Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

DevSecOps Podcasts

show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork
 
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
Artwork

1
Profound

John Willis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
  continue reading
 
Artwork

1
theCronJob

Zesty Tech Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast for engineers building and operating modern infrastructure. Powered by Zesty. Hosted by Omer Hamerman and Mark Serdze, The Cron Job explores Kubernetes quirks, cost optimization strategies, scaling, reliability, and the art of keeping things from catching fire in production, all while unpacking the deeper DevOps questions around ownership, automation, and the tradeoffs behind every engineering decision. Tune in for real-world stories, sharp insights, and the occasional infrastructu ...
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Step into the DevOps Sauna with Darren Richardson and Pinja Kujala as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
CTRL+ALT+DEPLOY

controlaltdeploy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CTRL+ALT+DEPLOY is the DevOps podcast for modern engineering leaders navigating what’s now and what’s next. From agentic AI and autonomous DevOps to platform consolidation, cloud performance, and secure software supply chains, we cut through the buzzwords to explore the real-world impact of emerging tools and practices. Each episode features candid conversations with DevOps experts across industries, offering insights and practical takeaways on how to build faster, stay secure, and scale sma ...
  continue reading
 
Artwork

1
DevOps State of Mind

LogDNA x StudioPod Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
  continue reading
 
Artwork

1
Lessons in Cybersecurity

Prof. Avishai Wool * Sponsored by AlgoSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
  continue reading
 
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Artwork

1
SilverLining IL

MarkeTech Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
  continue reading
 
Loading …
show series
 
Is MCP just another server you need to threat model, patch, and monitor? How do you keep users from over-privileged access, block LLM injection, and stop blind spots? We unpack the VentureBeat article https://venturebeat.com/security/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise with real-world tips. We are always happy …
  continue reading
 
In this episode, Omer and Mark discuss the importance of integrating security into the DevOps culture, specifically focusing on DevSecOps. They explore the responsibilities of developers in ensuring application security, the significance of understanding the OWASP Top 10 vulnerabilities, and the need for actionable security practices. The conversat…
  continue reading
 
InfoSec Black Friday Deals 2025: Securing the Future of Cybersecurity This special offer broadcast details the InfoSec Black Friday 2025 deals, presenting a limited-time chance to advance cybersecurity careers when the demand for security professionals continues to grow. Tune in to discover how to save up to $500 on certification bundles and receiv…
  continue reading
 
Driven by a market anticipated to exceed USD 40.6 billion by 2030, DevSecOps Engineers are crucial experts who bridge the gaps between software development, security protocols, and operational efficiency. Successful implementation relies on a socio-technical work system that emphasizes cultural transformation, shared security responsibility, and pr…
  continue reading
 
In this episode of The Crown Job, Omer and Mark delve into the spooky side of technology, sharing horror stories from their experiences in the tech industry. They discuss the recent AWS outage and its bizarre effects on smart mattresses, a ghostly incident in a production environment, a certificate authority crisis, and the challenges of managing c…
  continue reading
 
This podcast explores the comprehensive responsibilities of modern InfoSec professionals, ranging from core security operations like vulnerability management across operating systems, network devices, and containers, to ensuring physical security and managing application development standards. Dive deep into emerging and complex domains such as AI …
  continue reading
 
This episode explores the complex division in state mandates between general consumer privacy laws and specific children’s design codes, which often function as separate acts or amendments. We break down how compliance is determined either by broad, quantitative thresholds like annual gross revenue and high data volume, or by the specific service's…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company D…
  continue reading
 
In Episode 162 of Cybersecurity Where You Are, Tony Sager sits down with Tina Williams-Koroma, Founder and CEO of TCecure, LLC and CyDeploy, Inc. Together, they discuss why "cyber insecurity is not inevitable" and how organizations can take a managed approach to attack surface management. Along the way, Tina shares her journey from software develop…
  continue reading
 
Hello San Francisco - we're arrived for Microsoft Ignite 2025! The #CloudRealities podcast team has landed this week in San Francisco, we're bringing you the best updates right from the heart of the event. Join us to connect AI at scale, cloud modernization, and secure innovation—empowering organizations to become AI-first. Plus, we'll keep you upd…
  continue reading
 
This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundar…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine speed, requiring human intervention at only a few critical decision points. Defenders are thrust into an urgent "AI vs. AI arms race," racing to adopt proactive measures like Google's Big Sleep to detec…
  continue reading
 
Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first documented AI-orchestrated cyber espionage campaign. The sophisticated operation, which targeted approximately 30 global organizations including technology companies, financial institutions, and government …
  continue reading
 
Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against the impacts of manipulated, false, and misleading information (MDM). This episode details the crucial "Recognise" stage, where communicators use the FIRST indicators (Fabrication, Identity, Rhetoric, Sym…
  continue reading
 
This webcast offers a solution to the problem of poorly defined requirements in system design that can lead to software flaws, cost and time overruns, and stakeholder dissatisfaction. We will tell you how to use a structured process called the ATAM (architectural tradeoffs analysis method) to develop a system design by eliciting requirements, scena…
  continue reading
 
The 2025 OWASP Top 10 reveals a fundamental shift in application security, showing how threats have transformed from simple code flaws like buffer overflows to exploiting the systemic complexity of cloud-native and microservices architectures. This newest list confirms the continued dominance of Broken Access Control (A01) and spotlights the critic…
  continue reading
 
Digital intelligence is reshaping how organizations work, and success depends on integrating multiple domains, using real-time analytics, and ensuring strong cyber protections as data grows and risks increase This week, Dave, Esmee, and Rob talk with Chris Carter, Director - Key Accounts and Australia at BAE Systems Digital Intelligence, to explore…
  continue reading
 
APIs are the "nervous system" of modern applications, making them the number one attack vector, with flaws like Broken Object Level Authorization (BOLA), Broken Object Property Level Authorization (BOPLA), and Broken Function Level Authorization (BFLA) accounting for a high percentage of breaches. This episode delves into the multi-layered "defense…
  continue reading
 
In Episode 161 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Mishal Makshood, Azure Partner Alliance Manager at the Center for Internet Security® (CIS®), and David Kalish, Sr. Cybersecurity Solutions Engineer at CIS. Together, they explore how CIS Hardened Images® help to secure cloud environments and strengthen critica…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
The Google Threat Intelligence Group (GTIG) has identified a significant shift where adversaries are now deploying novel AI-enabled malware in active operations, moving beyond simple productivity gains observed in 2024. This new operational phase includes "Just-in-Time" AI malware, such as PROMPTFLUX and PROMPTSTEAL, that utilize Large Language Mod…
  continue reading
 
In this episode of the Cron Job podcast, hosts Omer and Mark delve into the intricacies of Kubernetes, focusing on common mistakes in resource allocation and container management. They discuss the importance of right-sizing resources, monitoring, and the potential pitfalls of over-provisioning. The conversation also touches on the philosophical asp…
  continue reading
 
Cybersecurity leaders, including CISOs, face overwhelming job demands and chronic stress, with up to 80% classifying themselves as “highly stressed” due to resource limitations and the ceaseless evolution of threats. This pressure is compounded by alert fatigue—where the relentless influx of noisy, often false-positive alerts causes mental and oper…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play