from our livestreams and meetups. Learn more at https://dok.community/
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
The Edge Native Podcast is the first major podcast on hot topics in the edge cloud native community. Sebastian Scheele, and his friends talk to coders, builders, and experts at the forefront of the edge native revolution. Say goodbye to boring car rides and workout sessions as you hear about the latest trends and hottest technologies that will drive the edge to be at least four times the spend as public cloud. Subscribe to the Edge Native Podcast and join us.
…
continue reading
Ubuntu AI is a community where experts talk about the impact of artificial intelligence, machine learning and data science. There will be technical and business conversations focused on open-source technology and its importance of it in the area. Andreea Munteanu, AI/ML Product Manager, and Maciej Mazur, Principal AI/ML Engineer, are your hosts, walking through a wide range of conversations about machine learning operations, open source tooling, artificial intelligence and more… If you want ...
…
continue reading
If you're looking to leverage the insane power of modern GPUs for data science and ML, you might think you'll need to use some low-level programming language such as C++. But the folks over at NVIDIA have been hard at work building Python SDKs which provide nearly native level of performance when doing Pythonic GPU programming. Bryce Adelstein Lelb…
…
continue reading

1
Using AI Agents to Solve Cloud Vulnerability Overload
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn…
…
continue reading

1
#508: Program Your Own Computer with Python
1:11:56
1:11:56
Play later
Play later
Lists
Like
Liked
1:11:56If you've heard the phrase "Automate the boring things" for Python, this episode starts with that idea and takes it to another level. We have Glyph back on the podcast to talk about "Programming YOUR computer with Python." We dive into a bunch of tools and frameworks and especially spend some time on integrating with existing platform APIs (e.g. ma…
…
continue reading

1
Adapting to New Threats, Copilot Risks & The Future of Data (Feat. Matthew Radolec, Varonis)
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31AI is reshaping cybersecurity as we know it. From sophisticated AI-driven phishing attacks to the amplified risk of insider threats using tools like Copilot, the landscape is shifting at an unprecedented pace. How can security leaders and practitioners adapt? Join Ashish Rajan and Matthew Radolec (Varonis) as they explore the critical challenges an…
…
continue reading

1
#507: Agentic AI Workflows with LangGraph
1:03:59
1:03:59
Play later
Play later
Lists
Like
Liked
1:03:59If you want to leverage the power of LLMs in your Python apps, you would be wise to consider an agentic framework. Agentic empowers the LLMs to use tools and take further action based on what it has learned at that point. And frameworks provide all the necessary building blocks to weave these into your apps with features like long-term memory and d…
…
continue reading
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security. Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts: Jackie B…
…
continue reading

1
CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It?
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier. In this episode, we unpack the complexities of securing AI, from the fundamental shifts in applic…
…
continue reading

1
#506: ty: Astral's New Type Checker (Formerly Red-Knot)
1:04:19
1:04:19
Play later
Play later
Lists
Like
Liked
1:04:19The folks over at Astral have made some big-time impacts in the Python space with uv and ruff. They are back with another amazing project named ty. You may have known it as Red-Knot. But it's coming up on release time for the first version and with the release it comes with a new official name: ty. We have Charlie Marsh and Carl Meyer on the show t…
…
continue reading

1
Cloud Security Evolved: From CNAPP to AI Threats
19:16
19:16
Play later
Play later
Lists
Like
Liked
19:16The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security. Elad shares his insights on how the land…
…
continue reading

1
#505: t-strings in Python (PEP 750)
1:11:59
1:11:59
Play later
Play later
Lists
Like
Liked
1:11:59Python has many string formatting styles which have been added to the language over the years. Early Python used the % operator to injected formatted values into strings. And we have string.format() which offers several powerful styles. Both were verbose and indirect, so f-strings were added in Python 3.6. But these f-strings lacked security featur…
…
continue reading

1
RSA Conference 2025 Recap: Top Themes, Actionable Insights & Future Trends
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52Dive deep into the key takeaways from RSA Conference 2025 with our expert panel! Join Ashish Rajan, James Berthoty, Chris Hughes, Tanya Janca, and Francis Odum as they dissect the biggest trends, surprises, and "hot takes" from one of the world's largest cybersecurity events. In this episode, we cover: Initial reactions and the sheer scale of RSA C…
…
continue reading
What trends and technologies should you be paying attention to today? Are there hot new database servers you should check out? Or will that just be a flash in the pan? I love these forward looking episodes and this one is super fun. I've put together an amazing panel: Gina Häußge, Ines Montani, Richard Campbell, and Calvin Hendryx-Parker. We dive i…
…
continue reading
Pandas is at a the core of virtually all data science done in Python, that is virtually all data science. Since it's beginning, Pandas has been based upon numpy. But changes are afoot to update those internals and you can now optionally use PyArrow. PyArrow comes with a ton of benefits including it's columnar format which makes answering analytical…
…
continue reading

1
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig. Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains…
…
continue reading

1
#502: Django Ledger: Accounting with Python
1:03:38
1:03:38
Play later
Play later
Lists
Like
Liked
1:03:38Do you or your company need accounting software? Well, there are plenty of SaaS products out there that you can give your data to. but maybe you also really like Django and would rather have a foundation to build your own accounting system exactly as you need for your company or your product. On this episode, we're diving into Django Ledger, create…
…
continue reading

1
Scaling Container Security Without Slowing Developers
28:13
28:13
Play later
Play later
Lists
Like
Liked
28:13Are you struggling to implement robust container security at scale without creating friction with your development teams? In this episode, host Ashish Rajan sits down with Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer, for a masterclass in practical container security. This episode was recorded LIVE at KubeCon EU,…
…
continue reading

1
#501: Marimo - Reactive Notebooks for Python
1:00:35
1:00:35
Play later
Play later
Lists
Like
Liked
1:00:35Have you ever spent an afternoon wrestling with a Jupyter notebook, hoping that you ran the cells in just the right order, only to realize your outputs were completely out of sync? Today's guest has a fresh take on solving that exact problem. Akshay Agrawal is here to introduce Marimo, a reactive Python notebook that ensures your code and outputs a…
…
continue reading

1
How Attackers Stay Hidden Inside Your Azure Cloud
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected. Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders. …
…
continue reading

1
#500: Django Simple Deploy and other DevOps Things
57:34
57:34
Play later
Play later
Lists
Like
Liked
57:34We're sitting down with Eric Matthes, the educator, author, and developer behind Django Simple Deploy. If you've ever struggled with taking that final step of getting your Django app onto a live server (without spending days wrestling with DevOps complexities), then give Django Simple Deploy a look. Eric shares how Django Simple Deploy automates aw…
…
continue reading

1
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team. Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Goog…
…
continue reading

1
#499: BeeWare and the State of Python on Mobile
1:07:47
1:07:47
Play later
Play later
Lists
Like
Liked
1:07:47This episode is all about Beeware, the project that working towards true native apps built on Python, especially for iOS and Android. Russell's been at this for more than a decade, and the progress is now hitting critical mass. We'll talk about the Toga GUI toolkit, building and shipping your apps with Briefcase, the newly official support for iOS …
…
continue reading

1
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
51:35
51:35
Play later
Play later
Lists
Like
Liked
51:35The cloud security landscape may have just shifted — and we're here to break it down. In this special panel episode, host Ashish Rajan is joined by an all-star group of cloud and cybersecurity experts to discuss one of the most important conversations in cloud security today: the changing nature of security architecture, SOC readiness, and how team…
…
continue reading

1
#498: Algorithms for high performance terminal apps
1:08:16
1:08:16
Play later
Play later
Lists
Like
Liked
1:08:16In this episode, we welcome back Will McGugan, the creator of the wildly popular Rich library and founder of Textualize. We'll dive into Will's latest article on "Algorithms for High Performance Terminal Apps" and explore how he's quietly revolutionizing what's possible in the terminal, from smooth animations and dynamic widgets to full-on TUI (or …
…
continue reading
Have you ever wondered why certain data points stand out so dramatically? They might hold the key to everything from fraud detection to groundbreaking discoveries. This week on Talk Python to Me, we dive into the world of outlier detection with Python with Brett Kennedy. You'll learn how outliers can signal errors, highlight novel insights, or even…
…
continue reading
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud. Why prevention i…
…
continue reading

1
#496: Scaf: Complete blueprint for new Python Kubernetes projects
1:19:34
1:19:34
Play later
Play later
Lists
Like
Liked
1:19:34Today we explore the wild world of Python deployment with my friend, Calvin Hendryx-Parker from Six Feet Up. We’ll tackle some of the biggest challenges in taking a Python app from “it works on my machine” to production, covering inconsistent environments, conflicting dependencies, and sneaky security pitfalls. Along the way, Calvin shares how cont…
…
continue reading

1
CNAPPs & CSPMs don’t tell the full cloud security story
49:23
49:23
Play later
Play later
Lists
Like
Liked
49:23In this episode we speak to Nick Jones, an expert in offensive cloud security and Head of Research at WithSecure to expose the biggest security gaps in cloud environments and why CNAPPs and CSPMs alone are not enough often. How cloud pentesting differs from traditional pentesting Why CSPMs & CNAPPs don’t tell the full cloud security story The bigge…
…
continue reading
What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the comp…
…
continue reading
AWS networking isn’t as simple as it seems and when you’re dealing with regulated industries like healthcare, the stakes are even higher. In this episode we sit down with Kyler Middleton and Jack W. Harter from Veradigm — who have navigated complex AWS networking challenges while migrating from on-prem data centers to the cloud. We speak about: The…
…
continue reading

1
#495: OSMnx: Python and OpenStreetMap
1:01:55
1:01:55
Play later
Play later
Lists
Like
Liked
1:01:55On this episode, I'm joined by Dr. Geoff Boeing, an assistant professor at the University of Southern California whose research spans urban planning, spatial analysis, and data science. We explore why OpenStreetMap is such a powerful source of global map data—and how Geoff's Python library, OSMnx, makes that data easier to download, model, and visu…
…
continue reading

1
#494: Update on Flet: Python + Flutter UIs
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23As Python developers, we're incredibly lucky to have over half a million packages that we can use to build our applications with over at PyPI. However, when it comes to choosing a UI framework, the options get narrowed down very quickly. Intersect those choices with the ones that work on mobile, and you have a very short list. Flutter is a UI frame…
…
continue reading

1
Cloud Incident Response in Microsoft Azure
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15In this episode, we dive deep into Azure security, incident response, and the evolving cloud threat landscape with Katie Knowles, Security Researcher and former Azure Incident Responder. We spoke about common Azure incident response scenarios you need to prepare for, how identity and privilege escalation work in Azure, how Active Directory and Entr…
…
continue reading

1
AWS Multi-Account Security: What Netflix Learned
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33🚀 How do you secure thousands of AWS accounts without slowing down developers? Netflix’s cloud security experts Patrick Sanders & Joseph Kjar join us to break down their identity-first security model and share lessons from scaling security across a massive AWS multi-account environment. In this episode, we cover: Why identity, not network, is the b…
…
continue reading

1
#493: Quarto: Open-source technical publishing
1:05:01
1:05:01
Play later
Play later
Lists
Like
Liked
1:05:01In this episode, I'm joined by JJ Allaire, founder and executive chairman at Posit, and Carlos Scheidegger, a software engineer at Posit, to explore Quarto, an open-source tool revolutionizing technical publishing. We discuss how Quarto empowers users to seamlessly transform Jupyter notebooks into polished reports, dashboards, e-books, websites, an…
…
continue reading

1
Cloud Security Detection & Response Strategies That Actually Work
57:58
57:58
Play later
Play later
Lists
Like
Liked
57:58We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives deep into: Why cloud security is NOT like on-prem – and how that affects incident response How attackers exploit APIs in seconds (yes, seconds—not hours…
…
continue reading
Join me as I chat with Rich Iannone and Michael Chow from Posit where we explore the transformative power of data tables with the Great Tables library. We'll cover practical applications of Great Tables, showcasing how thoughtful design and advanced formatting can elevate your data presentations. And you'll learn about innovative features like nano…
…
continue reading
In this episode, we sit down with Sunil Rane, an experienced cybersecurity leader with over 20 years in cybersecurity across industries like healthcare, education, media, and consulting. Sunil shares unique insights into the diverse challenges faced by CISOs, from managing data sensitivity in healthcare to the lack of standardized frameworks in med…
…
continue reading

1
Why Solving the Data Problem is Key to Cloud Security?
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode we’re joined by Francis Odum, founder and lead research analyst at Software Analyst Cyber Research. Drawing from his extensive research and conversations with CISOs, security operators, and vendors, Francis shares his insights on the state of identity security and the rise of non-human identities (NHI) in the cloud, why solving the …
…
continue reading

1
The economics of cybersecurity and trends
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03In this episode, host Ashish Rajan spoke to Mike Privette, founder of Return on Security, to explore the landscape of cybersecurity as we look toward 2025. Mike shared his unique insights on the economics of cybersecurity, breaking down industry trends, and discussing how AI is revolutionizing areas like governance, risk, compliance (GRC), and data…
…
continue reading

1
The Truth About CNAPP and Kubernetes Security
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episode James breaks down CNAPP and what it really means for engineers, if kubernetes secuity is the new baseline for cloud security and runtime security v…
…
continue reading

1
Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem
1:10:13
1:10:13
Play later
Play later
Lists
Like
Liked
1:10:13In this episode our host Ashish Rajan sat down with Ross Haleliuk, author of Cybersecurity for Builders and creator of the Venture in Security blog, to explore the current state and future of the cybersecurity industry. From understanding the challenges of building a cybersecurity startup to the dynamics of security engineering and market trends fo…
…
continue reading

1
#491: DuckDB and Python: Ducks and Snakes living together
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03Join me for an insightful conversation with Alex Monahan, who works on documentation, tutorials, and training at DuckDB Labs. We explore why DuckDB is gaining momentum among Python and data enthusiasts, from its in-process database design to its blazingly fast, columnar architecture. We also dive into indexing strategies, concurrency considerations…
…
continue reading
If you're a Django developer, I'm sure you've heard so many people raving about FastAPI and Pydantic. But you really love Django and don't want to switch. Then you might want to give Django Ninja a serious look. Django Ninja is highly inspired by FastAPI, but is also deeply integrated into Django itself. We have Vitaliy Kucheryaviy the creator of D…
…
continue reading

1
#489: Anaconda Toolbox for Excel and more with Peter Wang
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09Peter Wang has been pushing Python forward since the early days of its data science roots. We're lucky to have him back on the show. We're going to talk about the Anaconda Toolbox for Excel as well as many other trends and topics that are hot in the Python space right now. I'm sure you'll enjoy listening to the two of us exchanging our takes on the…
…
continue reading

1
Centralized VPC Endpoints - Why It Works for AWS Networking
48:41
48:41
Play later
Play later
Lists
Like
Liked
48:41In this episode, Meg Ashby, a senior cloud security engineer shares how her team tackled AWS’s centralized VPC interface endpoints, a design often seen as an anti-pattern. She explains how they turned this unconventional approach into a cost-efficient and scalable solution, all while maintaining granular controls and network visibility. She shares …
…
continue reading
See the full show notes for this episode on the website at talkpython.fm/488By Michael Kennedy (@mkennedy)
…
continue reading
In this episode, recorded at Kubecon NA in Salt Lake City, we spoke about about Kubernetes security with Shauli Rozen, co-founder and CEO of ARMO Security. From the challenges of runtime protection to the potential of CADR (Cloud Application Detection and Response), Shauli breaks down the gaps in traditional CSPM tools and how Kubernetes plays a ce…
…
continue reading

1
#487: Building Rust Extensions for Python
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24See the full show notes for this episode on the website at talkpython.fm/487By Michael Kennedy (@mkennedy)
…
continue reading

1
#486: CSnakes: Embed Python code in .NET
1:02:45
1:02:45
Play later
Play later
Lists
Like
Liked
1:02:45See the full show notes for this episode on the website at talkpython.fm/486By Michael Kennedy (@mkennedy)
…
continue reading

1
Building Platforms in Regulated Industries
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compliance intersect to drive innovation in regulated industries like insurance. They spoke about why regulations aren't barriers but frameworks to prevent…
…
continue reading