Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Open Source Security Podcasts
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There's a lot of good work happening that doesn't get attention because there's no marketing department behind it, they don't have a developer relations team posting on LinkedIn every two hours. Let's focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The Angular Plus Show is the home of ng-conf's official all-Angular podcast. Come here to stay up to date on the latest changes in the Angular community. Expect to laugh and cry with us as we talk about our experiences as Angular developers.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Hi, we’re Tim Berglund, Adi Polak, and Viktor Gamov and we’re excited to bring you the Confluent Developer podcast (formerly “Streaming Audio.”) Our hand-crafted weekly episodes feature in-depth interviews with our community of software developers (actual human beings - not AI) talking about some of the most interesting challenges they’ve faced in their careers. We aim to explore the conditions that gave rise to each person’s technical hurdles, as well as how their experiences transformed th ...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Welcome to Open Comments hosted by The Open Group*, where we’ll discuss things openly with our guests from a variety of backgrounds and from different walks of life. Through this podcast, we hope to give you an inside look into a variety of topics with an equal mix of humor and candor. In this series so far, we have touched on the following topics: Healthcare, HR, Diversity + Access to Technology, Cybersecurity, and lots more. We hope you enjoy our show and look forward to bringing more topi ...
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Podcast on enterprise technologies including cloud native, GenAI, Security, Data Protection and more.
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
IT Talks (produced by Redpill Linpro) lets you in on how it is to work with us, how customers have solved IT challenges, the open source perspective, new industry trends by our partners, and much more. We have offices in Denmark, Norway, and Sweden – and we have recorded talks at all of our locations and the chats are held in local language.
…
continue reading
1101
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
…
continue reading
Industry experts talk open source software, open trends more broadly, and the inventions they make possible.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
1
Securing the Future of Open Source - A Conversation with Roy Gottlieb
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Send us a text In this episode of Secure Insights, James sits down with Roy Gottlieb, CEO and Co-Founder of Hopper Security, a fast-growing player in the application security space with a sharp focus on securing open-source software. Roy takes us through the origin story of Hopper Security, why the company was created, the problem they set out to s…
…
continue reading
1
Linux Vendor Firmware Service with Richard Hughes
35:46
35:46
Play later
Play later
Lists
Like
Liked
35:46Josh talks to Richard Hughes about the world of firmware. We cover how Richard's journey from developing the ColorHug led to the creation of the Linux Vendor Firmware Service (LVFS), changing how firmware updates are managed for nearly every Linux user. Updating firmware has always been dicey, and on Linux it used to be impossible. Richard helps us…
…
continue reading
1
A Deep Dive into the Open Source Project Security (OSPS) Baseline
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode of "What's in the SOSS," CRob, Ben Cotton, and Eddie Knight discuss the Open Source Project Security Baseline. This baseline provides a common language and control catalog for software security, enabling maintainers to demonstrate their project's security posture and fostering confidence in open source projects. They explore its int…
…
continue reading
1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
continue reading
1
Why is the SEC Concerned about Privacy now?
1:02:58
1:02:58
Play later
Play later
Lists
Like
Liked
1:02:58At DevConnect 2025, Sebastian and Friederike speak with Peter Van Valkenburgh about the rapidly evolving battle for digital rights. Peter challenges the industry's comfort with transparency, arguing that "transparency will destroy neutrality." He uses the history of SWIFT to illustrate how a once-neutral messaging system was captured by geopolitica…
…
continue reading
How we can use an output-based system to judge whether or not different kinds of technology achieve understanding or intelligence. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
How we can use an output-based system to judge whether or not different kinds of technology achieve understanding or intelligence. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-531
…
continue reading
1
265 Work as system consultant at Redpill Linpro
18:34
18:34
Play later
Play later
Lists
Like
Liked
18:34Guest: Sindre Iversen Language: Norwegian Duration: 18:33 In this episode of IT Talks, Sindre, a system consultant at Redpill Linpro in Oslo, talks about his role and daily work. He shares his experience of tackling clients' operational challenges, with a focus on Kubernetes, CI/CD, and managing legacy systems that have not yet been migrated.…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
1
🎂 Angular v21 with Jessica Janiuk: Signal Forms, AI & ARIA
1:02:53
1:02:53
Play later
Play later
Lists
Like
Liked
1:02:53Happy 21st birthday Angular! Join hosts Brooke Avery, Lara Newsom, and Brian Love for a pre-release look at Angular v21 with special guest Jessica Janiuk of the Angular Core Team. This episode is a deep dive into the most anticipated features: Signal Forms, the new signal-based approach simplifying forms, improving type safety, and validation; the …
…
continue reading
1
What VCs Really Look For in Early-Stage Cybersecurity Startups with YL Ventures ustin Somaini
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Send us a text This week on Secure Insights, we’re joined by Justin Somaini of YL Ventures, one of the world’s top cybersecurity VCs and ranked in the Top 10 globally by PitchBook. As a firm behind multiple security unicorns, Justin brings a rare, insider view into what truly turns bold ideas into investable, scalable businesses. We break down the …
…
continue reading
1
Drone Warfare in Ukraine with Simon Shuster
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45Simon Shuster is a journalist who has reported on Russia and Ukraine for over 15 years, most of that time as a staff correspondent for TIME Magazine. He was born in Moscow, and he and his family came to the United States as refugees from the Soviet Union when he was six years old. After graduating from Stanford University in 2005, Simon returned to…
…
continue reading
Episode 245: This week's Surveillance Report covers WhatsApp's massive phone number enumeration flaw that exposed 3.5 billion users' data through poor rate limiting - potentially the largest data exposure in history. I also examine Google's new Android sideloading restrictions threatening open app distribution, the EU's concerning Digital Omnibus p…
…
continue reading
1
Nate Steps Down + What Happens to Surveillance Report
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22After 4+ years, Nate from The New Oil is stepping down from co-hosting the pod, but Surveillance Report isn't going anywhere. Here's what's changing, what's staying the same, and how to continue listening to Surveillance Report! (Hint: Nothing changes here on the podcast!) Surveillance Report continues with the same mission: weekly privacy and secu…
…
continue reading
1
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless systems to cybersecurity. Amy shares the eye-opening story behind her Blue Team Con talk on how misdirected emails exposed sensitive personal data and what that means for digital identity. The conversa…
…
continue reading
1
SBOM Chaos and Software Sovereignty: The Hidden Challenges Facing Open Source with Stephanie Domas (Canonical)
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44Stephanie Domas, Canonical's Chief Security Officer, returns to What's in the SOSS to discuss critical open source challenges. She addresses the issues of third-party security patch versioning, the rise of software sovereignty, and how custom patches break SBOMs. Domas also explains why geographic code restrictions contradict open source principles…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
UK Online Safety Act: Digital ID and the Risks of a Database State
1:06:17
1:06:17
Play later
Play later
Lists
Like
Liked
1:06:17In this episode of "Nerding Out with Viktor," host Viktor Petersson sits down with James Baker, Policy and Campaigns Manager at Open Rights Group, to explore the real-world impact of the UK Online Safety Act and proposed Digital ID systems. Together, they unpack how the UK's approach to digital identity is raising concerns about centralization, pri…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Open Comments S2 Ep. 10: Beyond Security and Zero Trust with John Linford
16:50
16:50
Play later
Play later
Lists
Like
Liked
16:50The ground under cybersecurity is always moving, but the smartest teams aren’t chasing shiny tools—they’re changing how they think. We sit down with John Linford, Forum Director of the Security Portfolio at The Open Group, to revisit zero trust, quantitative risk, and the education efforts that turn strategy into daily behavior. What’s different si…
…
continue reading
Radix UI is an open-source library of React components. Its “headless” primitives handle the complex logic and accessibility concerns—like dialogs, dropdowns, and tabs—while leaving styling completely up to the developer. The project emphasizes usability, accessibility, and composability and has become a vital part of modern web dev, in part becaus…
…
continue reading
1
What’s Next for Secure Infrastructure? A Conversation with Kerys Software CEO Thomas Girard
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56Send us a text In this week's episode of Secure Insights, we dive straight into the big questions shaping the future of secure infrastructure: Is virtualization truly secure for critical workloads? How can we guarantee performance, reliability, and isolation simultaneously? What does secure resource sharing look like for GPUs, TSUs, and NPUs? And w…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Grid-Locked: The Battle over Data Centers w/ Asad Ramzanali and Daniel King
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08The future of AI may be decided in backyards. Data Centers—the sprawling facilities designed to support the massive computing required to train and run AI models—are being built across the country. One estimate sees more than $1 trillion dollars in capital spending on data centers in the next four years. And they use electricity—a lot of it. While …
…
continue reading
This week Dave and Gunnar are joined by Dan Walsh on the eve of his retirement! What is new in SUSE Linux Enterprise Server 16.0: “The most significant security update is the transition from AppArmor to SELinux as the default Mandatory Access Control (MAC) framework.” Bootc Dan Walsh Red Hat Obituary SELinux Dan’s Russian Blog Cursor Podman In Acti…
…
continue reading
1
Reimagining Stream Processing with Matthias J. Sax | Ep. 9
36:42
36:42
Play later
Play later
Lists
Like
Liked
36:42Viktor Gamov talks to Matthias J. Sax (Confluent) about his career in stream processing and, specifically, Kafka Streams. Matthias’ first job: an electrician-in-training on BMW’s assembly lines. His challenge: building Kafka Streams at Confluent with a focus on API design, backward compatibility, and a library-first approach that also fits microser…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
#746: AWS Regional Planning Tool, MCP Proxy for AWS, and Lots More!!!
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01There are so many updates this week you might need two cups of coffee! Simon and Jillian guide your way.By Amazon Web Services
…
continue reading
1
Fundamentals first: The case for foundational intelligence today
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17Recorded live from DSEI 2025. Join host Kate Cox and a panel of Janes experts including Sean Corbett, Dylan Lehrke, and Tom Barton, as they unpack the essentials of intelligence, from foundational data to cutting-edge military insights. Discover what goes on behind the scenes in crafting the intelligence that informs global defence strategies and d…
…
continue reading
1
NC #1071 Eddie Tonkoi on Static Site Generator Hugo, Bart Talks AI Privacy
1:22:16
1:22:16
Play later
Play later
Lists
Like
Liked
1:22:16Creating a Book Website with Static Site Generator Hugo — by Eddie Tonkoi Support the Show - Write a 5-Star Review Bart on How He's Using AI with Privacy in Mind (No blog post) Transcript of NC_2025_11_16 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal…
…
continue reading
How humans and AI models both share the weakness of deterioration without novel inputs. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
How humans and AI models both share the weakness of deterioration without novel inputs. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
Guest: Nora Ali, Ingrid Hofskelrud, Frida S. Klemetsrud Language: Norwegian Duration: 21:15 Redpill Linpro's DevOps Academy in Oslo is a trainee program aimed at young talents, where participants gets hands-on experience with IT infrastructure and DevOps. In the fall of 2025, the second round of the academy began. The participants Nora, Ingrid, and…
…
continue reading
Episode 244: AI browsers are here and already pose huge risks, Windows 10 finally reaches end of life, Ring is partnering with Flock, many ICE stories, and more. Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. Timestamps Sources (00:00) Introduction (00:29) Highlight S…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
1
6 Devices Secretly Tracking You Everywhere Odysee
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48Your car has more sensors than the old Saturn V rocket that went to the moon. Your "smart" devices such as your TV, vacuum and electricity meter know more about you than you realize. These are the six most alarming devices that are tracking your data every day. Download the free security checklist here: https://www.allthingssecured.com/checklist He…
…
continue reading
1
The 2025 Stack Overflow Developer Survey with Jody Bailey and Erin Yepis
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13The Stack Overflow Developer Survey is an annual survey conducted by Stack Overflow that gathers comprehensive insights from developers around the world. It offers a valuable snapshot of the global developer community, covering a wide range of topics such as preferred programming languages, tools, and technologies. Jody Bailey is the Chief Product …
…
continue reading
Captured live at Cosmoverse 2025, this episode brings host Sebastian in conversation with Michael (better known as Cryptocito, Cosmos investor via Cito Ventures) and Magnus (@0xMagmar, Co-CEO Cosmos Labs). Against a backdrop of institutional gravitas, central banks mingling alongside Revolut executives, the conversation traces Cosmos' arc across fi…
…
continue reading
1
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpack his unconventional journey from fish and chips to threat intelligence. He shares how his military forensics experience shaped his InfoSec leadership and dives deep into the evolving role of the CISO…
…
continue reading