A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Financial security isn’t just about numbers—it’s about peace of mind, protection, and a lasting legacy. Welcome to The JondaKnows Show, where we bring together leading personal finance experts, industry professionals, and real-world success stories to empower you with practical financial wisdom that helps you take control of your money. Are you a personal finance expert, author, coach, or industry professional with valuable insights on budgeting, investing, borrowing, or financial security? ...
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
…
continue reading
Welcome to Premio Inc's rugged edge media hub, a resource for rugged edge computing content that features product videos, technical application videos, podcasts, and company insights.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
…
continue reading
Financial Advisor Tim Russell, CFP® of Life Financial Group, and Pastor Drew Gysi of Life Institute, explore the Theology of Biblical Financial Stewardship and its application to everyday financial decisions. For more, visit www.StewardologyPodcast.com
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Nancy L. Cavey, a seasoned attorney with over thirty-nine years of experience, explains the complex world of filing for Social Security Disability benefits. Filing for disability can be a confusing, life changing event, so with her deft expertise, Nancy will guide you through: - The ins-and-outs of qualifying for Social Security Disability benefits (such as age and insurance requirements). - Information regarding the process and lifespan of a claim, from the initial application to the reques ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Consumer advocacy in application security
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Explore and learn about the present and future of application delivery and security, and how to solve the business challenges facing IT teams and end users.
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Why Are We Still Struggling to Fix Application Security?
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Eric Gold, chief evangelist, BackSlash. In this episode: Start with t…
…
continue reading

1
Application Risk in Security Copilot with Ari Schorr
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02How can Security Copilot help you secure your applications? Richard talks to Ari Schorr about assessing application risk with Microsoft Security Copilot - a new feature in preview in Security Copilot that focuses on application roles and entities. Ari talks about the sheer array of resources that applications depend on, and the many security risks …
…
continue reading
The MyPillow guy’s lawyer used AI to write court filings in the Dominion case. Big mistake.By Kim Komando
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading
Have a comment or question? Click this sentence to send us a message, and we might answer it in a future episode. Welcome to Season 1, Episode 15 of Winning Isn't Easy: Navigating Your Social Security Disability Claim. In this episode, we'll dive into the complicated topic of "Filing for a Hearing." Join host Nancy L. Cavey, an experienced disabili…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
…
continue reading

1
Modern Work in 2025 with Karoliina Kettukari
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
…
continue reading
Hackers are using AI to create fake job candidates that look and sound real on Zoom. Try this pro trick to spot them.By Kim Komando
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Internet Performance Monitoring: Next Level Application Resilience
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52What is Internet Performance Monitoring (IPM)? In this episode of the SMC Journal, you’ll learn about blind spots in current APM and Observability platforms, and why IPM is crucial for monitoring modern applications on the web. ☕ Want to support the show? Buy Me A Coffee! https://bit.ly/3NadcPK ☕ OR BUY MY COFFEE ► https://bit.ly/503blend 💵 Buy som…
…
continue reading

1
Accelerating Development with i.MX 9 Series Processors
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Welcome back to the EdgeVerse TechCast! This episode dives deep into the world of NXP's i.MX Processors with guest Sanjana Kubde, Product Marketing Manager at NXP. Explore the exciting updates in the i.MX 9 series, including innovations in Artificial Intelligence, Security, and Connectivity. Discover how NXP's evaluation kits (EVK) and FRDM develop…
…
continue reading
Some moments are meant for respect, not your camera roll.By Kim Komando
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
240: Top Budgeting Mistakes We See at our Seminars
46:58
46:58
Play later
Play later
Lists
Like
Liked
46:58Financial Advisor Tim Russell, CFP®, Pastor Drew Gysi, and Tyler Rutherford discuss the top budgeting mistakes we see at our seminars. Buy our new book: The Good Steward See the show notes here! Learn more at: StewardologyPodcast.com Schedule a Personal Stewardship Review at: StewardologyPodcast.com/Review Get in touch with us at: Contact@Stewardol…
…
continue reading
Are you inbox zero? If not, here’s a simple way to get rid of all those junky emails.By Kim Komando
…
continue reading

1
#718: From cost center to value creator: How IT automation creates business value
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52Learn how organizations are transforming IT from a cost center to a value generator through automation, AI, and smart business process optimization, featuring real success stories from AWS Solution Architects Adrian SanMiguel and Greg Harris.Innovate faster with an AWS Genai Competency Partner: https://aws.amazon.com/ai/generative-ai/partners/…
…
continue reading
The Los Angeles Times uncovered a covert electioneering campaign involving over 500 social media creators. Here's the scoop.By Kim Komando
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading
Turns out, tons of people still don’t know how to do it. If that’s you, here’s the quick fix for iPhone and Android.By Kim Komando
…
continue reading
Motorola unveiled a completely new Razr flip phone. But this time, the phone comes with Perplexity A.I. baked in.By Kim Komando
…
continue reading
Ever post a pic online? There's a good chance it was scraped and added to an AI dataset. Check this site to find out.By Kim Komando
…
continue reading
Two teens started flipping discarded items from landfills. Now they run a seven-figure resale business.By Kim Komando
…
continue reading
Looking for a way to get in touch with someone online? Try these pro tips.By Kim Komando
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Show Notes: https://securityweekly.com/swn-471…
…
continue reading
Older Americans lost nearly $5 billion to scams last year. Don’t let it happen to your loved ones.By Kim Komando
…
continue reading

1
It's Here! The Good Steward Is Officially Out Now!
19:42
19:42
Play later
Play later
Lists
Like
Liked
19:42Get your copy of The Good Steward today! Buy on Amazon Get one for yourself and one for a friend! Subscribe to get episodes delivered to your inbox every week. Follow along: Facebook, Instagram A ministry of Life Financial Group & Life Institute. Securities and Advisory Services offered through GENEOS WEALTH MANAGEMENT, INC. Member FINRA and SIPC…
…
continue reading

1
The Role of JCO Series NVIDIA Jetson AI Edge Computers in Industrial 4.0 Security
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Looking for a rugged edge AI computer for industrial 4.0 security solutions? Our Product Marketing Specialist, Luyang Xing, breaks down the JCO Series NVIDIA Jetson AI EDGE Computer Family and how its key features are accommodating critical trends in Industry 4.0 security and surveillance. Learn more >>…
…
continue reading

1
Product Series Introduction: AIO Series All In One Touchscreen Computers
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Explore how Premio’s AIO Series All-in-One Touchscreen Computers enable real-time analysis, rugged reliability, and seamless IT/OT convergence for smart security systems. In this ISC West 2025 interview, Annie Yang shares key industry trends and how the AIO Series supports 24/7 operations, flexible I/O, and compact deployment. Discover real-world a…
…
continue reading

1
Product Deep Dive: BCO Series x86 Semi-Rugged Industrial Computers
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Join Daniel Litwin, the voice of B2B, and Product Marketing Specialist Colin Wu as they break down the latest in x86 Semi-rugged industrial computers, the BCO Series. Learn more about the BCO Series: https://premioinc.com/collections/bco-series-x86-semi-rugged-industrial-computers
…
continue reading

1
Meet DCO-1000-ASL DIN-Rail IoT Gateway at ISC West
2:40
2:40
Play later
Play later
Lists
Like
Liked
2:40Looking for a compact IoT gateway with DIN-Rail mounting? DCO-1000-ASL is a standard DIN-Rail PC purpose-built for access control systems. Listen to our two product marketing specialists break down DCO's key features at ISC West 2025. Learn More >>
…
continue reading
Not a fan of the grocery run? Use these quick tech tricks to stay organized, save money, and skip the hassle.By Kim Komando
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig. Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains…
…
continue reading
Who will lead the Catholic Church next? ChatGPT, Gemini, and Grok all have guesses — but they can’t seem to agree.By Kim Komando
…
continue reading
On April 25, 2020, Geertjan Wielenga published the first Foojay post. Yes, we are celebrating 5 years since the Friends Of OpenJDK website launch! Today, more than 1,600 posts are on the site, written by over 250 authors. And there is much more to discover within the Foojay world... In this podcast, we look at how Foojay started with founder Geertj…
…
continue reading