Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
Where Automation Meets Security
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The Dev Interrupted Podcast is the premier podcast for software engineering leaders. Hosts Dan Lines, Ben Lloyd Pearson, and Andrew Zigler invite expert guests from around the world to explore strategy and day-to-day topics ranging from dev team metrics to accelerating delivery. Join us weekly for new episodes.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
…
continue reading
Welcome to the Microsoft Community Insights Podcast, where we explore the world of Microsoft Technologies. Interview experts in the field to share insights, stories, and experiences in the cloud. if you would like to watch the video version you can watch it on YouTube below https://youtube.com/playlist?list=PLHohm6w4Gzi6KH8FqhIaUN-dbqAPT2wCX&si=BFaJa4LuAsPa2bfH Hope you enjoy it
…
continue reading
Security Boulevard Chats is the companion podcast to SecurityBoulevard.com. Hosted by long time cyber insiders, Techstrong CEO Alan Shimel and Techstrong CTO and GM Mitch Ashley discuss cyber-related topics making tomorrows headlines.
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading

1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading

1
#79 - Going Local: What’S Driving The Move?
20:31
20:31
Play later
Play later
Lists
Like
Liked
20:31Andrey, Paulina, and Mattias kick off a miniseries on European infrastructure. We talk about infrastructure providers' options across Europe, ask what really drives the move away from hyperscalers, and wonder whether the trade-offs make sense for most teams. Connect with us on LinkedIn or Twitter (see info at https://devsecops.fm/about/). We are ha…
…
continue reading

1
Making DevSecOps Work by Balancing Speed, Security & Scale
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48In this episode of Lessons from Production, I sit down with Mark Mishaev, Chief Architect at Checkmarx (shoutout for sponsoring this episode), to talk about what it really takes to make DevSecOps work. We dive into the ongoing challenge of balancing speed, security, and scale; and why getting that balance right is key to building software that can …
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 107
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04Chris Steffen and Ken Buckler from EMA present a preview of the RSA Conference and discuss the EMA Vendor Vision report.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
The Shift to Agent-Driven API Consumption | Speakeasy’s Sagar Batchu
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17Think building killer APIs like Stripe or Twilio is purely a technical feat? Think again. This week, we dive into why crafting successful APIs is fundamentally an organizational challenge, demanding internal excellence long before code is deployed. Sagar Batchu, co-founder and CEO of Speakeasy, joins us to unpack the crucial role of ownership, desi…
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
Pentagon establishing secure software assurance program
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Learn more about your ad choices. Visit podcastchoices.com/adchoices See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Episode 32 - Women of Microsoft: The stories of Innovation by Miri Rodriguez
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58Send us a text
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 106
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24Chris Steffen and Ken Buckler from EMA discuss the buzzwords generated by marketing to sell cybersecurity products.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
S5 E7 - Dr. Bill Bellows - Thinking About Thinking and the In2:InThinking Forum 2025
48:56
48:56
Play later
Play later
Lists
Like
Liked
48:56I have a deeply insightful conversation with Dr. Bill Bellows in this episode of the Profound Podcast. We dive into the heart of what it means to think about thinking—a concept that lies at the core of the In2:InThinking Network, a community Dr. Bellows co-founded to carry forward the transformational work of W. Edwards Deming and other systems pio…
…
continue reading

1
CR095: The gap between humanity and AI with Anders Indset, Philosopher & Author
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18This year is the year that AI moves from the individual assistant to the collective and autonomous - from co-pilots to agent to agent integration. But what do we know of its collective impact and how does humanity fit in? This week’s Easter Special, Dave, Esmee and Rob talk to Anders Indset, about his work (Ex Machina and the Singularity Paradox), …
…
continue reading

1
Advancing AppSec With AI With Akira Brand
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Episode Summary In this episode of The Secure Developer, Danny Allan sits down with Akira Brand, AVP of Application Security at PRA Group, to explore the evolving landscape of application security and AI. Akira shares her unconventional journey from opera to cybersecurity, discusses why AppSec is fundamentally a customer service role and breaks dow…
…
continue reading

1
How Marketing Ruined Shift Left | Semgrep’s Tanya Janca
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52When it comes to securing software, most developers feel like they're playing catch-up instead of setting the rules. Tanya Janca (SheHacksPurple), author of "Alice and Bob Learn Secure Coding," brings her 28 years of IT and security expertise—spanning counter-terrorism to enterprise training—to Dev Interrupted. She unpacks the common pitfalls teams…
…
continue reading

1
More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326
1:14:45
1:14:45
Play later
Play later
Lists
Like
Liked
1:14:45The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
…
continue reading

1
NAVWAR using Catapult to find SBIR technologies faster
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Shadi Azoum, the NAVWAR’s program manager for the SBIR/STTR programs, said about 60% of their entire SBIR and STTR awards take advantage of Catapult. Learn more about your ad choices. Visit podcastchoices.com/adchoices See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.…
…
continue reading
Sanskar started his journey as an open source contributor in India, moved to London to work at Bloomberg, and recently quit his job to move to San Francisco and build his own AI startup, Amurex. In this episode, we talk about that journey; and what it takes to build an AI assistant that’s actually helpful, personal, and respectful of your space. We…
…
continue reading

1
CRLIVE46 Google Cloud Next 2025: Leading Cloud Transformation with Strategic Vision with Lee Moore, Google Cloud
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
CRLIVE45 Google Cloud Next 2025: Evolving Digital and AI Landscape for Fortune 500 companies with Gina Fratarcangeli, Google Cloud
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
CRLIVE44 Google Cloud Next 2025: Accelerating Innovation in Telecom with AI, Jen Hawes-Hewitt, Google Cloud
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’re bringing 8 incredible conversations in the coming days with inspiring guests who are shaping the f…
…
continue reading

1
CRLIVE43 Google Cloud Next 2025: Unlocking Retail Potential with Kapil Dabi, Google Cloud
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
CRLIVE42 Google Cloud Next 2025: AI Fueling Insurance Evolution with Meg Tucker, Google Cloud
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 105
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42Chris Steffen and Ken Buckler from EMA discuss hacking a modern, computer controlled vehicle.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Ep. 7 – IDOR & SSTI: From File Theft to Server-Side Secrets
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35A predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and ho…
…
continue reading
Google Sheets and Excel have been the default for decades. But why haven’t spreadsheets really evolved, even though millions rely on them every day? And what does it actually take to build a better one in 2025? In this first episode of Lessons from Production, I speak to David Kircos, founder of Quadratic (shoutout for sponsoring this episode), a m…
…
continue reading

1
CRLIVE41 Google Cloud Next 2025: Driving Digital Transformation with customers with Jim Anderson, Google Cloud
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
CRLIVE40 Google Cloud Next 2025: Strategic Thinking and Visioning in AI with Charlotte Gistelinck, Google Cloud
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The Cloud Realities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
CRLIVE39 Google Cloud Next 2025: Leading AI Innovation with Saurabh Tiwary, Google Cloud
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
…
continue reading

1
#78 - Building AI Tools For IaC Compliance
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12In this guest episode, we chat with Davlet Dzhakishev, co-founder of Cloudgeni, who’s working on an AI-powered approach to fixing compliance issues in IaC. What’s the state of tools in this space? Where does his idea fit in? And how should we think about the relationship between compliance and security? Connect with us on LinkedIn or Twitter (see i…
…
continue reading

1
S5 E6 - Jim Highsmith – Navigating the Past to Shape the Future
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35In this episode, I have a fascinating conversation with Jim Highsmith. We dive into Jim’s six-decade career in software development, his role in the Agile movement, and how his early influences continue to shape his thinking on digital transformation today. Jim shares stories from the punch card era to the Agile Manifesto, offering insight into the…
…
continue reading

1
How to Build AI Workflows You Can Trust | Infactory’s Brooke Hartley Moy
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42Is your company rushing headlong into AI, only to find it's a 'square peg in a round hole'? This week, Andrew tackles the critical issue of building trust in AI systems with Brooke Hartley Moy, CEO and co-founder of Infactory. Brooke, with her experience at companies like Google and Samsung, cuts through the hype and reveals the biggest misconcepti…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Play later
Play later
Lists
Like
Liked
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
Episode 31 - Container Security with Josh Duffney
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Send us a text Josh walks us through the powerful combination of open-source CNCF projects that address different aspects of container supply chain security. Learn how Trivy scans for vulnerabilities, Copasetic performs targeted patching when base image updates aren't possible, Notation provides digital signatures to verify trust, and Ratify enforc…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 104
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24Chris Steffen and Ken Buckler from EMA discuss the impacts that taxes and tariffs have on technology and cybersecurity.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
CR094: Shifting perspective on sustainability with Lewis Richards, Microsoft
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23As organizations increasingly integrate Gen AI into their operations, it's crucial to consider the technology's environmental impact. However, only 12% of executives report that their organizations measure Gen AI's footprint, and just 20% prioritize its environmental footprint among the top five factors when choosing or developing models. Despite t…
…
continue reading

1
Authentication, Authorization, And The Future Of AI Security With Alex Salazar
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36Episode Summary In this episode of The Secure Developer, host Danny Allan sits down with Alex Salazar, founder and CEO of Arcade, to discuss the evolving landscape of authentication and authorization in an AI-driven world. Alex shares insights on the shift from traditional front-door security to back-end agent interactions, the challenges of securi…
…
continue reading

1
Amazon Q and The Future of Autonomous Development | AWS' Adnan Ijaz
42:38
42:38
Play later
Play later
Lists
Like
Liked
42:38AI is evolving at a breakneck speed, leaving engineering leaders with a critical dilemma: innovate or fall behind. But how do you experiment with AI without risking your credibility? Andrew Zigler sits down with Adnan Ijaz, Director of Product Management for Next Gen Developer Experience at AWS, to unpack the power of AI agents. Together they discu…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Play later
Play later
Lists
Like
Liked
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
How the Navy is removing barriers to IT modernization
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28Learn more about your ad choices. Visit podcastchoices.com/adchoices See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 103
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31Chris Steffen and Ken Buckler from EMA discuss the plans to move many cybersecurity controls from the federal level to the state level.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
17:14
17:14
Play later
Play later
Lists
Like
Liked
17:14A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapter…
…
continue reading

1
CR093: Role of AI/Gen AI in cybersecurity with Corence Klop, Rabobank
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18AI and Generative AI are transforming cybersecurity by enhancing threat detection and response. These technologies offer unmatched accuracy and efficiency, making them crucial for protecting sensitive data. As cyber threats evolve, integrating AI into security strategies is essential. This week, Dave, Esmee and Rob talk to Corence Klop, CISO at the…
…
continue reading