show episodes
 
Artwork

51
Cloud Realities

Capgemini

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Artwork

1
Profound

John Willis

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork
 
The Dev Interrupted Podcast is the premier podcast for software engineering leaders. Hosts Dan Lines, Ben Lloyd Pearson, and Andrew Zigler invite expert guests from around the world to explore strategy and day-to-day topics ranging from dev team metrics to accelerating delivery. Join us weekly for new episodes.
  continue reading
 
Artwork

1
Ask the CIO

Federal News Network | Hubbard Radio

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
  continue reading
 
Lessons from Production brings you real-world stories from tech leaders who’ve been in the trenches. Each episode dives into the challenges, hard-earned lessons, and behind-the-scenes insights from building and scaling technology in production. No fluff, just practical takeaways from experts who’ve lived it.
  continue reading
 
Welcome to the Microsoft Community Insights Podcast, where we explore the world of Microsoft Technologies. Interview experts in the field to share insights, stories, and experiences in the cloud. if you would like to watch the video version you can watch it on YouTube below https://youtube.com/playlist?list=PLHohm6w4Gzi6KH8FqhIaUN-dbqAPT2wCX&si=BFaJa4LuAsPa2bfH Hope you enjoy it
  continue reading
 
Artwork

1
Code Patrol

Contrast Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
  continue reading
 
Artwork
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
DevOps State of Mind

LogDNA x StudioPod Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
  continue reading
 
Artwork

1
Lessons in Cybersecurity

Prof. Avishai Wool * Sponsored by AlgoSec

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Artwork

1
SilverLining IL

MarkeTech Group

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
  continue reading
 
Loading …
show series
 
Andrey, Paulina, and Mattias kick off a miniseries on European infrastructure. We talk about infrastructure providers' options across Europe, ask what really drives the move away from hyperscalers, and wonder whether the trade-offs make sense for most teams. Connect with us on LinkedIn or Twitter (see info at https://devsecops.fm/about/). We are ha…
  continue reading
 
In this episode of Lessons from Production, I sit down with Mark Mishaev, Chief Architect at Checkmarx (shoutout for sponsoring this episode), to talk about what it really takes to make DevSecOps work. We dive into the ongoing challenge of balancing speed, security, and scale; and why getting that balance right is key to building software that can …
  continue reading
 
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
  continue reading
 
Think building killer APIs like Stripe or Twilio is purely a technical feat? Think again. This week, we dive into why crafting successful APIs is fundamentally an organizational challenge, demanding internal excellence long before code is deployed. Sagar Batchu, co-founder and CEO of Speakeasy, joins us to unpack the crucial role of ownership, desi…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
I have a deeply insightful conversation with Dr. Bill Bellows in this episode of the Profound Podcast. We dive into the heart of what it means to think about thinking—a concept that lies at the core of the In2:InThinking Network, a community Dr. Bellows co-founded to carry forward the transformational work of W. Edwards Deming and other systems pio…
  continue reading
 
This year is the year that AI moves from the individual assistant to the collective and autonomous - from co-pilots to agent to agent integration. But what do we know of its collective impact and how does humanity fit in? This week’s Easter Special, Dave, Esmee and Rob talk to Anders Indset, about his work (Ex Machina and the Singularity Paradox), …
  continue reading
 
Episode Summary In this episode of The Secure Developer, Danny Allan sits down with Akira Brand, AVP of Application Security at PRA Group, to explore the evolving landscape of application security and AI. Akira shares her unconventional journey from opera to cybersecurity, discusses why AppSec is fundamentally a customer service role and breaks dow…
  continue reading
 
When it comes to securing software, most developers feel like they're playing catch-up instead of setting the rules. Tanya Janca (SheHacksPurple), author of "Alice and Bob Learn Secure Coding," brings her 28 years of IT and security expertise—spanning counter-terrorism to enterprise training—to Dev Interrupted. She unpacks the common pitfalls teams…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Shadi Azoum, the NAVWAR’s program manager for the SBIR/STTR programs, said about 60% of their entire SBIR and STTR awards take advantage of Catapult. Learn more about your ad choices. Visit podcastchoices.com/adchoices See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.…
  continue reading
 
Sanskar started his journey as an open source contributor in India, moved to London to work at Bloomberg, and recently quit his job to move to San Francisco and build his own AI startup, Amurex. In this episode, we talk about that journey; and what it takes to build an AI assistant that’s actually helpful, personal, and respectful of your space. We…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’re bringing 8 incredible conversations in the coming days with inspiring guests who are shaping the f…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
A predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and ho…
  continue reading
 
Google Sheets and Excel have been the default for decades. But why haven’t spreadsheets really evolved, even though millions rely on them every day? And what does it actually take to build a better one in 2025? In this first episode of Lessons from Production, I speak to David Kircos, founder of Quadratic (shoutout for sponsoring this episode), a m…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The Cloud Realities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
Hello Las Vegas — we’ve arrived for Google Cloud Next 2025! Arthur C. Clarke's third law, "Any sufficiently advanced technology is indistinguishable from magic" Hot drop coming through! The #CloudRealities podcast team has landed in electric Las Vegas—and you know what they say: what happens in Vegas normally stays in Vegas... but in this case, we’…
  continue reading
 
In this guest episode, we chat with Davlet Dzhakishev, co-founder of Cloudgeni, who’s working on an AI-powered approach to fixing compliance issues in IaC. What’s the state of tools in this space? Where does his idea fit in? And how should we think about the relationship between compliance and security? Connect with us on LinkedIn or Twitter (see i…
  continue reading
 
In this episode, I have a fascinating conversation with Jim Highsmith. We dive into Jim’s six-decade career in software development, his role in the Agile movement, and how his early influences continue to shape his thinking on digital transformation today. Jim shares stories from the punch card era to the Agile Manifesto, offering insight into the…
  continue reading
 
Is your company rushing headlong into AI, only to find it's a 'square peg in a round hole'? This week, Andrew tackles the critical issue of building trust in AI systems with Brooke Hartley Moy, CEO and co-founder of Infactory. Brooke, with her experience at companies like Google and Samsung, cuts through the hype and reveals the biggest misconcepti…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
Send us a text Josh walks us through the powerful combination of open-source CNCF projects that address different aspects of container supply chain security. Learn how Trivy scans for vulnerabilities, Copasetic performs targeted patching when base image updates aren't possible, Notation provides digital signatures to verify trust, and Ratify enforc…
  continue reading
 
As organizations increasingly integrate Gen AI into their operations, it's crucial to consider the technology's environmental impact. However, only 12% of executives report that their organizations measure Gen AI's footprint, and just 20% prioritize its environmental footprint among the top five factors when choosing or developing models. Despite t…
  continue reading
 
Episode Summary In this episode of The Secure Developer, host Danny Allan sits down with Alex Salazar, founder and CEO of Arcade, to discuss the evolving landscape of authentication and authorization in an AI-driven world. Alex shares insights on the shift from traditional front-door security to back-end agent interactions, the challenges of securi…
  continue reading
 
AI is evolving at a breakneck speed, leaving engineering leaders with a critical dilemma: innovate or fall behind. But how do you experiment with AI without risking your credibility? Andrew Zigler sits down with Adnan Ijaz, Director of Product Management for Next Gen Developer Experience at AWS, to unpack the power of AI agents. Together they discu…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapter…
  continue reading
 
AI and Generative AI are transforming cybersecurity by enhancing threat detection and response. These technologies offer unmatched accuracy and efficiency, making them crucial for protecting sensitive data. As cyber threats evolve, integrating AI into security strategies is essential. This week, Dave, Esmee and Rob talk to Corence Klop, CISO at the…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play