Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Software Engineering Daily Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Developer Tea

Jonathan Cutrell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
  continue reading
 
We live in a world where our civilization and daily lives depend upon institutions, infrastructure, and technological substrates that are _complicated_ but not _unknowable_. Join Patrick McKenzie (patio11) as he discusses how decisions, technology, culture, and incentives shape our finance, technology, government, and more, with the people who built (and build) those Complex Systems.
  continue reading
 
Artwork

1
Off the VPN

Jellyfish

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
  continue reading
 
Artwork

1
Built This Week

Jordan Metzner, Samuel Nadler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Built This Week is a weekly podcast where real builders share what they're shipping, the AI tools they're trying, and the tech news that actually matters. Hosted by Sam and Jordan from Ryz Labs, the show offers a raw, inside look at building products in the AI era—no fluff, no performative hype, just honest takes and practical insights from the front lines.
  continue reading
 
What does it take to be a great leader? We asked some of the most influential names in software engineering and product management. You’ll learn ways to grow as a software engineering leader, optimize your time, develop your team, structure your organization, and get the right products to market, faster. In each episode, Joshua Samberg and Robin Pokorný uncover the empowering insights and daily habits of industry leaders who think, speak, and act in ways that make a positive difference in th ...
  continue reading
 
Few careers have the kind of daily worldwide impact as software engineering. It shapes the interactions that billions of people have online across so many moments of their days. So, how do software engineers keep ahead of the world's increasing reliance on IT solutions? Welcome to SEEK Bytes, a podcast for software engineers, by software engineers who work at SEEK, an Australian-founded leader in online employment marketplaces. Each fortnight, our team of hosts and guests will explore intern ...
  continue reading
 
Artwork

1
Hacker News Recap

Wondercraft.ai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast that recaps some of the top posts on Hacker News every day. This is a third-party project, independent from HN and YC. Text and audio generated using AI, by Wondercraft.ai. Create your own news rundown podcast at app.wondercraft.ai
  continue reading
 
Artwork

1
Beyond Coding

Patrick Akil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beyond Coding is a weekly podcast with conversations that go "beyond coding" in a fireside chat format. Common topics are tech, entrepreneurship, and career journeys. Authentic, informative and inspiring. That's the aim for each episode. New episodes every Wednesday 🎙
  continue reading
 
How does modern day Korea compare to America? Join co-hosts Daniel and Jun every week as they explore a topic and discuss it from both the American and Korean perspective. If you're looking to learn more about Korean society and culture, are a part of the Korean diaspora and curious how Korea has changed since you, your parents, or your grandparents left, or are simply interested in broadening your personal worldview and perspective, then we hope you'll listen in and join us on this journey! ...
  continue reading
 
Artwork

1
The KYT Show

Kar Yung Tom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Software Engineering graduate, Kar Yung Tom is a games enthusiast with high-level tournament experience in chess, Magic: The Gathering, poker and daily fantasy sports. In this show, KYT interviews personalities from the gaming world with a focus on up-and-coming Canadian talent in the world of MTG.
  continue reading
 
Welcome to the SEO.co Daily Search Engine Optimization Podcast. Bringing you daily SEO & digital marketing tips that we've learned throughout our 20+ years of internet marketing. Learn the latest SEO, content marketing, link building, social marketing, conversion optimization, persuasive selling & internet marketing tactics that work today. Learn more at SEO.co.
  continue reading
 
The Select* Podcast features guests across a wide range of backgrounds & topics, with the goal of being your resource for software engineering, leadership advice, edge computing, machine learning, inclusion, tech trends, data management, career paths, enterprise tech, & much, much more. The Select* Podcast is also known as the Select Star Podcast or the HarperDB Podcast. If you listen to podcasts like Syntax, Founder Stories, Changelog, CodeNewbie, TechStuff, Stack Overflow, Software Enginee ...
  continue reading
 
Artwork

1
Trailblazer Show

Trailblazer Show

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A peak behind the scenes on the journey of amazing human beings that have blazed their own trails. You hear about the trials and tribulations in the journey. The interview explores the mental models and processes these trailblazers use daily. In other words, how do they think? How do they deal with fear + doubt? What are the things they do or think about on a daily basis that lead to positive results over time. You will have an insight into their mindset, habits, routines and books that have ...
  continue reading
 
A weekly 30-minute podcast focused on the business of fashion. Fashion Rewired is about the successful transformation of your mind, perspective, and daily approach to your fashion brand. During the Fashion Rewired Podcast, we chat with successful fashion designers and business entrepreneurs who share their powerful stories of success. While providing real time industry tips, tools, and actionable strategies to execute today. With the goal of DESIGNING our listener’s brands for success! YOUR ...
  continue reading
 
Artwork
 
Tell Me About Your Job is a podcast that dives into the jobs and careers of all kinds of normal people, the work they do every single day! We want to inform our listeners about different work fields and careers that are available to them, whether they’re high-schoolers, college students, or adults looking to change careers. We accomplish that by interviewing industry professionals about the work they do on a daily basis, and what it really looks like to have a job in their field. We hope thi ...
  continue reading
 
Artwork

1
The Back To Back Show

Back To Back SWE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The mission of Back to Back SWE is to empower the software engineer to excel in the interview and land the job of their dreams. If you are a high school student, college student, new-grad, industry professional, or...anything in the tech industry...then this podcast is for you. If you want to find the best work in technology while cutting through the bs, you are in the right place. Come visit us at https://backtobackswe.com
  continue reading
 
Loading …
show series
 
Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
  continue reading
 
This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
  continue reading
 
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
  continue reading
 
Episode 9: Hiring Tools, Built from Scratch This week, Jordan Metzner and Sam Nadler unveil Ryz ATS, a fully functioning applicant tracking system built in-house using Claude AI. From job templates and smart matching to drag-and-drop pipelines and sourcing CRM, this tool streamlines the entire hiring process with AI as a co-pilot. Then, they explor…
  continue reading
 
Todays episode delves into understanding and leveraging second and third-order consequences – the ripple effects that occur after an initial action – and introduces forcing functions, which are an inverted way of thinking about these consequences, designed to drive desired outcomes by first determining "what must be true" for them to occur. The epi…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
  continue reading
 
Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
  continue reading
 
Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
  continue reading
 
This week on Complex Systems, Patrick McKenzie (patio11) is joined by Joel Becker from METR. They discuss groundbreaking research on AI coding assistants. Joel et al’s randomized controlled trial of 16 expert developers working on major open source projects revealed a counterintuitive finding: despite predictions of 24-40% speed improvements, devel…
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
  continue reading
 
Time is your most finite resource; once you spend it, you can never get it back. In this conversation, co-founder and Senior Product Manager Joseph Hill reveals the mindset and systems he uses to be intentional with his time, manage his focus, and stay productive without burning out. In this episode, we cover: How to be intentional with your time a…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
  continue reading
 
Modern software teams typically rely on a patchwork of tools to manage planning, development, feature rollout, and post-release analysis. This fragmentation is a known challenge that can create friction and slow down software development iteration. It’s especially problematic for cross-functional teams, where differences in roles, expertise, and wo…
  continue reading
 
Modern software teams typically rely on a patchwork of tools to manage planning, development, feature rollout, and post-release analysis. This fragmentation is a known challenge that can create friction and slow down software development iteration. It’s especially problematic for cross-functional teams, where differences in roles, expertise, and wo…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
This episode delves into the philosophical concept of hyperobjects – problems so vast and complex they lack clear boundaries and cannot be "solved" once and for all. It explores why attempting to permanently fix issues like technical debt, user experience, or performance management is often ineffective. Instead, it offers a new perspective: how to …
  continue reading
 
Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
  continue reading
 
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
  continue reading
 
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
  continue reading
 
Episode 8: Can Public Make You a Better Investor? This week, Jordan Metzner and Sam Nadler go deep on Public.com, the modern investing platform opening its trading infrastructure to developers. They demo a new tool built live on Public’s API, explore the real potential of programmable investing, and sit down with Emily Kurtz (Head of Product at Pub…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
  continue reading
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It's designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
In this solo episode, Patrick McKenzie reads his classic essay "Seeing Like a Bank," exploring why financial institutions often appear to have no memory of previous customer interactions despite being excellent at tracking money itself. He breaks down the complex web of legacy systems, tiered support structures, and regulatory constraints that crea…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
  continue reading
 
What happens when our most senior engineer stops writing code altogether and lets AI handle everything? Well, you can expect projects and productivity to go out the window. Meet Simon, who is about 30+ years into the game and fully convinced that AI will fully replace the developer. From trying to build a model that could replace the whole team, to…
  continue reading
 
Dario Gieselaar, Principal Software Engineer from Elastic gets brutally honest about what it really takes to succeed in a top tech company. We uncover the uncomfortable truths about the promotion game, why direct feedback is crucial (even when it hurts), and why a "winning" mindset is everything. This is the conversation about career growth they do…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
  continue reading
 
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
  continue reading
 
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play