show episodes
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Hosted by Viktor Gamov and Kaitlyn Barnard, we interview software developers and technology leaders at the top of their game every other week. We’ll also give you the tools, tactics and strategies you need to take your cloud native architecture to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you can tackle your biggest connectivity challenges.
  continue reading
 
We believe that digital transformation efforts make companies and communities more resilient. In the API Resilience podcast you'll listen to guests from industry leading API teams sharing their views about the current trends of the API economy. We also bring you insights that your API team will be able to use, and even explain to your management on how APIs can help your company cope, resurge, and thrive during and after this pandemic. The host is Kristof Van Tomme.
  continue reading
 
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
  continue reading
 
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Artwork

1
API Intersection

Stoplight

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Building a successful API requires more than just coding. It starts with collaborative design, focuses on creating a great developer experience, and ends with getting your company on board, maintaining consistency, and maximizing your API’s profitability. In the API Intersection, you’ll learn from experienced API practitioners who transformed their organizations, and get tangible advice to build quality APIs with collaborative API-first design. Jason Harmon brings over a decade of industry-r ...
  continue reading
 
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
  continue reading
 
Artwork

1
Tech Lounge

Chris Chinchilla

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly podcast that welcomes you to explore technology with an insightful interview every two weeks and topic-deep dives every other two weeks. If you're interested in deep and creative technology and conversations with some of its most interesting practioners, this is the show for you. Come in and get yourself comfortable. Show notes can be found at - chrischinchilla.com/podcast Formerly known as "Chinchilla Squeaks"
  continue reading
 
Artwork
 
Buzzword Bingo explores top-of-mind topics in enterprise tech. Each topic is examined from multiple perspectives through in-depth interviews with industry leaders and aficionados. Powered by Rubrik.
  continue reading
 
Artwork

1
The Last Great Cloud Transformation

lastgreatcloudtransformation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
For 20 years the cloud computing revolution has been transforming how organizations operate and innovate. But the revolution is not yet complete. The final areas of transformation are networking and security, which have remained grounded in on-premises thinking and technologies. No longer. A majority of enterprises are planning to increase spending on network modernization. Join us as we discuss what this new, cloud-oriented network should look like.
  continue reading
 
Artwork

1
Cloud Talk

Rackspace Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cloud Talk brings you discussions on topics like digital transformation, Kubernetes, IoT, edge computing and multicloud, as told through the perspectives of the people and the companies who are living this transformation on a daily basis. In Cloud Talk, host Jeff DeVerter interviews some of the most influential figures on the frontlines of cloud technology, helping you stay connected. Jeff is CTO at Rackspace and has spent over 20 years immersed in the world of cutting-edge technology.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
  continue reading
 
Artwork

1
Test Automation Experience

Nikolay Advolodkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
"This show brings you the latest trends, tools, and techniques in test automation. Each week, we explore a range of topics related to quality assurance, including continuous integration, automation frameworks, and test-driven development. In addition to expert insights and real-world examples, we also feature interviews with industry leaders and members of the test automation community. These interviews offer a unique opportunity to learn from the experiences of others and ask questions abou ...
  continue reading
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
Owning an Unraid server gives you the ultimate control over your data and reduces your dependence on The Cloud. Join host Ed Rawlings to learn how to get the most out of your Unraid server, stay up to date on relevant news and topics, and get to know members of the Unraid community!
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Coronation Podcast Series is an ongoing engagement medium covering economic and market development trends. The podcast series is one of the many components that form the Coronation Podcast Series platform. Coronation Podcast Series aims to be a mix of informative and entertaining content for our listeners, to help them understand what's happening in the world economy. Join the conversation and stay up-to-date on global economic and market development.
  continue reading
 
Join Mplify Alliance CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling AI-powered digital transformation. Each episode delves into leading-edge business insights from top network, cloud, technology, industry analysts and other top executives—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster.
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
The New Stack Podcast

The New Stack

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
  continue reading
 
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
  continue reading
 
Artwork

1
cloudonaut

Andreas Wittig and Michael Wittig focusing on AWS Cloud

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
  continue reading
 
Loading …
show series
 
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
  continue reading
 
Our guest today is Akansha Shukla, an information security professional with over 10 years of experience in application security, DevSecOps, and API security. We’re discussing why API security remains one of the least mature areas of AppSec today and exploring the challenges developers face when securing APIs. Akansha shares her insights on incorpo…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
David Cramer, founder and chief product officer of Sentry, remains skeptical about generative AI's current ability to replace human engineers, particularly in software production. While he acknowledges AI tools aren't yet reliable enough for full autonomy—especially in tasks like patch generation—he sees value in using large language models (LLMs) …
  continue reading
 
Ryan welcomes Pia Nilsson, GM for Backstage and head of developer experience at Spotify, to discuss the evolution and adoption of Backstage, the impact of AI on dev experience, and how Spotify approaches platform engineering and standardization to help teams solve for specific needs. Episode notes: Backstage is an open-source IDP by Spotify that re…
  continue reading
 
This week on the latest Ledger Podcast, CTO Charles Guillemet joins CXO Ian Rogers to break down the threats shaking the crypto space, and what they mean for your security. From the NPM supply chain attack that almost touched billions, to zero-day browser exploits, to why hardware wallets with secure screens remain the ultimate line of defense — Ch…
  continue reading
 
70% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
  continue reading
 
Our trust in the internet is the lowest it’s ever been. In spite of our vigilance, we face more threats than ever before. Product security is a vital element in the defense against malicious incursions. This season of Compiler covers the particulars of product security. With some help from Emily Fox, Portfolio Security Architect at Red Hat, our hos…
  continue reading
 
Elizabeth Figura, a Wine Developer at CodeWeavers, speaks with SE Radio host Jeremy Jung about the Wine compatibility layer and the Proton distribution. They discuss a wide range of details including system calls, what people run with Wine, how games are built differently, conformance and regression testing, native performance, emulating a CPU vs e…
  continue reading
 
The Unraid Content Creator OGs unite in a a long-overdue chat about Unraid, content creation, real-world homelab security, rack tours, future video collabs, and more. Ramy shares how a personal need led him to Unraid and Docker, why the community pulled him back to YouTube, and what’s on deck for Ibracorp. We compare media server stacks (Plex vs Je…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
Episode Summary Can multi-factor authentication really “solve” security, or are attackers already two steps ahead? In this episode of The Secure Developer, we sit down with Paul Querna, CTO and co-founder at ConductorOne, to unpack the evolving landscape between authentication and authorisation. In our conversation, Paul delves into the difference …
  continue reading
 
Francesco Cipollone, the CEO of Phoenix Security, shares his extensive experience in AI and security, discussing the crucial difference between true AI agents and glorified chatbots. Learn why Phoenix Security utilizes six different LLMs instead of a single super agent. Understand the sobering economics behind AI implementation and the importance o…
  continue reading
 
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the fu…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Show Notes: https://securityweekly.com/asw-349…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
Jeff Hollan, director of product at Snowflake, joins Ryan to discuss the role that data plays in making AI and AI agents better. Along the way, they discuss how a database leads to an AI platform, Snowflake’s new data marketplace, and the role data will play in AI agents. Episode notes: Snowflake provides a fully-managed data platform that develope…
  continue reading
 
In this episode of JavaScript Jabber, I sit down with Ryan Carniato, creator of SolidJS, and Tanner Linsley, the force behind TanStack, for a deep-dive conversation on the resurgence of Remote Procedure Calls (RPC) in modern web development. We explore why RPC is making a comeback, how frameworks like Solid, TanStack, and others are shaping the way…
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
August and September were massive months for Unraid! We celebrated our 20th Anniversary Birthday Bash with milestone events, community content, and big product updates. Here’s what went down: 🎉 20th Anniversary Highlights Our first-ever live 20th Anniversary event A special anniversary video from Spaceinvader One (Ed) The launch of the brand-new Un…
  continue reading
 
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
  continue reading
 
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
  continue reading
 
Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
  continue reading
 
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
  continue reading
 
With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
  continue reading
 
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
  continue reading
 
This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
Cursor, the AI code editor, recently integrated with Linear, a project management tool, enabling developers to assign tasks directly to Cursor's background coding agent within Linear. The collaboration felt natural, as Cursor already used Linear internally. Linear's new agent-specific API played a key role in enabling this integration, providing ag…
  continue reading
 
Staking is moving from crypto-native to boardroom essential. On this episode of The Ledger Podcast, Ariel Wengroff (EVP, Marketing & Comms, Ledger) hosts Sebastien Badault (VP of Ledger Enterprise) and Max Mercek (Vice President of Global Business Development at Luganodes) to unpack how institutions stake without giving up custody—and why that matt…
  continue reading
 
Ryan welcomes Sebastian Gierlinger, VP of Engineering at Storyblok, to talk about how headless content management systems (CMS) fit into an increasingly componentized software landscape. They run through the differences between headless and traditional CMS systems (and databases), prototyping and security concerns, and how a team building distribut…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
Williams-Sonoma’s Senior Vice President of Technology, Raleigh Mann, unpacks the complexity of global networks, the shift to API-driven automation, and why security must remain the first and last priority. How can enterprises innovate at scale while maintaining security and resilience? Subscribe on Your Favorite Podcast Platform Apple Spotify Pando…
  continue reading
 
I speak with Sagar Batchu about Speakeasy, the platform for crafting API experiences from simple definition files, including exposing them as MCP servers. The AI writing tool with unparalleled story smarts Sudowrite is an AI-powered writing assistant that helps you brainstorm, outline, and write your stories. For show notes and an interactive trans…
  continue reading
 
In this episode, we explore the rapid evolution of cybersecurity and the critical rise of a new specialisation: the AI Security Engineer. As artificial intelligence advances, it not only enhances our defensive capabilities but also introduces sophisticated new attack vectors that traditional security measures can't handle. AI Security Certification…
  continue reading
 
Dashboards don’t decide. Agents do. In this episode of Startuprad.io, we sit down with Jennifer Grün, Senior Specialist for Generative AI & ML at AWS, to explore how agentic AI is rewriting the rules of SaaS. Instead of static dashboards and brittle automations, SaaS is moving toward agents that reason, plan, and act—delivering outcomes like churn …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play