Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Podcasts from Akamai's Security Team.
…
continue reading
Freelancing and marketing nuggets for web designers, without the fluff. TheFreelancerPodcast.com
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
"Web 3.0 with Sam Kamani" is all about Web 3 and how it is going to change the world. If you are interested in learning more about the 4th Industrial revolution then this podcast is for you. Web 3.0 or Web 3 is often hailed as the technology that will usher in the 4th industrial revolution. This revolution is going to affect every industry, business, government and person on this planet. Web 3.0 is a collection of technologies that are going to change how we collaborate with each other and i ...
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Join Lucy Collins, Director of Web Usability, as we explore what it takes to make the web a more accessible and enjoyable place for everyone. Whether you're a website owner, developer, or just a curious mind, we're here to share insights, tips, and stories that can help you improve the user experience of your digital world. Web Usability is an established User Experience (UX) agency. We are UX specialists. We provide inclusive UX research and advice to optimise your digital services. If you ...
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Welcome to Inside Marketing with MarketSurge — your front-row seat to the boldest business insights, marketing breakthroughs, and entrepreneurial real talk. Hosted by Reed Hansen, Chief Growth Officer at MarketSurge and a digital marketing veteran who's helped scale everything from scrappy startups to Fortune 500 giants, this podcast dives deep into what’s really moving the needle in today’s marketing world. Find us at Marketsurge.io Each week, we’ll break down the latest marketing and busin ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
The Thinking Elixir podcast is a weekly show where we talk about the Elixir programming language and the community around it. We cover news and interview guests to learn more about projects and developments in the community. Whether you are already experienced with Elixir or just exploring the language, this show is created with you in mind. We discuss community news, Functional Programming, transitioning from OOP, coding conventions, and more. Guests visit the show to help challenge our ass ...
…
continue reading
From development and design to marketing and support, Under the Radar is all about independent app development. It's rarely longer than 30 minutes. Hosted by Marco Arment and David Smith.
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
…
continue reading
Hosted by Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
Tech with Newton is an informative technology podcast for tech enthusiasts, newcomers to tech, tech professionals, and anyone looking to break into the industry. It is a podcast committed to educating and empowering technology careers worldwide. In each episode, the host, Newton, a seasoned IT consultant, explores the latest interesting technology news, trends, insights, and innovations, as well as career development tips and tricks to turbocharge careers in tech.
…
continue reading
Conversations with industry pros on the latest cloud-first technologies and software development practices.
…
continue reading
Our mission at Liveplex is to be the catalyst for transformation in the digital landscape. We empower enterprises with the tools and expertise needed to embrace Web 3.0 effortlessly. Through our APIs and services, we enable efficiency, data-driven decision-making, personalization, security, and trust, allowing our customers to not only thrive in the digital age but also lead with innovation. We are dedicated to enhancing customer experiences, helping businesses evolve, and shaping the future ...
…
continue reading

1
From Code to Conversions: Rob Cairns on Web Security, WordPress Wins & Agency Longevity
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45From Code to Conversions: Rob Cairns on Web Security, WordPress Wins & Agency Longevity 🚀 Ready to secure your site, simplify your strategy, and scale your digital presence? In this episode of Inside Marketing with MarketSurge, we sit down with Rob Cairns, founder of Stunning Digital Marketing and host of the SDM Show — a veteran web developer and …
…
continue reading

1
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
…
continue reading

1
Ep24. How to make cyber security accessible
30:15
30:15
Play later
Play later
Lists
Like
Liked
30:15Summary In this episode of the Web Usability podcast, Lucy Collins speaks with Aliyu Yisa a cybersecurity professional and accessibility advocate. They discuss Ali's journey from software engineering to focusing on accessible cybersecurity through his work with Pheasant and Cyblack. The conversation highlights the importance of making cybersecurity…
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
Border Czar Tom Homan Joins Crowder: Will Trump Actually Fulfill Deportation Promises
1:03:35
1:03:35
Play later
Play later
Lists
Like
Liked
1:03:35The Left once again advocates for a slave labor class in America. It didn’t work in the 1800’s. Not sure it’s going to work now. Today, we have him: the man, the myth, the legend. Border czar Tom Homan joins us for an update on ICE, the border, and deportations.Finally, President Donald Trump is losing his coalition over Iran. Or, not. Let’s take a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
Stack Overflow CEO on Dev Tools in the AI Era
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42Stack Overflow has long been the go-to platform for developers to learn, collaborate and solve coding challenges. In this Tech Disruptors episode, Bloomberg Intelligence senior analyst Sunil Rajgopal speaks with Stack Overflow CEO Prashanth Chandrasekar on how generative AI is reshaping developer workflows and platform strategy. They discuss the co…
…
continue reading

1
Leadership Lessons from Elite Sports: Swimming Australia’s Path to Gold
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38Discover what it takes to compete at the highest level in the sporting world in this honest conversation with Jess Corones, General Manager of Performance Support and Olympic Campaign at Swimming Australia. Fresh from Australia's success at the Paris Olympics, Corones shares powerful insights on building high-performance cultures, managing team dyn…
…
continue reading

1
257: Runtime Intelligence and MCP Servers
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07News includes Elixir v1.19.0-rc.0 with significant type checking improvements and faster compile times, Gleam v1.11.0 delivering 30% faster JavaScript performance, the new Elixir Outreach stipend program providing funding for speakers to present at non-Elixir conferences, a batch of ElixirConf US 2024 videos featuring talks were published, the open…
…
continue reading
Will my new AI boyfriend be a green flag? Bridget Todd explores how encounters of love and sex are secretly shaped by data and algorithms. Love is intimate. It’s private. It’s human. So naturally tech companies see it as a money-maker. Host Bridget Todd uncovers the algorithmic racism and bias built into most popular dating apps, and meets the peop…
…
continue reading

1
After 30 years, Java is still brewing up new features
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31Connect with Georges on LinkedIn and see his work on inside.java. Listen to our previous episode with Georges, a celebration of Java’s 25th anniversary. Today we’re shouting out the age-old question What is a NullPointerException, and how do I fix it?, which was answered 31 times as a community effort.…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading

1
Trump vs. Tucker: Is Israel Dragging the US into War vs. Iran
1:00:44
1:00:44
Play later
Play later
Lists
Like
Liked
1:00:44Will Smith, the guy behind ‘Gettin’ Jiggy Wit It,’ ‘Wild Wild West,’ and ‘Men in Black’ has new music out, and it’s…well, it’s technically music. The war between Israel and Iran is heating up and it looks like the US will be getting involved. Then again, maybe not. Over the weekend, two Minnesota lawmakers were shot. The legacy media is trying to g…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor their accounts and change passwords. But this is more than just a corporate incident. It’s the latest sign of a broader, escalating crisis in aviation cybersecurity. In this episode, we examine the WestJ…
…
continue reading

1
Todd Steinacher Explains How Farming and Business Strategy Really Work
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08🚜 Ever wonder what agronomics and marketing have in common? In this episode of Inside Marketing with MarketSurge, we sit down with award-winning agronomist Todd Steinacher — founder of Acre Crop and Land and the 2021 International Certified Crop Advisor of the Year — to explore how deep expertise, smart systems, and true coaching create results in …
…
continue reading

1
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—especially those manufactured in the People’s Republic of China—as a cyber weapon against U.S. critical infrastructure. Drawing from recent DHS intelligence briefings and independent cybersecurity analyse…
…
continue reading

1
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
1:10:32
1:10:32
Play later
Play later
Lists
Like
Liked
1:10:32In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions. Promoted as a “responsible alternative” to the NSO Group’s Pegasus, Graphite is now implicated in the surveillance of journalists, humanitarian activists, and civil society figures—contrary to the ve…
…
continue reading

1
LIVE: No Kings Day - Following The Money w/ Guest: Data Republican | Louder with Crowder
4:06:52
4:06:52
Play later
Play later
Lists
Like
Liked
4:06:52Happy Flag Day, everyone! We’re covering all the pomp and circumstance surrounding the 250th anniversary of the United States Army, the army responsible for securing the independence of the greatest nation on Earth. Absolutely nothing could ruin this day! What the hell is No Kings Day? Well, it wouldn’t be a day ending in Y if the Leftists didn’t t…
…
continue reading

1
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what this funding means for the future of supply chain security, and why investors are betting on open hardware to fix vulnerabilities baked into modern chips. We explore how geopolitical tension, forced labor en…
…
continue reading

1
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and multiple intelligence reports detailing a relentless rise in cyberattacks targeting banks and financial institutions across the globe. We examine the surge in sophisticated attacks that blend legitimate to…
…
continue reading

1
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore. We spotlight the most…
…
continue reading

1
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attackers are exploiting these flaws in the wild. Recently, security researchers uncovered a trio of dangerous vulnerabilities, including CVE-2024-35286 (a SQL injection flaw), CVE-2024-41713 (an authentic…
…
continue reading

1
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercriminal world between January and April 2025. Led by INTERPOL and involving law enforcement from 26 countries, primarily across the Asia-Pacific region, this massive coordinated effort, bolstered by cri…
…
continue reading

1
Spydirbyte: Review of his official Biography, Hacker, Hero, or Legend in the Digital Shadows
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Spydirbyte: Review of his official Biography, Hacker, Hero, or Legend in the Digital Shadows pydirbyte: An Analytical Biography of a Digital Enigma The digital landscape is populated by figures who, cloaked in anonymity, exert considerable influence, their actions echoing across networks and into the tangible world. "Spydirbyte" emerges as one such…
…
continue reading

1
“We’re not worried about compute anymore”: The future of AI models
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51Together AI is a platform for building with open-source and specialized multimodal models. Check out their docs. Connect with Jamie on LinkedIn. Shoutout to user aryaxt who earned a Stellar Question badge by wondering about MySQL Data - Best way to implement paging?.By Ryan Donovan, Ben, Jamie de Guerre
…
continue reading

1
Audio Overview "SPYDIRBYTE: Echoes in the Code An Interview and OSINT-Driven Biography By Alberto Daniel Hill"
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43SPYDIRBYTE: Echoes in the Code An Interview and OSINT-Driven Biography By Alberto Daniel Hill
…
continue reading

1
Abu Dhabi Disney, Confused AI and Other Jokes That Should Never Make Air
1:00:32
1:00:32
Play later
Play later
Lists
Like
Liked
1:00:32From Trump being a 'Mean One' to Harvard, to Abu Dhabi Disney's Allahu Snackbar, sometimes even the good jokes don't make the airwaves. Other times, they straight don't deserve to. Come discern for yourself, and take a peek inside how the sausage is made with a bit of Behind the Scenes action to boot. Join Rumble Premium to watch this show every da…
…
continue reading

1
Akamai CEO on Tapping Security, Compute Growth
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46Akamai, a leading content delivery network (CDN) provider, has countered a decline in its CDN business by expanding into security and compute services, which offer much higher growth. These areas may expand at a double-digit rate over the next 3-5 years, with their combined revenue accounting for over two-thirds of sales and 100% of the company’s g…
…
continue reading

1
How HCLTech Leads Customers to Generative AI Success
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22Hear from Prabhakar Appana, SVP and Head of AWS Ecosystem at HCLTech, about their leadership in Generative AI implementation. Prabhakar discusses HC Tech's holistic approach to Generative AI, emphasizing the importance of data strategy, security, and sustainability, while sharing success stories across healthcare, banking, and insurance sectors.…
…
continue reading

1
LIVE: LA Riots Coverage | Boots on the Ground!
3:18:00
3:18:00
Play later
Play later
Lists
Like
Liked
3:18:00It’s riot season. Feels like it gets here earlier and earlier every year. What are they rioting about this time? ICE and the enforcement of our immigration laws. A country is that thing with a border around it. Not so sure if the Leftists know that. Join us tonight to have a bunch of fun watching cars burn. Get $15 off Rumble Premium with promo cod…
…
continue reading

1
CR102: Tattoos, Tech, and Teams, what ink means in the age of AI with Jitske Kramer, Corporate Anthropologist
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30Every organization is built on people, structures, and culture. But culture isn’t static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success.…
…
continue reading

1
265: Tokenizing Oil as a Security — Dave from OilXCoin on Regulated RWAs in Web3
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33What if your entry point to crypto wasn’t Bitcoin or ETH… but a security-backed token tied to real oil production? In this episode, Dave from OilXCoin shares how his team is bridging the gap between traditional energy markets and Web3 by launching a fully regulated, oil-backed security token. From upstream oil leases and production logistics to reg…
…
continue reading

1
The Forgotten Compliance Risks of Shared Workstations | Medcurity Live 096
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Shared workstations—especially in clinical areas—can be a blind spot in privacy and security. Whether it’s leaving PHI on the screen, shared login credentials, or lack of session timeouts, these seemingly small things can cause big issues. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA #Security…
…
continue reading

1
From Burnout to Boldness: Clarity, Confidence & Vision with Elizabeth Mahusay
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24In this episode of Inside Marketing with MarketSurge, host Reed Hansen sits down with Elizabeth Mahusay — national speaker, bestselling author, and mindset coach — to unpack what it really takes to get out of survival mode and into a life of clarity, direction, and conviction. From teaching high school chemistry to leading national sales teams and …
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
…
continue reading

1
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
…
continue reading

1
Peter's Trip to Chicago's "Mini-Hacker Camp"
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30Peter House just returned from a trip to Chicago. He was there for a "Hacker Mini-Camp," basically a week of presentations and learning. There were two presentations that he thought were relatable to us here in the valley. One was that three hundred North Korean citizens were employed as remote IT workers using only 70 stolen US identities. These w…
…
continue reading

1
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
…
continue reading

1
LA on the Brink: Riots Push Trump to Edge of Invoking Insurrection
1:01:54
1:01:54
Play later
Play later
Lists
Like
Liked
1:01:54Who could have seen this coming? The ICE protests are spreading. It’s almost like this isn’t a grassroots effort and is really funded by Leftist organizations. President Donald Trump sent in the troops and Governor Gavin Newsom is upset, but Trump is allowed to do this because it’s an insurrection. Let us tell you why. Finally, Gavin Newsom is a pi…
…
continue reading

1
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
…
continue reading

1
UNFI Breach: How One Cyberattack Shook the North American Food Supply
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
…
continue reading

1
Pegasystems CEO on Rebuilding Workflows With AI
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Enterprise software is evolving as generative AI enables smarter ways to build and run business processes. In this Tech Disruptors episode, Bloomberg Intelligence senior analyst Sunil Rajgopal speaks with Pegasystems CEO Alan Trefler on how tools like Blueprint and agentic workflows help modernize legacy systems and boost productivity. They discuss…
…
continue reading
News includes the Elixir 1.19 RC release featuring up to 4x faster compilation and significant types system improvements, more ElixirConfEU videos including José Valim's keynote on type system updates, the look at the Backpex admin panel for Phoenix LiveView applications, Ash AI's impressive AI integration using the Elixir LangChain library, an inf…
…
continue reading
Bridget Todd is on a journey to find out how AI affects us on a personal level. From her love life to her city, to the privacy of her memories, Bridget digs deep to uncover the relationship between us and AI. She talks to people who question the status quo, and pour their hearts into shaping AI that will change our lives without invading our privac…
…
continue reading

1
Better vibes and vibe coding with Gemini 2.5
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Gemini 2.5 is DeepMind’s most advanced model yet, with strong reasoning and coding capabilities. Connect with Tulsee on LinkedIn. Connect with Logan on LinkedIn and Stack Overflow. Check out our previous episode with Logan, we discussed his unique path from coding to AI to product, the challenges of non-determinism in AI models, and surprising less…
…
continue reading

1
Stephen Jaye on Reclaiming Your Time: Beating Screen Addiction & Scaling a Focused Life
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45In this episode of Inside Marketing with MarketSurge, host Reed Hansen interviews Stephen Jaye, founder of Reclaim Your Time — a transformational program built to help overwhelmed entrepreneurs and professionals break free from screen addiction and reclaim their most valuable asset: their time. If you’ve ever said “I’m too busy” while juggling Slac…
…
continue reading