There's a lot on the line for developers. Writing clean code, tracking down and removing bugs, AND shipping features to millions of customers? It's a lot—and devs are people too! The Dev Morning Show (At Night) shares the human side of software development with interviews that start lighthearted but get to the heart of what it takes to perform in the delightfully weird world of software. Join us on the journey!
…
continue reading
Interviews with developers and API technology leaders. Hosted by Sagar Batchu, CEO of Speakeasy. speakeasy.com
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading

1
Multimodal automation, API democratization, and the evolution of tool calling | Sinan Eren (CEO & co-founder Opnova)
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55I sat down with Sinan Eren, co-founder and CEO of Opnova. Opnova is building AI-powered automation for enterprises—specifically targeting companies that rely on legacy systems and lack modern APIs. We talked about how automation can thrive even in systems that don't have APIs and discussed the challenges and opportunities of automating workflows in…
…
continue reading

1
Anthropic MCP, GraphQL vs REST, and API strategies for LLM dev tools | Ken Rose (CTO & co-founder OpsLevel)
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10Ken Rose is the CTO and co-founder of OpsLevel. Ken shares the founding journey of OpsLevel and lessons from his time at PagerDuty and Shopify. We debate GraphQL vs REST, API metrics that matter, and how LLMs and agentic workflows could reshape developer productivity. Listen On Apple Podcasts | Spotify Subscribe to Request // Response If you enjoye…
…
continue reading

1
API design ergonomics, coding on airplanes, and the true signal of good DevEx | Robert Ross (CEO FireHydrant)
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Robert Ross (@BobbyTables) is the CEO of FireHydrant. We discuss the journey of building FireHydrant, the evolution of API design, and the impact of gRPC and REST on developer experience. We also talked about the role of LLMs in API design, the shift towards data consumption trends in enterprises, and how great developer experience is measured by a…
…
continue reading

1
Separating deployment from release, API-first development, and the future of developer experience | John Kodumal (co-founder & fmr CTO LaunchDarkly)
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04On the first episode of Request // Response, I speak with John Kodumal, co-founder and former CTO of LaunchDarkly. We discussed how LaunchDarkly used feature flags to separate deployment from release, offering fine-grained control for safer rollouts and experimentation. LaunchDarkly was an early adopter of server-sent events, and was a pioneer of t…
…
continue reading

1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading

1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
Play later
Play later
Lists
Like
Liked
1:13:10Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading

1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading

1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading

1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
Play later
Play later
Lists
Like
Liked
1:13:00CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading

1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading

1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
Play later
Play later
Lists
Like
Liked
1:16:01iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading

1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading

1
TWiET 565: Cheebert's MDM Dreams - Adobe's Content Credentials, programmable MDM with Fleet
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security. Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose …
…
continue reading

1
TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta
1:10:40
1:10:40
Play later
Play later
Lists
Like
Liked
1:10:40This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta. News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allow…
…
continue reading

1
TWiET 563: Don't Drop Your File Drawers - SASE in the Enterprise, document archiving & file management
1:06:09
1:06:09
Play later
Play later
Lists
Like
Liked
1:06:09This episode of This Week in Enterprise Tech covers the convergence of networking and security with the emergence of SASE (secure access service edge), tips for navigating the document and file management landscape, and more enterprise tech stories. A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day DHS Calls Into Questi…
…
continue reading

1
TWiET 562: Who Woulda Thunk Splunk? - Cisco to aquire Splunk, Intel's new neural processors
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36This episode of This Week in Enterprise Tech packs in analysis on Cisco's shocking $25 billion acquisition of Splunk and what it means for the cybersecurity ecosystem. Plus, Intel VP of Sales & Marketing Jason Kimrey joins to decode the company's groundbreaking new neural processors and innovations in chip design, and accelerating AI processing at …
…
continue reading

1
TWiET 561: That Cloud Looks Like A Llama - Moving on from old protocols, accessible machine learning with Predibase
1:14:14
1:14:14
Play later
Play later
Lists
Like
Liked
1:14:14This week on TWiET, Lou Maresca, Brian Chee, and Curt Franklin talk with Dev Rishi, Co-Founder and CEO at Predibase, discussing the hurdles of moving large language models into production environments and how privacy concerns factor into that decision. Guest Dev Rishi of Predibase explains why many organizations say they can't use commercial LLMs, …
…
continue reading

1
TWiET 560: Vishing for compliments - Out-of-Band Management, Voice Network Security w/ Mutare
1:10:01
1:10:01
Play later
Play later
Lists
Like
Liked
1:10:01On This Week in Enterprise Tech, Lou Maresca, Brian Chee, and Curtis Franklin dive into how the SEC's proposed cybersecurity rules could reshape how corporations handle disclosures and risk management. Guest Brian McDonald from Mutare also shares insights on securing voice communications against rising cyber threats. Plus Brian Chee explains out-of…
…
continue reading

1
TWiET 559: Salesforcing AI - ISPs want Big Tech to fund broadband construction, AI for CRM with Salesforce
1:04:00
1:04:00
Play later
Play later
Lists
Like
Liked
1:04:00UK's Online Safety Bill compromises end-to-end encryption and could result in systemic security risks Cybercriminal gangs are trafficing cybercrime workers Pros and Cons of JAVA programing AirBnb accounts hacked using stealers malware and stolen cookies Should Big Tech firms help pay for broadband contruction? Ketan Karkhanis, executive vice presid…
…
continue reading

1
TWiET 558: You Got Your AI In My Enterprise - 2023 Black Hat and DefCon report, AI data analytics with Virtualitics
1:08:45
1:08:45
Play later
Play later
Lists
Like
Liked
1:08:45This week on This Week in Enterprise Tech, host Lou Maresca and co-hosts Curt Franklin and Brian Chee explore the key takeaways from the 2023 Black Hat and DEF CON cybersecurity conferences. They discuss the proliferation of AI, especially in relation to security. Guest Michael Amori, CEO of Virtualitics, talks about how AI is impacting data analyt…
…
continue reading

1
TWiET 557: How Lucid Are Your Collaboration Tools? - ChatGPT copyright issues, visual collaboration with Lucid Software
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37This episode of This Week in Enterprise Tech discusses the latest issues around AI, including legal implications, security concerns, and practical applications. Lucid Software Chief Product Officer Dan Lawyer joins hosts Curt Franklin, Brian Chee, and Oliver Rist to explain how Lucid's visual collaboration tools aim to improve teamwork through inte…
…
continue reading

1
TWiET 556: Smart SaaS - Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo
1:06:34
1:06:34
Play later
Play later
Lists
Like
Liked
1:06:34Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo, and more. How fame-seeking teenagers hacked some of the world's biggest targets Innocent pregnant woman jailed amid faulty facial recognition trend XWorm, Remcos RAT evade EDRs to infect critical infrastructure Homage to Lahaina Author discovers AI-generated counterfeit…
…
continue reading

1
TWiET 555: AR and VR Grow Up Into XR - White House's National Cyber Workforce Strategy, Spatial Computing with IQXR
1:12:23
1:12:23
Play later
Play later
Lists
Like
Liked
1:12:23Researchers strengthen defenses against denial-of-service attack Cult of the Dead Cow Hacktivists Give Life to 'Privacy-First' App Framework Photoshop can now use generative AI to expand images Text prompts for AI are also available in over 100 languages. US military battling cyber threats from within and without White House Cyber Workforce Strateg…
…
continue reading

1
TWiET 554: Is AI The Next Spell Checker? - SEC wants cybersecurity experts in corporations, Erudit: AI for workplace wellbeing
1:15:11
1:15:11
Play later
Play later
Lists
Like
Liked
1:15:11Cloudflare Radar's new BGP origin hijack detection system TSA Updates Pipeline Cybersecurity Requirements AT&T and Verizon's ancient lead cables have US lawmakers demanding action EFF: FBI Seizure of Mastodon Server Data is a Wakeup Call to Fediverse Users and Hosts to Protect their Users Companies Must Have Corporate Cybersecurity Experts, SEC Say…
…
continue reading

1
TWiET 553: The Holy Grail of SaaS Security - The White House's Cybersecurity Label, SaaS Security with DoControl
1:02:18
1:02:18
Play later
Play later
Lists
Like
Liked
1:02:18Rootkit Attack Detections Increase at UAE Businesses White House, Big Tech Ink Commitments to Secure AI Firmware vulnerabilities in millions of computers could give hackers superuser status The Biden administration is tackling smart devices with a new cybersecurity label Adam Gavish, CEO and Co-Founder of DoControl talks about how you and your orga…
…
continue reading

1
TWiET 552: Keyless is the Key - White House National Cybersecurity Strategy, digital identity management with Veridas
1:14:57
1:14:57
Play later
Play later
Lists
Like
Liked
1:14:57AWS Lambda proactively warms things up WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses DirectorStorage on Windows now works for consumers and games White House Fills in Details of National Cybersecurity Strategy Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills According to Bugcrowd Survey Alfonso Santos …
…
continue reading

1
TWiET 551: Humans -The Problem in IT - Verizon's 2023 Data Breach Report, Data Security with Sentra
1:04:19
1:04:19
Play later
Play later
Lists
Like
Liked
1:04:19336,000 servers remain unpatched against critical Fortigate vulnerability Patchless Cisco flaw breaks cloud encryption for ACI traffic Google changed its privacy policy to reflect Bard AI's data collecting Top 10 cybersecurity findings from Verizon's 2023 data breach report Ron Reiter, Co-Founder and CTO of Sentra talks data security and improving …
…
continue reading

1
TWiET 550: Shine a Light on Dark Data - Minimizing Dark Data Risk, Advanced ERP systems with Oracle NetSuite
1:06:52
1:06:52
Play later
Play later
Lists
Like
Liked
1:06:52TSMC confirms data breach after LockBit cyberattack on third-party supplier Red Hat Says "Bye Bye CentOS" Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign ChatGPT's Still a Baby and It's Already Getting Sued Minimizing Dark Data Risk Ranga Bodla, Vice President of Field Engagement and Marketing at Oracle NetSuite talks a…
…
continue reading

1
TWiET 549: Aerospike's Real-Time Data Platform - Power meter vulnerabilities, USB drive spyware, Processing Real-Time Data with Aerospike
1:08:27
1:08:27
Play later
Play later
Lists
Like
Liked
1:08:27AWS launches $100M program to fund generative AI initiatives Smaller firms aim to consolidate security tools Schneider power meter vulnerability opens door to power outages Satellite-based laser communication: A rival to fibre networks? USB drives spread spyware as China's Mustang Panda APT goes global Lenley Hensarling, Chief Product Officer of Ae…
…
continue reading

1
TWiET 548: Encrypted Christmas Ornaments - Global Hack, AI-Generated Art, Todd Johnson
1:11:33
1:11:33
Play later
Play later
Lists
Like
Liked
1:11:33Chinese spies breached hundreds of public, private networks, security firm says Millions of Americans' personal data exposed in global hack Nature bans AI-generated art from its 153-year-old science journal Shady Chinese firm's encryption chips got inside the US Navy, NATO, and NASA Use of Multifactor Authentication (MFA) nearly doubles since 2020,…
…
continue reading

1
TWiET 547: DROOLCON 5 - Avoiding cybersecurity worker burnout, Hybrid Cloud solutions with IBM Cloud
1:11:38
1:11:38
Play later
Play later
Lists
Like
Liked
1:11:38Google to crack down on office attendance, asks remote workers to reconsider CIOp gang sat on exploit for MOVEit flaw for nearly 2 years Hawaii's Kilauea volcano erupts... again.. and again... U.S. Congress to consider two new bills on artificial intelligence Ways to help cybersecurity's essential workers avoid burnout Jason McGee, GM and CTO of IB…
…
continue reading

1
TWiET 546: The ChatGPT Balancing Act - AI Challenges, human fallibility, maintaining data agility with Talend
1:13:58
1:13:58
Play later
Play later
Lists
Like
Liked
1:13:58AI challenges, addressing human fallibility, maintaining data agility with Talend, and more. Triangulation Spyware hits iPhones Jetpack WordPress plug-in API bug triggers mass updates Lawyer cited 6 fake cases made up by ChatGPT; judge calls it "unprecedented" Team sets new speed record for industry-standard optical fiber Using IR spectroscopy for …
…
continue reading

1
TWiET 545: AI FUD - China-backed cyber attacks, AI's impact on cybersecurity with ManageEngine
1:11:08
1:11:08
Play later
Play later
Lists
Like
Liked
1:11:08China-Backed cyber attacks, AI automation a savior or job-stealer? AI's impact on cybersecurity with ManageEngine, and more. How three US teenagers built Mirai, a DDoS botnet that exploited IoT devices, and avoided prison by helping the FBI with cybercrime and cybersecurity matters. Volt Typhoon' breaks fresh ground for China-backed cyber campaigns…
…
continue reading

1
TWiET 544: Polly Wants Self-Sovereign Identity - Improving Incident Response w/ Security Testing, Taking Control of Your Digital Identity w/ Indicio
1:11:21
1:11:21
Play later
Play later
Lists
Like
Liked
1:11:21KeePass Vulnerability Imperils Master Passwords 3 Common Initial Attack Vectors Account for Most Ransomware Campaigns Montana becomes 1st state to ban TikTok Rapid prototyping for the years to come Sit and Surf: High-tech benches bridge digital divide 5 ways security testing can aid incident response Heather Dahl, CEO of Indicio talks about taking …
…
continue reading

1
TWiET 543: Bare Metal Mojo - Chatbots taking your Drive-Through order, Bringing the Mojo Platform to MLB.
1:12:12
1:12:12
Play later
Play later
Lists
Like
Liked
1:12:12Google expands TensorFlow open-source tooling for accelerated machine learning development CISA addresses 'Cyber Poor' small biz, local government Wendy's drive-through orders to be taken by a chatbot The future of real-world evidence and data analytics - self-service mode Ex-Ubiquiti engineer behind "breathtaking" data theft gets 6-year prison ter…
…
continue reading

1
TWiET 542: Technology is Easy, People are Hard - Are Passkeys the solution to passwords? Security awareness with Terranova Security
1:05:01
1:05:01
Play later
Play later
Lists
Like
Liked
1:05:01Data leakage is becoming a bigger issue for chipmakers. New White House AI initiatives include AI software-vetting event at DEF CON Hotels at risk from bug in Oracle property management software Fresh GDPR ruling says even 'minor anxiety' could mean payouts for EU folks Do Passkeys fix the problems with passwords? Lise Lapointe of Terranova Securit…
…
continue reading

1
TWiET 541: A Spreadsheet For Tracking Your Spreadsheets - NSA: Buckle Up for Generative AI, Supercharge Spreadsheets with Coherent
1:08:16
1:08:16
Play later
Play later
Lists
Like
Liked
1:08:16NSA Cybersecurity Director Says 'Buckle Up' for Generative AI As sea levels rise, the East Coast is also sinking Russian Bank Releases a ChatGPT Rival Google's New Cloud-Based Authentication Isn't End-to-End Encrypted Yet The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say High-Severity SLP Flaw Can Amplify DDoS Attacks up t…
…
continue reading

1
TWiET 540: Checks Without Borders - Consumers fed up with passwords, protecting data with Protegrity
1:12:17
1:12:17
Play later
Play later
Lists
Like
Liked
1:12:17iOS 17 to support app sideloading to comply with European regulations GhostToken opens Google accounts to permanent infection Over half of the enterprise routers researchers bought secondhand hadn't been wiped IT companions instead of managers Consumers are fed up with passwords, according to 1Password research Paul Mountford, CEO of Protegrity, ta…
…
continue reading

1
TWiET 539: .001% Trust - Properly terminating employee accounts, implementing zero-trust with Ericom
1:10:13
1:10:13
Play later
Play later
Lists
Like
Liked
1:10:13Over 1 million WordPress sites were infected by Balada injector malware campaign Western Digital Hackers Demand 8-Figure Ransom Payment for Data NY Senator Chuck Schumer calls for bipartisan legislation to slow down AI Hackers flood NPM with bogus packages causing a DoS attack Almost half of former employees say their passwords still work Dr. Chase…
…
continue reading

1
TWiET 538: Paving the Mobile Security Potholes - Designing effective Tabletop exercises, secure and trustworthy IoT with Kigen
1:10:26
1:10:26
Play later
Play later
Lists
Like
Liked
1:10:26Amazon Web Services and Microsoft Azure face antitrust probe. Cybercriminals 'CAN' steal your car, using novel IoT hack Romance Scams: Authorities claw back funds from "Pig-butchering" cybercrime ring EU Chips act likely to get the green light on April 18 Designing Tabletop exercises that actually thwart attacks Vincent Korstanje, CEO of Kigen, tal…
…
continue reading

1
TWiET 537: Day of the Dongle - The future of AI in the Enterprise, building trust and fighting fraud in the Metaverse
1:14:09
1:14:09
Play later
Play later
Lists
Like
Liked
1:14:09Cylance Ransomware strain emerges. BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist Bitwarden Announces Secrets Management With a Combination of Open Source, End-to-End Encryption, and Ease of Use Leaked IT contractor files detail the Kremlin's stockpile of cyber-weapons GPT and Enterprise Impact - Edge Tech, Services, and Soft…
…
continue reading

1
TWiET 536: You Break It You WhatFix It - Malicious ChatGPT extentions, Exploding USB Drives, Digital Adoption Platforms
1:07:26
1:07:26
Play later
Play later
Lists
Like
Liked
1:07:26Hackers drain bitcoin ATMs of $1.5 million by exploiting a 0-day bug Malicious ChatGPT Extensions Add to Google Chrome Woes Journalists Targeted by USB Drives That Explode When Inserted Into PCs Stanford sends 'hallucinating' Alpaca AI model out to pasture over safety, cost Attackers Are Probing for Zero-Day Vulnerabilities in Edge Infrastructure P…
…
continue reading

1
TWiET 535: Clouds Materialize - PayPal Data Breach, Copyright of AI Content, Streaming Databases With Materialize
1:18:12
1:18:12
Play later
Play later
Lists
Like
Liked
1:18:12PayPal data breach, copyright of AI content, streaming databases with Materialize, and more. PayPal data breach exposes personal information of 35,000 users Low-budget 'Winter Vivern' APT awakens after 2-Year hibernation Moon-gate: Samsung fans are mad about AI-processed photos of the moon Making deepfakes gets cheaper and easier thanks to AI Autho…
…
continue reading

1
TWiET 534: Never Cross The Shards - Malware that survives firmware updates, Biden FCC nominee withdraws, database scalability with PlanetScale
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:47Malware infecting widely used security appliance survives firmware updates IceFire Ransomware Portends a Broader Shift From Windows to Linux Thousands scammed by AI voices mimicking loved ones in emergencies Personal details of U.S. House members exposed in health data breach Biden FCC nominee withdraws, blaming cable lobby and "unlimited dark mone…
…
continue reading

1
Finale: Coolest Tech, Memorable Guest Quotes, and Funny Moments with Cassidy & Zach
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23It’s the finale episode of The Dev Morning Show (At Night)! We’re finishing out the season by looking back at the coolest old tech we saw, most memorable guest quotes, and funny moments that you may not have seen before! ------------------- Episode Timestamps: (01:04): Cassidy and Zach discuss their favorite part of The Dev Morning Show (At Night) …
…
continue reading

1
TWiET 533: Quantifiable Risk - Storing the world's music collection on quartz wafers, implementing DevSecOps
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist CISA, MITRE Look to Take ATT&CK Framework Out of the Weeds Meta unveils a new large language model that can run on a single GPU BlackLotus bootkit bypasses UEFI Secure Boot on patched Windows 11 Microsoft to Store World's Music Collection on Quartz Wafers Andre Keart…
…
continue reading

1
The Willingness to Try Something Different with Munnawar Hashim, Developer Advocate at LaunchDarkly
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18This episode features an interview with Munnawar Hashim, a Developer Advocate at LaunchDarkly. Munnawar joined the dev community in 2020 after a successful career as an English language teacher. He is passionate about diversity, comedy, and exploring integrations and plug-ins. In this episode, Cassidy and Zach sit down with Munnawar to discuss step…
…
continue reading

1
TWiET 532: Render Time Is Money - Nvidia's $10K AI chip, auth management, observability with Catchpoint
1:13:40
1:13:40
Play later
Play later
Lists
Like
Liked
1:13:40Nvidia's $10K AI chip, authentication management, monitoring & observability with Catchpoint, and more. Voicemod tools up with $14.5M to ride the generative AI (sonic)boom 'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover The big reuse: 25 MWh of ex-car batteries go on the grid in California Meet the $10,000 Nvidia chip power…
…
continue reading

1
Avoiding the Hype Train with Suz Hinton, Senior Software Engineer at CrowdStrike
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47This episode features an interview with Suz Hinton, Senior Software Engineer at CrowdStrike, where she develops advanced threat hunting technologies. Suz has been in the industry for over 15 years holding positions at Microsoft, Stripe, and Kickstarter. She’s also an advocate for accessibility, privacy, security, and prioritizing the user experienc…
…
continue reading

1
TWiET 531: How Akamai Are You About DDoS? - Hospitals violate HIPAA because of Meta Ad-tracking, the evolution of DDoS
1:07:56
1:07:56
Play later
Play later
Lists
Like
Liked
1:07:56Health info for 1 million patients stolen using critical GoAnywhere vulnerability ESXi Ransomware Update Outfoxes CISA Recovery Script Comcast gave false map data to FCC—and didn't admit it until Ars got involved Atlassian and Envoy briefly blame each other for the data breach Hospitals Sued for Using Meta's Ad-Tracking Code, Violating HIPAA Steve …
…
continue reading