show episodes
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Explain to Shane

AEI Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Today's websites are increasingly dynamic. Pages are no longer static HTML files but instead generated by scripts and database calls. User interfaces are more seamless, with technologies like Ajax replacing traditional page reloads. This course teaches students how to build dynamic websites with Ajax and with Linux, Apache, MySQL, and PHP (LAMP), one of today's most popular frameworks. Students learn how to set up domain names with DNS, how to structure pages with XHTML and CSS, how to progr ...
  continue reading
 
Artwork

1
Beyond the Hype

Scott Logic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
  continue reading
 
Loading …
show series
 
Enterprise security has always been a moving target, but with the surge of AI adoption, it's entering a whole new era of complexity. In this episode of Tech Talks Daily, I speak with Bradon Rogers, Chief Customer Officer at Island, who brings over 25 years of cybersecurity experience to a conversation that cuts through the noise on AI, data protect…
  continue reading
 
What happens when education stops being about a rigid curriculum and starts focusing on what genuinely sparks a child’s curiosity? This question sits at the heart of my conversation with Amir Nathoo, the founder and CEO of Outschool, a fast-growing online learning platform now trusted by over a million families worldwide. In this episode, Amir shar…
  continue reading
 
How do you measure success when your AI is learning faster than your own business processes can keep up? That’s the question I set out to answer in my conversation with SparkBeyond, a company that has spent the past decade transforming how enterprises harness AI. From crawling GitHub code in a modest garage experiment to driving measurable performa…
  continue reading
 
In this episode of Tech Talks Daily, I sit down with Jim Douglas, CEO of Instabug, to unpack the hidden world of mobile app development and the hurdles developers face every time you tap an icon on your phone. Mobile apps live in unpredictable conditions, surrounded by millions of device variations and users who are quick to abandon any app that fa…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
In this episode, we unpack the key insights from our recent LayerX webinar featuring Alex Pinto, lead author of the 2025 Verizon Data Breach Investigations Report (DBIR). Alongside Or Eshed, our CEO, we explore the changing risk landscape—from credential abuse and third-party risk to AI misuse and browser-native threats. Key themes: What the doubli…
  continue reading
 
How are small businesses influencing the future of financial technology at a scale few can match? In this episode, I sit down with Jameson Troutman, Head of Product for Small Business at Chase for Business. With two decades shaping payment solutions for entrepreneurs, he opens up about how a team inside one of the largest financial institutions sta…
  continue reading
 
When did you last pause to consider what it takes to turn daring ideas from a lab into reality? In this episode of Tech Talks Daily, I spend time with Mike Otworth, Executive Chairman of Innventure, whose career reveals what happens when breakthrough technology leaves the safety of research and collides with real-world demands. Mike's view offers a…
  continue reading
 
In this episode of Software Engineering Radio, Abhinav Kimothi sits down with host Priyanka Raghavan to explore retrieval-augmented generation (RAG), drawing insights from Abhinav's book, A Simple Guide to Retrieval-Augmented Generation. The conversation begins with an introduction to key concepts, including large language models (LLMs), context wi…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and …
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
  continue reading
 
In this episode of Tech Talks Daily, I sit down with Nathan Thomas, Director of Innovation, Ricoh Europe, who oversees innovation across Ricoh Europe. Nathan joined me to unpack new findings from Ricoh’s study of thousands of workers and business leaders across Europe. We discussed why some countries are advancing in terms of workplace productivity…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
When was the last time you truly paused to consider how far artificial intelligence has come and where it’s heading next? On today’s episode of Tech Talks Daily, I dive into this fast-moving frontier with Mo Cherif, Vice President of Generative AI and Innovation at Sitecore. This conversation explores what 2025 holds for agentic AI and why this tec…
  continue reading
 
Recorded amidst the buzz of the IT Press Tour in Palo Alto, this episode explores the evolving world of data intelligence through a candid conversation with Amanda R. Lee, Vice President, Marketing Analyst & Public Relations, DDN. Sitting under the California sun, I had the opportunity to unpack how DDN is helping some of the most data-intensive or…
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Show Description We're chatting with Peter Pistorius about the change they made from RedwoodJS to RedwoodSDK, how it's going to handle routing, some new marketing ideas for RedwoodSDK, how RedwoodSDK's principles are informed by where Peter's from, choosing to go all in on Cloudflare, how the community has responded, and plans for monetization. Lis…
  continue reading
 
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in…
  continue reading
 
How can organizations protect their most valuable asset, data, while harnessing its true potential through AI-driven insights? These are the questions I set out to answer on the recent IT Press Tour in Silicon Valley. In my latest conversation at the Santa Clara offices of Cohesity, I sat down with Sanjay Poonen, President and CEO, to discuss how t…
  continue reading
 
Have you ever paused to think about how the humble login has quietly become one of the most vulnerable points in cybersecurity? In this episode, I spoke with Matt Caulfield, Vice President of Identity Products at Cisco, to understand why identity is now the prime target for attackers and how Duo is evolving to meet that threat head-on. Matt explain…
  continue reading
 
Have you ever wondered what happens when cutting-edge network technology meets the rugged frontlines of wildlife conservation? In this episode, I sat down with Sophie Maxwell, the driving force behind the Connected Conservation Foundation, to understand how digital infrastructure and real-time data are changing the odds for endangered species and l…
  continue reading
 
Talking wireless at Cisco Live brings you face to face with what tomorrow’s connectivity looks like, and my recent chat with Matt McPherson, Enterprise Wireless CTO at Cisco, and Jerome Henry, standards guru and author, did precisely that. When two people this deep in the trenches start describing how our networks cope with thousands of devices at …
  continue reading
 
What does it take to future-proof the modern workplace? In this episode, I speak with Thomas Rowley, Chief Technologist for Networking and Connectivity at Softcat, about the real-world challenges of managing a high-density office and how the company turned to Cisco to create a more intelligent, responsive environment. As more employees returned to …
  continue reading
 
Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
Space-based satellite networks are transforming global connectivity, extending access to even the most remote corners of the planet. The rules that govern these networks have never been more critical. How does satellite spectrum actually function? Why is there an increasing need to revise the regulations that oversee it? And what are the key compon…
  continue reading
 
As AI continues to dominate the conversation at Cisco Live, the infrastructure needed to support this transformation often gets overshadowed. That’s why I was eager to visit the Panduit booth and explore the physical backbone enabling the shift from cloud to on-prem. I sat down with several Panduit experts including Renee Lang, Mason Khan, Vince, a…
  continue reading
 
Are you aware of the hidden risks lurking in your organization’s browser extensions? Nearly every enterprise user has at least one extension installed—and over half of those extensions request powerful permissions that can expose cookies, passwords, and sensitive data. In this video, we introduce ExtensionPedia, LayerX’s free, publicly available Br…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play