Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Josh Cable public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
High Voltage Discussions for Low Voltage Professionals! Join Josh Bowman as he delves into the world of Low Voltage with expert guests, covering everything from cutting-edge tech and innovative business strategies to effective marketing and sales techniques. Discover insights from the brightest minds in Security, Audio/Visual, Telecom, Structured Cabling, and Networking. Whether you’re a seasoned pro or just starting out, this podcast is your go-to resource for staying ahead in the industry. ...
  continue reading
 
Artwork

1
The Fluent Show

Kerstin Cable

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Learn a Language...Or Maybe Three! The Fluent Show is on a mission to help you get excited about language learning. We learn languages every day in our lives, and have learnt over 15 different languages between us. We share stories, news, tips, and ideas that will make you fluent...eventually. Subscribe to the show today to get your regular dose of Fluent love. It is worth clarifying that we actively want to support anti-racism and will highlight and advocate for the equality of all. Languag ...
  continue reading
 
Artwork

1
The Imperial Senate Podcast

The Imperial Senate Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Imperial Senate Podcast is a show that discusses Star Wars in a uniquely earnest and eccentric fashion! Join hosts Charlie Ashby, Nicky Kumar & Clare Stribling as they discuss the latest news and reviews with some comedic levity. Get bonus content on Patreon Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Message in a Bottle is simple: it is a conversation, using a quote as the framework. Every episode, I will ask my guest what 'message in a bottle' they have received, be it though a friend, a book, a TV show - heck, even Instagram - and how it has impacted them, influenced them, and informed their understanding of the world. We step away from the interview format, allowing my guest to share and develop their experiences, philosophies, ideas and inspirations. It is a realm for the curious, th ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Big Brown Army is just that: a one man big army. Tune in weekly to hear DeCruz banter with his friends and go on long rants about the state of the mainstream media, politics, and sports.
  continue reading
 
Loading …
show series
 
LiveKit is a platform that provides developers with tools to build real-time audio and video applications at scale. It offers an open-source WebRTC stack for creation of live, interactive experiences like video conferencing, streaming, and virtual events. LiveKit has gained significant attention for its partnership with OpenAI for the Advanced Voic…
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
Welcome to the pilot episode of SED News, a new podcast series from Software Engineering Daily. Join hosts Gregor Van and Sean Falconer as they break down the week’s most important stories in software engineering, machine learning, and developer culture. In this episode, Gregor and Sean discuss the CoreWeave IPO and the company’s recent acquisition…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
THIS WEEK: Charlie and Nicky bring you a LIVE episode from the final day of Star Wars Celebration Japan! ALSO: You can purchase Scotty's book, 'Midi-chlorians: An Alliance of Science, Mythology, and Magic' here Contact Us: Find us on Bluesky or e-mail us at [email protected]. Website: www.imperialsenatepodcast.com Support us on Patreo…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation for modern encryption protocols. Hellman has also contributed to cybersecur…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
  continue reading
 
In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid …
  continue reading
 
David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
  continue reading
 
This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
  continue reading
 
At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
Loading …
Listen to this show while you explore
Play