Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Explore topics related to transformational community leadership including economic development, non-profit engagement, organizational management, and policy development. It's a candid conversation with veterans of the economic development profession along with inspiring interviews of today's thought leaders.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A place for elite leaders and teams.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
next generation web podcast
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
The State and Popular Culture
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
Jake Bennett and Michael Dyrynda conquer a 14.5 hour time difference to talk about life as web developers
…
continue reading
Hear about the cutting edge of development economics from research to practice.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Why do we make games? Every designer has a different and very personal answer to that question. Soren Johnson, founder of Mohawk Games, sits down with noted designers to find out by examining their careers as a whole.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
Design Development is your hub to learn direct from top professionals in real estate, development, design, and construction!
…
continue reading
A romp through the field of computer programming, grapling with our history and wondering what should come next. A mix of deeply technical talk, philosophy, art, dark lore, and good takes. Hosted by Ivan Reese, Jimmy Miller, and Lu Wilson.
…
continue reading

1
Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore episode of Career Notes. CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her requir…
…
continue reading

1
Microsoft for Startups: The benefits of the cyber startup ecosystem. [Special Edition]
1:15:15
1:15:15
Play later
Play later
Lists
Like
Liked
1:15:15Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
…
continue reading

1
Computing Machinery and Intelligence by Alan Turing (feat. Felienne Hermans)
2:11:38
2:11:38
Play later
Play later
Lists
Like
Liked
2:11:38You know Alan Turing, right? And the Turing test? Have you actually read the paper that introduced it, Computing Machinery and Intelligence? No?! You… you are not prepared. With very special guest: Felienne Hermans Notes $ Patreon Mystery AI Hype Theatre 3000 podcast, from Emily M. Bender and Alex Hanna. "Always read the footnotes" [The Language Ga…
…
continue reading
How Fast is Too Fast for an API; Sign in Versus "The Others"; More HIBP UX Goodness ; Sponsored by 1Password https://www.troyhunt.com/weekly-update-449/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
China’s new cyber arsenal revealed. [Research Saturday]
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
…
continue reading
A tech worker stumbles upon mass fraud and brings receipts, a flag football prank goes very right, a teenager uses Net Send and gets in trouble — but not as much as the person they're in trouble with, and a guy almost sends his pal on a "Taken" style revenge mission to Kosovo. Got a strange tale of technology, security, or hacking? Share it at Hotl…
…
continue reading

1
Understanding SaaS Security: Insights, Challenges, and Best Practices
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highlights security concerns with SaaS, such as shadow IT and weak access co…
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
Pentagon hits fast-forward on software certs.
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
…
continue reading

1
882: 40x Hotter Than the Sun: The ASML Machines That Make AI Chips
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45This week’s five-minute Friday heads to the Netherlands to find out more about Dutch company ASML, the brains behind the lithography machines that build AI chips. Jon Krohn walks through how ASML came to dominate the market, where they’re headed next, and how ASML’s complex machines shape AI chips as well as the very future of AI. Additional materi…
…
continue reading

1
Building Empathy and Accessibility: Fostering Better Engineering Cultures and Developer Experiences
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast, Shane Hastie, Lead Editor for Culture & Methods spoke to Erin Doyle about her journey as a generalist engineer, her passion for web accessibility, the importance of empathy and psychological safety in engineering teams, and her commit…
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading

1
Mic Drop: The Hackalorian: A careful student strikes back
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Meet Mando: an IT guy by day, cybercrime fighter by night. And his mentor? One of the most prolific data thieves ever. Together, they’re rewriting the rules of digital justice. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Record-Breaking Cybercrime Losses and Data Breaches in 2024
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
…
continue reading
Paul Dhaliwal is the founder and CEO of CodeConductor. Priya Joseph is the AI field CEO at DDN. Lizzie Siegle is a developer advocate at Cloudflare. Erin Mikail Staples is a developer experience engineer at Galileo. This episode was recorded at HumanX last month. Next year’s event will be April 6-9, 2026 in San Francisco. Register today!…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
Neverending support for open source with Hayden Barnes
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55The issue of software support for open-source is a long and storied one. Scott sits down with open-source advocate Hayden Barnes about how paid support and custom builds of older open-source software is a business opportunity for herodevs. Should you upgrade and migrate to the latest build? Or should you get paid never ending support?…
…
continue reading
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
…
continue reading
Some Synology NAS products will require drives they sold you, doubt is cast on the CVE program, why some FreeBSD packages didn’t appear when they should have, and backing up the keys for encrypted backups. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Robust & Reliable Backup Solutions with OpenZFS News Synol…
…
continue reading

1
Laracon AU, queued batches, and leveraging AI
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45In this episode, Jake and Michael discuss the ramp up of Laracon AU planning, touch base on Jake's unorthodox usage of Laravel Horizon, and Michael finally coming around to using AI.By Jacob Bennett and Michael Dyrynda
…
continue reading
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
…
continue reading

1
S6 Ep16: What have we learned about the informal sector?
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10A large proportion of economic activity takes place in the informal sector in every country, particularly in LMICs. Informality, and the lack of rights and protection that goes with it, affects the families who live in slums, the people who take off-the-books jobs, and the firms that choose to skirt regulations. It also affects the governments who …
…
continue reading
This episode explores the dichotomy between iterative planning and target state planning in software development, discussing the benefits and drawbacks of each approach and providing decision factors to help you choose the most appropriate method for your situation. Understand the core difference between iterative planning, which emphasises agility…
…
continue reading

1
Blue Shield of California shared private data,FBI IC3 report, Ex-Army sergeant jailed
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
…
continue reading

1
Are we a trade or a profession? [CISO Perspectives]
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives,…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
Big tech, big trouble, and a dash of DORA.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
…
continue reading

1
Standardization and simplification as key to engineering excellence
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44They also discuss: Lloyds Banking Group's multi-year journey to drive simplification and standardization, reduce cognitive load & improve engineering efficiency, and enhance developer happiness. Challenges engineering teams face today, along with the cultural shifts in regulatory environments. Episode notes: Connect with Hilary Lanham and Tom Kelk.…
…
continue reading
How can a large language model help your organization answer government RFPs? Carl and Richard talk to Vishwas Lele about his startup pWin, as in proposal win. Vishwas talks about being a year into the startup and his deeper understanding of how AI technologies can augment skilled operators to produce better quality products in less time, including…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
…
continue reading

1
SE Radio 665: Malcolm Matalka on Developing in OCaml with Zero Frameworks
56:10
56:10
Play later
Play later
Lists
Like
Liked
56:10Malcolm Matalka, founder of Terrateam, joins host Giovanni Asproni to talk about the reasoning behind the choice of a not-so-widespread language (OCaml) and the (almost) total avoidance of frameworks for the development of Terrateam. While discussing the reasons for choosing a specific programming language and the advantages and disadvantages of us…
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading

1
ep176 Monthly Platform 202504 | mozaic.fm
2:53:16
2:53:16
Play later
Play later
Lists
Like
Liked
2:53:16第 176 回のテーマは 2025 年 4 月の Monthly Platform です。Show Note はこちら: https://mozaic.fm/episodes/176/monthly-platform-202504.htmlBy Jxck
…
continue reading

1
DT #557 Building Bridges: The St. Louis BRE Initiative
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Summary In this episode of the Develop This podcast, Dennis interviews Jason Archer, the Vice President of Business Development for the St. Louis Economic Development Partnership. They discuss the importance of business retention and expansion (BRE) programs, particularly the innovative regional BRE committee established during the pandemic. Jason …
…
continue reading

1
DT #558 Unlocking Economic Development: The OUEDI Experience - Courtney Dunbar
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59Summary In this episode of the Develop This Podcast, Dennis Fraise interviews Courtney Dunbar, the Dean of the OU Economic Development Institute (OUEDI). They discuss the importance of OUEDI in promoting knowledge in economic development, the program's structure and curriculum, and the unique experiences it offers. Courtney highlights the significa…
…
continue reading

1
896: Do I Still Need To Know JS/CSS/HTML with AI? × How To Sell An App × Is React Context Bad? × More
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57By Syntax
…
continue reading
In this solo episode of Design Development, host Rens Hayes dives into the wisdom of Charlie Munger, an influential figure whose insights have profoundly impacted Renz's professional journey. This session is packed with valuable lessons drawn from Munger's philosophies, aimed at those in real estate, design, and construction who are eager to enhanc…
…
continue reading

1
Microsoft Recall updates, Russian orgs deal with networking software updates, SSL.com certificate issuance vulnerability
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stop…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
…
continue reading
If your organization is laser-focused on epics, features, and user stories, you may want to shift your attention to something else that can have an even greater impact on your product or solution. Michele Lanzinger, strategic advisor at Scaled Agile, explains what and why in this episode. Like what you hear? Connect with Michele on LinkedIn. Explor…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
881: Beyond GPUs: The Power of Custom AI Accelerators, with Emily Webber
1:17:06
1:17:06
Play later
Play later
Lists
Like
Liked
1:17:06Emily Webber speaks to Jon Krohn about her work at Amazon Web Services, from its Annapurna Labs-developed Nitro System, a foundational technology that can enhance securities and performance in the cloud and how Trainium2 became AWS’ most powerful AI chip with four times the compute of Trainium. Hear the specs of AWS’s chips and when to use them. Ad…
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading

1
Google OAuth abused, Japan's trading scams, hijacking with Zoom
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Google OAuth abused in DKIM replay attack Japan warns of sharp rise in unauthorized trading North Koreans hijacking Zoom’s Remote Control Huge thanks to our sponsor, Dropzone AI Security threats don't clock out at 5 PM, but your analysts need to sleep sometime. Dropzone AI delivers around-the-clock alert investigations with the same attention to de…
…
continue reading
This week, how a global game of cat and mouse led to a friendship—and an unexpected redemption. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading

1
Shift-M/55: Richard Pawson about Naked Objects and OOP
1:09:40
1:09:40
Play later
Play later
Lists
Like
Liked
1:09:40The video is here: https://www.youtube.com/watch?v=x6LKw-iQHZQBy Yegor Bugayenko
…
continue reading