Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

The State Of Synth Podcasts

show episodes
 
Artwork

1
The State of Synth

The State of Synth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The State of Synth is a weekly live synthwave radio show on Nightride FM — part news, part music, and just a dash of ’80s cheese. Equal parts funny, surreal, and informative, it features exclusive interviews and tracks from some of synthwave’s most notable artists.
  continue reading
 
Artwork

1
Black Room Radio

Black Room Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Black Room is a music program on the radio frequencies of Radio Icaro Rubicone FM 90.0 (IT Adriatic area). During the 60-minute program, the music selection of the radio hosts, Matteo Bosi and Luca D'Altri, leads the listeners into a niche music “underworld”, discovering all the "marginal sounds" that populate it. The sound you can enjoy varies from post-punk to new wave, from industrial to various shades of electro, from minimal synth to dark techno, from shoegaze to coldwave and darkwave. ...
  continue reading
 
The Shadow Transmission presents two podcasts. Gloom Room is a broad look and exploration of underground music, including goth, industrial, ebm, new wave, and synth pop. Darkansaw is exploration of the same underground music, but with a focus on what is occurring in the state of Arkansas.
  continue reading
 
Loading …
show series
 
This week on The State of Synth, Groot and Neon Fawkes sit down with the one and only Dr. Jess Blaise Ward — yes, an actual doctor of synthwave. Music producer, author, and cultural researcher, Jess joins us to talk about her brand-new book, “Making Synthwave: How an Online Music Community Invented a Genre.”…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■03■ 02.11.2025 01:08 POTOCHKINE - Endorphine 03:12 CAUSTIC - Rhythm is a cancer 07:38 SIERRA VEINS - Desire 11:21 BLIPBLOP - Sista vilan 13:31 AUTUMNS - Your favorite cowboy 16:59 PAROLE E AZIONI - Guarda come balla 19:57 LEFT FOR PLEASURE - Burden 23:16 VIKOWSKI - Pollution 27:23 HØRD - F…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■02■ 19.10.2025 01:40 SMFORMA - Wir machen angst (Statiqbloom remix) 06:39 VOIX IN THE DARK + MADURO - Heartbeat 10:09 YEARS OF DENIAL - AI lover 14:05 CORBEAU HANGS - Cold stairs 18:31 RUE OBERKAMPF - Solitude (Essenz master) 22:09 BLOOD WISTERIA - Nilfheim 25:58 NINE INCH NAILS - As alive…
  continue reading
 
Groot and Neon Fawkes were joined by Swedish outrun powerhouse Neon Nox to talk about his music, collaborations, and production techniques behind his high-octane sound — including his work on the Terrorbytes soundtrack. The episode featured premieres from Signal Void, Annie, and Von Kaiser, plus bangers from Droid Bishop, YOTA, and Megan McDuffee.…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■01■ 05.10.2025 01:13 DIE TÖDIN - Ich bin schon tot 04:43 SYZYGYX - Sylph 09:38 BILL LEEB - Neoromotive (Sehr Geil one mix by Rhys Fulber) 14:55 MADURO - You are empty 19:08 CAMILLA SPARKSSS - Stormseeker 21:38 ASH CODE - Angel oscuro 25:45 PATRIARCHY - New way 30:19 VIOFLESH - Always 33:44…
  continue reading
 
Groot and Neon Fawkes were joined by Vehlinggo’s Aaron Vehling to talk about the blog’s origins, iconic interviews, and its impact on the synthwave scene. They also spun tracks from Let Em Riot plus some of Aaron’s own picks, including Electric Youth, Fawn, Foret de Vin, Kinga, Sébastien Tellier, and more.…
  continue reading
 
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
  continue reading
 
Groot and Fawkes were joined by VHS Dreams — one of the OGs of the synthwave scene — for a trip through his retro-electronic world, from Trans Am and retro EDM roots to cover albums, aesthetics, and action-figure brainstorms. Along the way they spun fresh cuts and premieres from Evanton, Pfeffermouse & Edictum & Turbo […]…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Show Notes: https://securityweekly.com/asw-349…
  continue reading
 
This week, Groot and Fawkes plug into the dark cybernetic world of DreamReaper — the Portland producer whose sound fuses heavy riffs, glitchy textures, and cinematic energy. They dive into his creative process, favorite tools of destruction, and how his music is shifting toward new frontiers, from collaborations to movie soundtracks. Along the way,…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
Groot and Fawkes were joined by Immortal Girlfriend — the Dark Knights of Synth — for a deep dive into their cinematic sound, brotherly chemistry, and their journey from Milwaukee to major syncs in Wednesday, Good Girls, and NBA 2K22. They shared creative inspirations, stories from the road, and even what fuels a 2AM tour […]…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
This week on The State of Synth, Groot and Neon Fawkes are joined by special guests Edictum (Austria) and Pashang (Korea) to talk about their global collaborations, upcoming releases, and the making of their concept album. Tune in for a boat load of exclusive premieres and fresh tracks from The Midnight, Droid Bishop, Futurecop!, and […]…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 03◄ 31.08.2025 00:40 ATTIC FROST - How will the world end today? 04:48 HUMAN TETRIS - Home 09:07 COLD COLORS / XIU - Another day 13:30 DEFENSA ESLAVA - Alegria en los desprecios 17:03 MANTAROCHEN - Steamy nights 19:18 INGRESO CADÁVER - De miseria y soledad 24:08 SHOCKED VOLK - War 26:46 EDD…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 02◄ 03.08.2025 00:16 SAD MADONA - Crimes 03:20 KRIMEA - This pleasure 07:06 DINA SUMMER - Hypnotized (Etane remix) 10:10 LARSOVITCH + DRAMACHINE - Vios / Mania 13:52 ALEX ROSSI - L’amore fa volare 17:00 LUMINANCE - Trop fragile 21:05 STAATSEINDE - Suicide tuesday 24:30 BLIND DELON - La viol…
  continue reading
 
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
  continue reading
 
AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 01◄ 29.06.2025 00:33 STAATSEINDE - Tanzverbot 04:30 DIE SEXUAL - Magic never dies 09:20 MY OWN BURIAL - Complain 12:39 DRKLV - Technoir 15:08 CORBEAU HANGS - Ill intents 19:10 BLYSKI - Reflektor 22:24 16VOLT - White noise 25:55 COMBICHRIST - Desolation 30:56 SARCOMA - Psicofiera 33:11 WILLI…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play