The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A podcast about web design and development.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Today's websites are increasingly dynamic. Pages are no longer static HTML files but instead generated by scripts and database calls. User interfaces are more seamless, with technologies like Ajax replacing traditional page reloads. This course teaches students how to build dynamic websites with Ajax and with Linux, Apache, MySQL, and PHP (LAMP), one of today's most popular frameworks. Students learn how to set up domain names with DNS, how to structure pages with XHTML and CSS, how to progr ...
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
…
continue reading

1
3304: Meet the Island Enterprise Browser and Why AI is Shadow IT on Steroids
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Enterprise security has always been a moving target, but with the surge of AI adoption, it's entering a whole new era of complexity. In this episode of Tech Talks Daily, I speak with Bradon Rogers, Chief Customer Officer at Island, who brings over 25 years of cybersecurity experience to a conversation that cuts through the noise on AI, data protect…
…
continue reading

1
3323: How Outschool is Preparing Kids for Careers That Don’t Exist Yet.
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16What happens when education stops being about a rigid curriculum and starts focusing on what genuinely sparks a child’s curiosity? This question sits at the heart of my conversation with Amir Nathoo, the founder and CEO of Outschool, a fast-growing online learning platform now trusted by over a million families worldwide. In this episode, Amir shar…
…
continue reading

1
3322: SparkBeyond Unlocks ROI with Always Optimized AI
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30How do you measure success when your AI is learning faster than your own business processes can keep up? That’s the question I set out to answer in my conversation with SparkBeyond, a company that has spent the past decade transforming how enterprises harness AI. From crawling GitHub code in a modest garage experiment to driving measurable performa…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading

1
3321: Instabug and the Quest for Self Healing Mobile Apps
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10In this episode of Tech Talks Daily, I sit down with Jim Douglas, CEO of Instabug, to unpack the hidden world of mobile app development and the hurdles developers face every time you tap an icon on your phone. Mobile apps live in unpredictable conditions, surrounded by millions of device variations and users who are quick to abandon any app that fa…
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
E9 - Inside the 2025 Verizon DBIR with Alex Pinto
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode, we unpack the key insights from our recent LayerX webinar featuring Alex Pinto, lead author of the 2025 Verizon Data Breach Investigations Report (DBIR). Alongside Or Eshed, our CEO, we explore the changing risk landscape—from credential abuse and third-party risk to AI misuse and browser-native threats. Key themes: What the doubli…
…
continue reading

1
3320: How Chase for Business Balances Innovation and Stability for Businesses
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47How are small businesses influencing the future of financial technology at a scale few can match? In this episode, I sit down with Jameson Troutman, Head of Product for Small Business at Chase for Business. With two decades shaping payment solutions for entrepreneurs, he opens up about how a team inside one of the largest financial institutions sta…
…
continue reading

1
3319: Inside Innventure: Pivoting Big Ideas Toward Real-World Value
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06When did you last pause to consider what it takes to turn daring ideas from a lab into reality? In this episode of Tech Talks Daily, I spend time with Mike Otworth, Executive Chairman of Innventure, whose career reveals what happens when breakthrough technology leaves the safety of research and collides with real-world demands. Mike's view offers a…
…
continue reading

1
SE Radio 673: Abhinav Kimothi on Retrieval-Augmented Generation
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55In this episode of Software Engineering Radio, Abhinav Kimothi sits down with host Priyanka Raghavan to explore retrieval-augmented generation (RAG), drawing insights from Abhinav's book, A Simple Guide to Retrieval-Augmented Generation. The conversation begins with an introduction to key concepts, including large language models (LLMs), context wi…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
Cut the Noise, Ditch the Nonsense, Earn the Trust
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and …
…
continue reading

1
Risky Business #796 -- With special guest co-host Chris Krebs
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
…
continue reading

1
3318: RICOH Spaces and the Role of Tech in Workplace Experience Management
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23In this episode of Tech Talks Daily, I sit down with Nathan Thomas, Director of Innovation, Ricoh Europe, who oversees innovation across Ricoh Europe. Nathan joined me to unpack new findings from Ricoh’s study of thousands of workers and business leaders across Europe. We discussed why some countries are advancing in terms of workplace productivity…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
3317: How Sitecore Is Accelerating Agentic AI for Marketers
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55When was the last time you truly paused to consider how far artificial intelligence has come and where it’s heading next? On today’s episode of Tech Talks Daily, I dive into this fast-moving frontier with Mo Cherif, Vice President of Generative AI and Innovation at Sitecore. This conversation explores what 2025 holds for agentic AI and why this tec…
…
continue reading

1
3316: Women in Tech and Data Sovereignty DDN’s Approach at the IT Press Tour
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05Recorded amidst the buzz of the IT Press Tour in Palo Alto, this episode explores the evolving world of data intelligence through a candid conversation with Amanda R. Lee, Vice President, Marketing Analyst & Public Relations, DDN. Sitting under the California sun, I had the opportunity to unpack how DDN is helping some of the most data-intensive or…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Yotam Segev, Matthew Warner, Rob Allen - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
669: Peter Pistorius on Developing RedwoodSDK
1:07:06
1:07:06
Play later
Play later
Lists
Like
Liked
1:07:06Show Description We're chatting with Peter Pistorius about the change they made from RedwoodJS to RedwoodSDK, how it's going to handle routing, some new marketing ideas for RedwoodSDK, how RedwoodSDK's principles are informed by where Peter's from, choosing to go all in on Cloudflare, how the community has responded, and plans for monetization. Lis…
…
continue reading

1
Soap Box: AI has entered the SOC, and it ain't going anywhere
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in…
…
continue reading

1
3315: The New Age of Cyber Resilience with Cohesity
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55How can organizations protect their most valuable asset, data, while harnessing its true potential through AI-driven insights? These are the questions I set out to answer on the recent IT Press Tour in Silicon Valley. In my latest conversation at the Santa Clara offices of Cohesity, I sat down with Sanjay Poonen, President and CEO, to discuss how t…
…
continue reading
Have you ever paused to think about how the humble login has quietly become one of the most vulnerable points in cybersecurity? In this episode, I spoke with Matt Caulfield, Vice President of Identity Products at Cisco, to understand why identity is now the prime target for attackers and how Duo is evolving to meet that threat head-on. Matt explain…
…
continue reading

1
3313: Saving Wildlife, Empowering Communities: The Impact of Connected Conservation
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17Have you ever wondered what happens when cutting-edge network technology meets the rugged frontlines of wildlife conservation? In this episode, I sat down with Sophie Maxwell, the driving force behind the Connected Conservation Foundation, to understand how digital infrastructure and real-time data are changing the odds for endangered species and l…
…
continue reading

1
3312: WiFi 7 at Cisco Live: What It Means for Your Business
33:32
33:32
Play later
Play later
Lists
Like
Liked
33:32Talking wireless at Cisco Live brings you face to face with what tomorrow’s connectivity looks like, and my recent chat with Matt McPherson, Enterprise Wireless CTO at Cisco, and Jerome Henry, standards guru and author, did precisely that. When two people this deep in the trenches start describing how our networks cope with thousands of devices at …
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
3311: Inside Softcat’s Cisco Live Experience: Innovation, Sensors, and Sustainability
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10What does it take to future-proof the modern workplace? In this episode, I speak with Thomas Rowley, Chief Technologist for Networking and Connectivity at Softcat, about the real-world challenges of managing a high-density office and how the company turned to Cisco to create a more intelligent, responsive environment. As more employees returned to …
…
continue reading

1
SE Radio 672: Luca Palmieri on Rust In Production
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Rethinking the Rules of Space (with Jay Schwarz)
36:44
36:44
Play later
Play later
Lists
Like
Liked
36:44Space-based satellite networks are transforming global connectivity, extending access to even the most remote corners of the planet. The rules that govern these networks have never been more critical. How does satellite spectrum actually function? Why is there an increasing need to revise the regulations that oversee it? And what are the key compon…
…
continue reading

1
3310: From Power to Fiber: Panduit's AI-Driven Vision at Cisco Live
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29As AI continues to dominate the conversation at Cisco Live, the infrastructure needed to support this transformation often gets overshadowed. That’s why I was eager to visit the Panduit booth and explore the physical backbone enabling the shift from cloud to on-prem. I sat down with several Panduit experts including Renee Lang, Mason Khan, Vince, a…
…
continue reading
Are you aware of the hidden risks lurking in your organization’s browser extensions? Nearly every enterprise user has at least one extension installed—and over half of those extensions request powerful permissions that can expose cookies, passwords, and sensitive data. In this video, we introduce ExtensionPedia, LayerX’s free, publicly available Br…
…
continue reading