Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
DevSecOps Podcasts
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
Where Automation Meets Security
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Step into the DevOps Sauna with Darren Richardson and Pinja Kujala as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading
Security Boulevard – A Futurum Podcast is The Futurum Group’s weekly cybersecurity show and the companion to SecurityBoulevard.com. It’s hosted by Tom Hollingsworth of Tech Field Day, Mitch Ashley and Fernando Montenegro of The Futurum Group, and Alan Shimel of the Techstrong Group. New episodes post every Tuesday on the Security Boulevard YouTube channel, podcast applications, the Security Boulevard website, Techstrong.TV, and the Techstrong TV app.
…
continue reading
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
…
continue reading
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading

1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading

1
#84 - AI for DevSecOps: Current Wins and Ongoing Gaps
35:22
35:22
Play later
Play later
Lists
Like
Liked
35:22Can AI really help us build more secure software? What’s working in practice right now, and where do the tools still fall short? Mattias and Paulina share their views. We are always happy to answer any questions, hear suggestions for new episodes, or hear from you, our listeners. DevSecOps Talks podcast LinkedIn page DevSecOps Talks podcast website…
…
continue reading
Send us a text In this episode, Pinja and Darren take a critical look at the state of DevSecOps through the lens of three recent industry reports from Snyk, Checkmarx, and Datadog. From “shift left” gone wrong, to the cultural gaps between development and security teams, to metrics that don’t always measure what matters—what’s really happening with…
…
continue reading

1
Episode 154: Integration of Incident Response into DevSecOps
33:12
33:12
Play later
Play later
Lists
Like
Liked
33:12In episode 154 of Cybersecurity Where You Are, Sean Atkinson discusses incident response in DevSecOps, exploring challenges and solutions in modern software development. He emphasizes the importance of integrating security into development processes and speaks about common issues like alert fatigue and software supply chain vulnerabilities. Here ar…
…
continue reading

1
How Security Consultant Can Transition to AI Security Engineer in 2025
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In this episode, we explore the rapid evolution of cybersecurity and the critical rise of a new specialisation: the AI Security Engineer. As artificial intelligence advances, it not only enhances our defensive capabilities but also introduces sophisticated new attack vectors that traditional security measures can't handle. AI Security Certification…
…
continue reading
Bret is joined by Philip Andrews and Dan Muret of Cast AI to discuss pod live migration between nodes in a Kubernetes cluster. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to announce this course. The waitlist allows you to quickly sign…
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading

1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading

1
Episode 156: How CIS Uses CIS Products and Services
37:02
37:02
Play later
Play later
Lists
Like
Liked
37:02In episode 156 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Stephanie Gass, Sr. Director of Information Security at Center for Internet Security® (CIS®), and Angelo Marcotullio, Chief Information Officer at CIS. Together, they explore how CIS practices what it preaches by using CIS products and services internally, whi…
…
continue reading

1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading
Send us a text Are password changes really keeping us secure? Is writing passwords in a notebook always bad? Can Apple devices really not get viruses? In this episode of DevOps Sauna, Pinja and Darren take on some of the most common myths around cybersecurity. From password managers, MFA, and VPNs, to cloud security, insider threats, and even the r…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 128
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
Finding and fixing weaknesses and vulnerabilities in source code has been an ongoing challenge. There is a lot of excitement about the ability of large language models (LLMs, e.g., GenAI) to produce and evaluate programs. One question related to this ability is: Do these systems help in practice? We ran experiments with various LLMs to see if they …
…
continue reading

1
CR110: The genesis of the virtual assistant with Kevin Surace
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34Before Siri had sass and Alexa started judging your music taste, the original virtual assistant was quietly revolutionizing the '90s—powered by many patents and a whole lot of foresight. Now, as AI goes from buzzword to boss, we ask, will it transform your job, your home… or just steal your knowledge? This week, Dave, Esmee and Rob speak with Kevin…
…
continue reading

1
Episode 155: The Story of CIS 2.0 and Adapting to a New Era
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45In episode 155 of Cybersecurity Where You Are, Tony Sager is joined by John Gilligan, President and Chief Executive Officer (CEO) of the Center for Internet Security® (CIS®). Together, they reflect on 25 years of progress for CIS and look ahead to the future. They explore the driving forces behind "CIS 2.0," including the shift toward addressing mu…
…
continue reading

1
AI, Ransomware & User Empowerment | Security Boulevard Ep. 1
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53The Security Boulevard Podcast is back! 🎙️ In Ep. 1, hosts Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley explore today’s most urgent cybersecurity challenges. They discuss: How AI is reshaping security practices The evolving complexity of ransomware Why user empowerment is critical Insights from Security Field Day Upcoming research on so…
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Delivering Next-Generation AI Capabilities
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. Researchers in the AI Division of the Carnegie Mellon University Software Engineering Institute (SEI) work to deliver reliable and secure AI capabilities to warfighters in mission-critical environments. In our latest podcast, M…
…
continue reading

1
Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead …
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 127
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
AI Hype vs. Reality. Real Stats from Laura Tacho, CTO of DX
1:19:23
1:19:23
Play later
Play later
Lists
Like
Liked
1:19:23Bret and Nirmal are joined by Laura Tacho, CTO at DX and long-time friend of the show, to discuss AI usage and success in teams adopting AI and Agents to generate code and perform tasks. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to a…
…
continue reading

1
CR109: Season 5 Kick Off with Dave, Esmee and Rob
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16We’re back! In this Season 5 premiere, the team reunites after their summer break to kick off an exciting new chapter. Join us as we catch up, share bold predictions for the year ahead, and explore big questions, like whether 2026 will be the year of the autonomous organization. Expect candid reflections, lively discussion, and a sneak peek at what…
…
continue reading

1
Autonomous Identity Governance With Paul Querna
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24Episode Summary Can multi-factor authentication really “solve” security, or are attackers already two steps ahead? In this episode of The Secure Developer, we sit down with Paul Querna, CTO and co-founder at ConductorOne, to unpack the evolving landscape between authentication and authorisation. In our conversation, Paul delves into the difference …
…
continue reading

1
Francesco Cipollone - Agentic AI Manifesto
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19Francesco Cipollone, the CEO of Phoenix Security, shares his extensive experience in AI and security, discussing the crucial difference between true AI agents and glorified chatbots. Learn why Phoenix Security utilizes six different LLMs instead of a single super agent. Understand the sobering economics behind AI implementation and the importance o…
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading
Send us a text In this episode of DevOps Sauna, Pinja and Darren sit down with Eficode’s Lead AI Consultant, Henri Terho, to unpack the hype and realities around artificial intelligence in business. They explore why so many AI projects fail, what true success looks like, and how companies can actually see return on investment. From data quality cha…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 126
13:20
13:20
Play later
Play later
Lists
Like
Liked
13:20Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
CR108: Season 5 Trailer, The future just dropped
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53Dave, Esmee, and Rob are strapping in for another season of bold, brain-bending conversations—and they’re bringing the flux capacitor with them from Back to the Future. Season 5 beams in global leaders and innovators who challenge how we think about technology, business, and humanity. From AI disruption to digital sovereignty, from leadership to cu…
…
continue reading

1
#83 - Opentofu Vs Terraform: Where We Are Now With Cole Bittel
38:45
38:45
Play later
Play later
Lists
Like
Liked
38:45It’s been a while since OpenTofu was released to the public, so we wanted to check in on where it stands today. How is the community adopting it? What’s the public sentiment? And how does it differ from Terraform in terms of features? This time we’re joined by Cole Bittel, an experienced SRE, platform engineer, and contributor to OpenTofu. He share…
…
continue reading

1
Episode 153: Advice for Newcomers to IT and Cybersecurity
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37In episode 153 of Cybersecurity Where You Are, Sean Atkinson is joined by Jason Ashong, IT Support Specialist at the Center for Internet Security® (CIS®). Jason shares his journey from tinkering with tech as a kid to working in IT and pursuing cybersecurity research. The conversation covers education, mentorship, hands-on experience, and advice for…
…
continue reading

1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading

1
Retrieval-Augmented Generation With Bob Remeika From Ragie
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Episode Summary Bob Remeika, CEO and Co-Founder of Ragie, joins host Danny Allan to demystify Retrieval-Augmented Generation (RAG) and its role in building secure, powerful AI applications. They explore the nuances of RAG, differentiating it from fine-tuning, and discuss how it handles diverse data types while mitigating performance challenges. The…
…
continue reading

1
Simon Gibbs & Devika Gibbs -- Building Bridges with Games
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03Simon and Devika Gibbs, the innovative minds behind Cybersec Games, join us on the episode today. Discover how the Gibbs duo are revolutionizing the way we teach and learn security concepts through interactive gaming. Learn about their journey from developing stationary for agile teams to delving into the world of threat modeling games like Elevati…
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
NPM Supply Chain Attack: Lessons in Security and Human Error
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27Send us a text A major security incident shook the JavaScript world when malicious code was discovered in 20 widely used NPM packages, collectively downloaded over 2 billion times per week. In this episode, Pinja and Darren break down what happened, how a phishing email led to the breach, and why human error remains one of the biggest risks in cybe…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 125
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Episode 152: Driving Response Time While Enriching Telemetry
33:09
33:09
Play later
Play later
Lists
Like
Liked
33:09In episode 152 of Cybersecurity Where You Are, Sean Atkinson is joined by Cliff Moten, Manager, Cybersecurity Solutions Engineering at the Center for Internet Security® (CIS®); and Richard Vargas, Security Operations Center Manager at CIS. Together, they discuss how the 24x7x365 CIS Security Operations Center (SOC) and CIS Managed Detection and Res…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
AI Red Teaming Guide for Beginners in 2025
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16This episode delves into the critical field of AI Red Teaming, a structured, adversarial process designed to identify vulnerabilities and weaknesses in AI systems before malicious actors can exploit them. The Certified AI Security Professional (CAISP) course is specifically designed to advance careers in this field, offering practical skills in exe…
…
continue reading