A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Welcome to For a Cloudy Day, the podcast where we talk about the cloud technology industry with insights from experts. Hosted by Co-native, the home of cloud specialists.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
This is the Discovery Files Podcast from the U.S. National Science Foundation. Join us as we explore the latest breakthroughs in science, technology and engineering with the researchers making these discoveries. Learn how scientific innovation bolsters the U.S. economy, supports our Nation’s interests around the globe, and improves the lives of Americans.
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading

1
Relationship advice by The Relationship Code..
Brett and Marie Jones. International relationship experts and authors.
For Dynamic Couples and Songles Short , smart, incise strategies to boost your Relationship, Love, Family.
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
ThePrint.in is a news, analysis, opinion & knowledge media company that sharply focuses on politics, policy, government and governance. Start your mornings with our journalists who bring you the big story of the day in ThePrintAM. ThePrintPod offers you our special reports and opinions for when you‘re on the go. End your day with our most popular show ‘Cut The Clutter’ by Editor-in-Chief Shekhar Gupta. But that’s not all. We also have Pure Science, National Interest, ThePrint Uninterrupted, ...
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading
Learn to Code is a podcast hosted by Chris Castiglione (OneMonth.com) based in Brooklyn, NY. Each week Chris interviews successful business founders, startups and programmers to ask them: How did you learn to code? What tips and tricks do you have for finding meaningful work? Learn more about One Month and the Learn to Code podcast at www.onemonth.com.
…
continue reading
AI Journal Podcast. Your go-to source for the latest breakthroughs, trends, and insights in the world of Artificial Intelligence. Every episode brings you up-to-date with breaking news, in-depth analyses, and real-world applications of AI shaping industries and redefining the future. From advancements in machine learning to the ethics of AI, we cover it all—delivering the most relevant updates directly to your ears. Whether you’re an enthusiast, a professional, or simply curious about the te ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
QR codes are scanned every day for restaurant menus, parking payments or flight boarding passes, but malicious users can take advantage of the technology for phishing and other criminal activities. Gaurav Sharma and Irving Barron, professors at the University of Rochester, discuss QR code technology and how their research makes it safer.…
…
continue reading

1
What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
…
continue reading

1
Security Code: Kashmir’s Leepa Valley is on fire. Is a new war brewing on the Line of Control?
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33Almost as an afterthought, India grabbed several key peaks along the northern stretches of the Line of Control in 1971. Those stretches have long been used to launch punitive raids across the LoC, notably in 2016, and many Indian planners are wondering if seizing some heights would send a strong strategic message to Pakistan.…
…
continue reading

1
Dustin Lehr - Code, Culture, and Community
1:04:44
1:04:44
Play later
Play later
Lists
Like
Liked
1:04:44Dustin Lehr joined Security Journey as Director of Application Security Advocacy. With nearly two decades of experience as a software engineer, application architect, and cybersecurity leader, Dustin has ample expertise in the industry. In this episode of The Security Champions Podcast, Dustin joined to explore the interconnected roles of secure co…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
EP 122 From Marine to Mentor: The Jonathan Perillo Code
53:34
53:34
Play later
Play later
Lists
Like
Liked
53:34Send us a text Summary of Episode: 🎙️ Episode Summary: Jonathan Perillo on Purpose, Mentorship, and the Evolving Security Industry Introduction & Background Jonathan shares his journey from joining the U.S. Marines post-9/11 to building a career in private security. His early interest in the Coast Guard shifted to the Marines after meeting a recrui…
…
continue reading

1
Progress and Gaps in Securing Salesforce Digital Experiences
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51Protecting Salesforce digital experiences is critical to delivering the seamless, secure services your customers expect. Join Justin Hazard, Principal Security Architect at AutoRABIT, and Matt Meyers, Salesforce Certified Technical Architect and CEO of Adaptus, as they dive into the challenges and strategies for safeguarding Salesforce digital expe…
…
continue reading

1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Bringing a codebase into compliance with the SEI CERT Coding Standards, requires a cost of time and effort, namely in the form of a static analysis tool. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making s…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
Episode 83: Managed Security (w/ Mihaela and Shawn)
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11In this episode of The Low Code Approach, we are joined by Mihaela Blendea and Shawn Nandi to dive into the transformative world of Managed Security for Microsoft Power Platform. Discover how this suite of advanced security features is revolutionizing the way organizations protect their data, manage access, and ensure compliance in an AI-driven era…
…
continue reading

1
CutTheClutter: When Lashkar, Jaish brought India and Pakistan to brink of war & how Pahalgam standoff is different
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42The ongoing standoff between India and Pakistan triggered by the Pahalgam terror attack is unlike any in the past. This time, ‘non-state actors’ like Jaish-e-Mohammed and Lashkar-e-Taiba are on the same page ideologically as Pakistan’s Islamist Army Chief Asim Munir. In Episode 1654 of #CutTheClutter Editor-in-Chief Shekhar Gupta looks at how both …
…
continue reading
Back after a hiatus for both BSidesSF and RSA, Seth and Ken recap their experience at both conferences. TL;DR - BSidesSF is great for technical security content and community, RSA focuses on sales for mostly large organizations and budgets. Two sides of the security industry coin and depends on preferences for which makes the most sense for career …
…
continue reading

1
Episode 86: Automating the Future: Desktop Flows & Generative AII (w/ Christy Jefson)
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this episode of The Low Code Approach, hosts Sean Fiene and Jocelyn Panchal sit down with Christy Jefson to explore the evolving landscape of automation through desktop flows and the integration of generative AI. Together, they unpack how Power Automate is transforming repetitive tasks, what’s new in the world of RPA, and how generative AI is re…
…
continue reading

1
ThePrintPod: Asim Malik is a fitting NSA for Pakistan—neither army nor civilian govt will challenge him
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Asim Malik belongs to a blue-blooded army family. His father was a three-star general whose generation saw both military action and career advancement under Zia-ul-Haq.By ThePrint
…
continue reading

1
Ep 11: Patrick Gorman, Former US Intelligence Community CIO, CISO Bank of America
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Nation-states don’t steal data, they wage war. In this episode of Code and Country, former US Intelligence Community CIO, CISO at Bank of America, and Chief Security Officer at Bridgewater Associates, Patrick Gorman exposes how cyber warfare threatens North America’s federal systems, higher education, BFSI, healthcare, and manufacturing sectors. Go…
…
continue reading

1
ThePrintPod: Naidu govt backs bigger families to maintain demographic dividend, lifts 2-child cap on maternity leave
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09Naidu has been vocal advocate for population growth. Last yr, his govt scrapped a 3-decade-old rule that barred individuals with over 2 children from contesting panchayat & municipal polls.By ThePrint
…
continue reading

1
Mastering microservices with a former Uber and Netflix architect
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26Orkes is a developer-first enterprise workflow orchestration platform. Explore the developer edition or dive into the docs. Before cofounding Orkes, Jeu was an architect at Uber and Netflix. Find him on LinkedIn. Shoutout to Stack Overflow user Alex Stiff, whose answer to Bash - Sort a list of strings earned them a Lifeboat badge.…
…
continue reading

1
The Rise of the Nationwide Injunction and What It Means for the Courts
1:16:49
1:16:49
Play later
Play later
Lists
Like
Liked
1:16:49In this episode of Reasonably Speaking, ALI President David Levi moderates a timely and incisive discussion on nationwide (or universal) injunctions—court orders that extend relief beyond the parties in a case, often halting federal policy nationwide. Featuring legal scholars William Baude and Samuel Bray, along with Judge Robin Rosenberg and forme…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
ThePrintAM: Why is India flushing the Baglihar and Salal reservoirs?
4:18
4:18
Play later
Play later
Lists
Like
Liked
4:18CutTheClutter: Why is India flushing the Baglihar and Salal reservoirs?By ThePrint
…
continue reading

1
FirstPersonSecondDraft: Remembering Zail Singh: Indira loyalist who caused trouble for Rajiv, left behind chequered legacy
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03On the 107th birth anniversary of India's 10th President, the late Giani Zail Singh, Editor-in-Chief Shekhar Gupta discusses his humour, bungling of issues & loyalty towards Indira Gandhi in contrast with his smart politics, troublesome equation with Rajiv Gandhi & tough decisions, in this edition of FirstPersonSecondDraft.…
…
continue reading

1
ThePrintPod: Pakistanis have forgotten Palestine, KFC McNuggets. Their target is Modi and WW3 now
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03A PPP senator suggested sending Pakistan Army Chief Gen Asim Munir to recite the first azaan at Babri Masjid. Of course, that’s a regular line in any army chief’s job description.By ThePrint
…
continue reading

1
ThePrint POD: Cyber probe picks apart Pakistan military PR’s terror claims against India, says ‘evidence manufactured’
4:31
4:31
Play later
Play later
Lists
Like
Liked
4:31ThePrint POD: Cyber probe picks apart Pakistan military PR’s terror claims against India, says ‘evidence manufactured’By ThePrint
…
continue reading

1
How to 🔎 Recognizing 🔎 and 🛡️ Protect 🛡️ Your Business From Cyber-Fraud
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33In this podcast, Dave Erickson and his knowledgeable co-host Botond Seres; are going to look for Cyber-Fraud and see how to deal with it, with Jason Costain the Director at Javloc Ltd. With over 25 years of leadership experience in safeguarding corporate assets, he has worked with some of the UK’s largest banks - to streamline operational fraud ris…
…
continue reading

1
AI That Sees, Thinks, and Defends: From Search to Science to Security
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48🎙️ Episode Summary In this episode, we explore four groundbreaking developments shaping the future of artificial intelligence. From Google’s radically smarter AI-powered search to FutureHouse’s quest to build an AI scientist, the landscape of AI innovation is expanding rapidly. We also examine AMIE, Google’s diagnostic AI that may soon assist — or …
…
continue reading
What trends and technologies should you be paying attention to today? Are there hot new database servers you should check out? Or will that just be a flash in the pan? I love these forward looking episodes and this one is super fun. I've put together an amazing panel: Gina Häußge, Ines Montani, Richard Campbell, and Calvin Hendryx-Parker. We dive i…
…
continue reading
Advice From A Marriage Coach
…
continue reading
As a manager, there's no getting around the fact that how well people like and trust you matters. According to this week’s guest, Patric J.M. Versteeg – CISO at Viterra, a global agricultural network operating in 39 countries, trust and likability are even more critical in security than in many other fields. Last year, Patric was named European CIS…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading

1
ThePrintAM: What is the ‘anti-communal force’ that Karnataka is planning to set up?
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24By ThePrint
…
continue reading

1
Minerals deal shows Trump is learning to cooperate with Ukraine
11:05
11:05
Play later
Play later
Lists
Like
Liked
11:05While Trump’s unpredictability has created widespread uncertainty, India still stands to gain from a renewed American engagement in Ukraine. A stronger US presence could open up opportunities for Indian businesses to participate in Ukraine’s reconstruction. This involvement would allow India to collaborate with European and American partners in reb…
…
continue reading

1
OPINION: Goa didn’t choose to become a casino city—now it’s a state-sponsored moral gamble
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22What unfolds nightly in Goa’s capital is a microcosm of the state’s uneasy relationship with its casino industry. And the only people who feel unwelcome at this unwarranted party are the residents of this tiny city, trapped in a geography transformed against their will, victims of a state-sanctioned gamble. The latest flashpoint in this ongoing str…
…
continue reading

1
NationalInterest: Caste Census is a bad idea & shows Rahul dragging Modi away from Nagpur, to Lohia. Worse lies ahead
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52#nationalinterest ‘The announcement of caste census has come in the build-up to the Bihar elections. The census may conclude just ahead of the Uttar Pradesh elections. The reason we call this move a bad idea is because nobody has figured out what to do with the data, except Rahul Gandhi’— Watch this week's #NationalInterest with Shekhar Gupta -----…
…
continue reading

1
ThePrintAM: WHAT IS THE NANGAL WATER SHARING DISPUTE BETWEEN PUNJAB & HARYANA?
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57By ThePrint
…
continue reading

1
CutTheClutter: Bilawal Bhutto’s interview signals Pakistan Army wants politicians to lead charge on Pahalgam
12:05
12:05
Play later
Play later
Lists
Like
Liked
12:05#cuttheclutter Pakistan has put forward its political faces to present its case after India’s punitive measures in wake of Pahalgam attack. Defence Minister Khawaja Asif was the first, then came PPP chief Bilawal Bhutto Zardari. In Episode 1653 of #CutTheClutter Editor-in-Chief Shekhar Gupta explains the reasons behind this approach and looks at th…
…
continue reading

1
ThePrintPod: Use PMLA judiciously, don’t lose leverage by making early arrests—ASG Raju advises ED officers
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52Speaking on the occasion of ED's foundation day, the additional solicitor general also said officers should should take their time, get the evidence, take the statement & then arrest.By ThePrint
…
continue reading

1
When life gives you LLMs... (Friends)
1:40:24
1:40:24
Play later
Play later
Lists
Like
Liked
1:40:24Our old friend, Zeno Rocha, returns to discuss email etiquette, the strange new world of AI SEO, the coming LLM enshittification, and SLATE Auto – the just-announced $20k modular EV truck. Join the discussion Changelog++ members get a bonus 3 minutes at the end of this episode and zero ads. Join today! Sponsors: Heroku – The Next Generation of Hero…
…
continue reading

1
ThePrintPod: The Centre must use the caste census wisely
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06The caste census will also reveal the status of disadvantaged groups within Muslims and Christians, sparking a new debate.By ThePrint
…
continue reading

1
Writings on The Wall: Pakistan, a National Security State, that suspects all, most of all its own | Writings on the Wall
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05Pakistan, a National Security State, that suspects all, most of all its own | Writings on the WallBy ThePrint
…
continue reading

1
Code, Culture, and Change: How AI Is Redefining Industries and Inclusion
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24🎙️Episode Summary: In this episode, we unpack four powerful AI-driven shifts redefining work, technology, and equity across the globe. From the rise of AI agents in Asia Pacific’s forward-looking companies, to JetBrains’ open-source coding model Mellum, and Duolingo’s transition into an AI-first organization—each story showcases how deeply AI is re…
…
continue reading
We discuss a schism years in the making — the infamous imageboard 4chan gets hacked by its own offshoot, Soyjak.party, in a breach that exposed moderator identities, source code, and shattered the myth of online anonymity. Then, we look at Cluely — an AI tool built by a suspended student to help users “cheat” on job interviews — and the viral campa…
…
continue reading

1
Improving on a 30-year-old hardware architecture
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54SambaNova makes a full-stack AI platform and an “intelligent chip” capable of running models of up to five trillion parameters, allowing developers to run state-of-the-art open source models without the time-consuming work of tuning and modeling. See what developers are building with the tech. Find Rodrigo on LinkedIn. This episode was recorded at …
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
ThePrintAM: WHAT IS THE US-UKRAINE MINERALS DEAL?
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02By ThePrint
…
continue reading

1
Chasing that next BIG thing (Interview)
1:39:39
1:39:39
Play later
Play later
Lists
Like
Liked
1:39:39Drew Wilson is back! It’s been more than a decade since Adam and Drew have spoken and wow, Drew has been busy. He built Plasso and got acquired by GoDaddy. He built a bank called Letter which didn’t work out…and now he’s Head of Design at Clerk and back to chasing that next big thing. Join the discussion Changelog++ members save 7 minutes on this e…
…
continue reading

1
CutTheClutter: India’s security architecture, its evolution since 1962 War & how it differs from Pakistan’s
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35#cuttheclutter Pakistan has a new National Security Adviser (NSA). In Episode 1652 of #CutTheClutter @ShekharGupta contrasts this with India’s reconstitution of its National Security Advisory Board, involving balanced representation from the armed forces, police, and diplomacy; he also contextualises these developments within broader civil-military…
…
continue reading

1
ThePrintPod: Any cross-border strike by India faces a potential drawback. It may be seen as underwhelming
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11The response of Kashmiris has been an outcome that is a true game-changer. The present government has an opportunity to claim ownership over this final and happy chapter.By ThePrint
…
continue reading