show episodes
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
  continue reading
 
Artwork

1
Reasonably Speaking

The American Law Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
  continue reading
 
Artwork

1
Main AI

CodeRabbit

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
  continue reading
 
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Breaking The Internet

SheNetworks + endingwithali

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
  continue reading
 
Artwork

1
NSF’s Discovery Files Podcast

U.S. National Science Foundation

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
This is the Discovery Files Podcast from the U.S. National Science Foundation. Join us as we explore the latest breakthroughs in science, technology and engineering with the researchers making these discoveries. Learn how scientific innovation bolsters the U.S. economy, supports our Nation’s interests around the globe, and improves the lives of Americans.
  continue reading
 
Artwork
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
Artwork

1
Talk Python To Me

Michael Kennedy

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
  continue reading
 
Artwork

1
ThePrint

ThePrint

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
ThePrint.in is a news, analysis, opinion & knowledge media company that sharply focuses on politics, policy, government and governance. Start your mornings with our journalists who bring you the big story of the day in ThePrintAM. ThePrintPod offers you our special reports and opinions for when you‘re on the go. End your day with our most popular show ‘Cut The Clutter’ by Editor-in-Chief Shekhar Gupta. But that’s not all. We also have Pure Science, National Interest, ThePrint Uninterrupted, ...
  continue reading
 
Artwork

1
Code Patrol

Contrast Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
  continue reading
 
Learn to Code is a podcast hosted by Chris Castiglione (OneMonth.com) based in Brooklyn, NY. Each week Chris interviews successful business founders, startups and programmers to ask them: How did you learn to code? What tips and tricks do you have for finding meaningful work? Learn more about One Month and the Learn to Code podcast at www.onemonth.com.
  continue reading
 
Artwork

1
AI Journal

Manish Balakrishnan

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
AI Journal Podcast. Your go-to source for the latest breakthroughs, trends, and insights in the world of Artificial Intelligence. Every episode brings you up-to-date with breaking news, in-depth analyses, and real-world applications of AI shaping industries and redefining the future. From advancements in machine learning to the ethics of AI, we cover it all—delivering the most relevant updates directly to your ears. Whether you’re an enthusiast, a professional, or simply curious about the te ...
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Loading …
show series
 
QR codes are scanned every day for restaurant menus, parking payments or flight boarding passes, but malicious users can take advantage of the technology for phishing and other criminal activities. Gaurav Sharma and Irving Barron, professors at the University of Rochester, discuss QR code technology and how their research makes it safer.…
  continue reading
 
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
  continue reading
 
Almost as an afterthought, India grabbed several key peaks along the northern stretches of the Line of Control in 1971. Those stretches have long been used to launch punitive raids across the LoC, notably in 2016, and many Indian planners are wondering if seizing some heights would send a strong strategic message to Pakistan.…
  continue reading
 
Dustin Lehr joined Security Journey as Director of Application Security Advocacy. With nearly two decades of experience as a software engineer, application architect, and cybersecurity leader, Dustin has ample expertise in the industry. In this episode of The Security Champions Podcast, Dustin joined to explore the interconnected roles of secure co…
  continue reading
 
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
  continue reading
 
Send us a text Summary of Episode: 🎙️ Episode Summary: Jonathan Perillo on Purpose, Mentorship, and the Evolving Security Industry Introduction & Background Jonathan shares his journey from joining the U.S. Marines post-9/11 to building a career in private security. His early interest in the Coast Guard shifted to the Marines after meeting a recrui…
  continue reading
 
Protecting Salesforce digital experiences is critical to delivering the seamless, secure services your customers expect. Join Justin Hazard, Principal Security Architect at AutoRABIT, and Matt Meyers, Salesforce Certified Technical Architect and CEO of Adaptus, as they dive into the challenges and strategies for safeguarding Salesforce digital expe…
  continue reading
 
Bringing a codebase into compliance with the SEI CERT Coding Standards, requires a cost of time and effort, namely in the form of a static analysis tool. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making s…
  continue reading
 
In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
  continue reading
 
In this episode of The Low Code Approach, we are joined by Mihaela Blendea and Shawn Nandi to dive into the transformative world of Managed Security for Microsoft Power Platform. Discover how this suite of advanced security features is revolutionizing the way organizations protect their data, manage access, and ensure compliance in an AI-driven era…
  continue reading
 
The ongoing standoff between India and Pakistan triggered by the Pahalgam terror attack is unlike any in the past. This time, ‘non-state actors’ like Jaish-e-Mohammed and Lashkar-e-Taiba are on the same page ideologically as Pakistan’s Islamist Army Chief Asim Munir. In Episode 1654 of #CutTheClutter Editor-in-Chief Shekhar Gupta looks at how both …
  continue reading
 
Back after a hiatus for both BSidesSF and RSA, Seth and Ken recap their experience at both conferences. TL;DR - BSidesSF is great for technical security content and community, RSA focuses on sales for mostly large organizations and budgets. Two sides of the security industry coin and depends on preferences for which makes the most sense for career …
  continue reading
 
In this episode of The Low Code Approach, hosts Sean Fiene and Jocelyn Panchal sit down with Christy Jefson to explore the evolving landscape of automation through desktop flows and the integration of generative AI. Together, they unpack how Power Automate is transforming repetitive tasks, what’s new in the world of RPA, and how generative AI is re…
  continue reading
 
Nation-states don’t steal data, they wage war. In this episode of Code and Country, former US Intelligence Community CIO, CISO at Bank of America, and Chief Security Officer at Bridgewater Associates, Patrick Gorman exposes how cyber warfare threatens North America’s federal systems, higher education, BFSI, healthcare, and manufacturing sectors. Go…
  continue reading
 
Orkes is a developer-first enterprise workflow orchestration platform. Explore the developer edition or dive into the docs. Before cofounding Orkes, Jeu was an architect at Uber and Netflix. Find him on LinkedIn. Shoutout to Stack Overflow user Alex Stiff, whose answer to Bash - Sort a list of strings earned them a Lifeboat badge.…
  continue reading
 
In this episode of Reasonably Speaking, ALI President David Levi moderates a timely and incisive discussion on nationwide (or universal) injunctions—court orders that extend relief beyond the parties in a case, often halting federal policy nationwide. Featuring legal scholars William Baude and Samuel Bray, along with Judge Robin Rosenberg and forme…
  continue reading
 
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
  continue reading
 
On the 107th birth anniversary of India's 10th President, the late Giani Zail Singh, Editor-in-Chief Shekhar Gupta discusses his humour, bungling of issues & loyalty towards Indira Gandhi in contrast with his smart politics, troublesome equation with Rajiv Gandhi & tough decisions, in this edition of FirstPersonSecondDraft.…
  continue reading
 
In this podcast, Dave Erickson and his knowledgeable co-host Botond Seres; are going to look for Cyber-Fraud and see how to deal with it, with Jason Costain the Director at Javloc Ltd. With over 25 years of leadership experience in safeguarding corporate assets, he has worked with some of the UK’s largest banks - to streamline operational fraud ris…
  continue reading
 
🎙️ Episode Summary In this episode, we explore four groundbreaking developments shaping the future of artificial intelligence. From Google’s radically smarter AI-powered search to FutureHouse’s quest to build an AI scientist, the landscape of AI innovation is expanding rapidly. We also examine AMIE, Google’s diagnostic AI that may soon assist — or …
  continue reading
 
What trends and technologies should you be paying attention to today? Are there hot new database servers you should check out? Or will that just be a flash in the pan? I love these forward looking episodes and this one is super fun. I've put together an amazing panel: Gina Häußge, Ines Montani, Richard Campbell, and Calvin Hendryx-Parker. We dive i…
  continue reading
 
As a manager, there's no getting around the fact that how well people like and trust you matters. According to this week’s guest, Patric J.M. Versteeg – CISO at Viterra, a global agricultural network operating in 39 countries, trust and likability are even more critical in security than in many other fields. Last year, Patric was named European CIS…
  continue reading
 
Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
  continue reading
 
While Trump’s unpredictability has created widespread uncertainty, India still stands to gain from a renewed American engagement in Ukraine. A stronger US presence could open up opportunities for Indian businesses to participate in Ukraine’s reconstruction. This involvement would allow India to collaborate with European and American partners in reb…
  continue reading
 
What unfolds nightly in Goa’s capital is a microcosm of the state’s uneasy relationship with its casino industry. And the only people who feel unwelcome at this unwarranted party are the residents of this tiny city, trapped in a geography transformed against their will, victims of a state-sanctioned gamble. The latest flashpoint in this ongoing str…
  continue reading
 
#nationalinterest ‘The announcement of caste census has come in the build-up to the Bihar elections. The census may conclude just ahead of the Uttar Pradesh elections. The reason we call this move a bad idea is because nobody has figured out what to do with the data, except Rahul Gandhi’— Watch this week's #NationalInterest with Shekhar Gupta -----…
  continue reading
 
#cuttheclutter Pakistan has put forward its political faces to present its case after India’s punitive measures in wake of Pahalgam attack. Defence Minister Khawaja Asif was the first, then came PPP chief Bilawal Bhutto Zardari. In Episode 1653 of #CutTheClutter Editor-in-Chief Shekhar Gupta explains the reasons behind this approach and looks at th…
  continue reading
 
Our old friend, Zeno Rocha, returns to discuss email etiquette, the strange new world of AI SEO, the coming LLM enshittification, and SLATE Auto – the just-announced $20k modular EV truck. Join the discussion Changelog++ members get a bonus 3 minutes at the end of this episode and zero ads. Join today! Sponsors: Heroku – The Next Generation of Hero…
  continue reading
 
🎙️Episode Summary: In this episode, we unpack four powerful AI-driven shifts redefining work, technology, and equity across the globe. From the rise of AI agents in Asia Pacific’s forward-looking companies, to JetBrains’ open-source coding model Mellum, and Duolingo’s transition into an AI-first organization—each story showcases how deeply AI is re…
  continue reading
 
We discuss a schism years in the making — the infamous imageboard 4chan gets hacked by its own offshoot, Soyjak.party, in a breach that exposed moderator identities, source code, and shattered the myth of online anonymity. Then, we look at Cluely — an AI tool built by a suspended student to help users “cheat” on job interviews — and the viral campa…
  continue reading
 
SambaNova makes a full-stack AI platform and an “intelligent chip” capable of running models of up to five trillion parameters, allowing developers to run state-of-the-art open source models without the time-consuming work of tuning and modeling. See what developers are building with the tech. Find Rodrigo on LinkedIn. This episode was recorded at …
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
Drew Wilson is back! It’s been more than a decade since Adam and Drew have spoken and wow, Drew has been busy. He built Plasso and got acquired by GoDaddy. He built a bank called Letter which didn’t work out…and now he’s Head of Design at Clerk and back to chasing that next big thing. Join the discussion Changelog++ members save 7 minutes on this e…
  continue reading
 
#cuttheclutter Pakistan has a new National Security Adviser (NSA). In Episode 1652 of #CutTheClutter @ShekharGupta contrasts this with India’s reconstitution of its National Security Advisory Board, involving balanced representation from the armed forces, police, and diplomacy; he also contextualises these developments within broader civil-military…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play