show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
From autonomous robots to advancements in healthcare, edge AI and computer vision are driving innovations across every market vertical. On “insight.tech Talk,” we chat with industry thought leaders about the impact of the latest technologies, such as Gen AI, software-defined everything, and 5G. Join the conversation with #InsightDotTechTalk.
  continue reading
 
Artwork

1
Crucible Moments

Sequoia Capital

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the inflection points that shaped some of the most significant companies of our time. Crucible moments are pivotal decisions that determine your trajectory. In Season 2, hear from founders and leaders like Steve Chen of YouTube, Drew Houston of Dropbox, Frank Slootman of ServiceNow and Tony Xu of DoorDash, Steve Huffman of Reddit and more about how they navigated the challenges and opportunities that defined their stories. Hosted by Roelof Botha of Sequoia Capital. The conten ...
  continue reading
 
If Between Two Ferns and C-SPAN had a child, it would be All Quiet on the Second Front. Blending the very best (and the worst) of government gravitas with technical expertise, Second Front’s Chief Executive Officer, Tyler Sweatt, cuts through the noise and the bureaucratic BS surrounding all things defense tech, national security, and government markets. Be warned: this is not your typical military or government podcast. As host, Tyler has an uncanny ability to get people to talk honestly, m ...
  continue reading
 
Artwork

1
A mile in a CTO s shoes

Amaury KHELIFI

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to “A mile in a CTO's shoes” the podcast for non-technical founders, who want to understand how to deal with software developers. We talk about productivity, entrepreneurship, Tech ,webmarketing & lifestyle.
  continue reading
 
Welcome to Our Connected World, a podcast series from TE Connectivity, featuring straight talk for engineers about today’s technology trends and the technical challenges in driving innovations crucial to making the world safer, sustainable, productive, and connected.
  continue reading
 
Loading …
show series
 
What if you could craft Super Nintendo ROMs using the power of C#? In this episode, Scott Hanselman dives into the world of retro game development with Matthew Shapiro, the creator of DotnetSnes—a tool that enables developers to build SNES games with modern .NET technology. They explore how the project works, the challenges of programming for class…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
Whitney and Coté talk with Robert Reeves about startups, catering, the Austin's tech scene, and the business of open source over the past 20 years. A sampling: Robert share some stories of early startup adventures and strategic moves, behind the scenes catering rock festivals, and the importance of geography for starting your career in tech. Check …
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The issue of software support for open-source is a long and storied one. Scott sits down with open-source advocate Hayden Barnes about how paid support and custom builds of older open-source software is a business opportunity for herodevs. Should you upgrade and migrate to the latest build? Or should you get paid never ending support?…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
What can agentic AI do for you? Richard talks to Tim Warner about his work utilizing next generation agentic AI technologies to help with sysadmin tasks. Tim talks about the early lead that Cursor AI took with AI agents capable of writing and executing scripts on your behalf - as opposed to just creating code you can cut-and-paste. Today, GitHub Co…
  continue reading
 
In this episode of All Quiet on the Second Front, Tyler sits down with Cameron McCord, CEO and co-founder of Nominal, to talk about why testing & evaluation is finally getting its moment in the spotlight—and why that matters more than you think. From time at Anduril and Lux Capital to launching Nominal, Cam shares a candid look at the bottlenecks s…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
Scott sits down with Jen Looper, educator, developer, and author of Computer Science for Kids. Together, they dive into the importance of introducing young minds to coding early and making computer science accessible for all. Jen shares insights from her book, discusses the evolving landscape of tech education, and highlights creative ways to inspi…
  continue reading
 
Whitney and Coté tour through a couple decades of tech infrastructure history with Melissa Smolensky, whose marketing career spans Rackspace, GitLab, CoreOS, and the CNCF, among other places. They explore the OpenStack/Kubernetes evolution, how "radical transparency" actually functions in corporate settings, and the shifting landscape of tech marke…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
Are some of your team members starting to hate PowerShell? Richard talks to Barbara Forbes about her experiences with teams frustrated by PowerShell. Barbara talks about overcomplicating PowerShell scripts—the kind the most senior folks can create but no one else can maintain. Eventually, nobody will want to touch those scripts. Then there is the q…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
  continue reading
 
In this episode of Hanselminutes, host Scott Hanselman sits down with Amini's Kate Kallot to explore the transformative potential of AI-driven data infrastructure in the Global South. As the founder of Amini, Kallot shares insights into how artificial intelligence can bridge critical data gaps, drive sustainable development, and empower communities…
  continue reading
 
In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid …
  continue reading
 
This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
  continue reading
 
How can Security Copilot help you secure your applications? Richard talks to Ari Schorr about assessing application risk with Microsoft Security Copilot - a new feature in preview in Security Copilot that focuses on application roles and entities. Ari talks about the sheer array of resources that applications depend on, and the many security risks …
  continue reading
 
On this episode of All Quiet on the Second Front, TJ Rowe (2F CRO) sits down with Samuel (Sammy) Semwangu, CEO of Bazze—a company redefining how commercial data is delivered into the national security enterprise. Sammy shares his journey from special operations to Silicon Valley, the tough lessons learned building in defense tech, and how Bazze evo…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
  continue reading
 
In this insightful episode of Hanselminutes, host Scott Hanselman sits down with Anne-Laure Le Cunff, the brilliant mind behind Tiny Experiments. Together, they explore the transformative power of small, manageable experiments in fostering creativity, personal growth, and meaningful change. Anne-Laure shares how her background in neuroscience and h…
  continue reading
 
Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
  continue reading
 
In this episode, Whitney and Coté talk with Emily Omier, a consultant specializing in open source strategy and product management for businesses. They discuss the initial reactions and learning curve of new tech entrants to open source, the advantages and potential disadvantages of building a business around open-source software, and the ethical co…
  continue reading
 
Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
  continue reading
 
What can GitHub Copilot do for SysAdmins in 2025? Richard talks to Jessica Deen from GitHub about her experiences using Copilot for her work. Jessica talks about Copilot being the first stop for most tasks - describing the task to Copilot helps you think through the problem, and often the tool can generate code or information to get that task done …
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
Justin serves as Head of Product at Sidero Labs. His career includes contributions to Oscar-winning films, the Disney+ streaming platform, and Amazon EKS. In his free time, Justin enjoys building modern-retro computers and watching Moana. He is the co-host of the FAFO.FM podcast with Autumn Nash. In this Episode he talks to Scott about his love for…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
  continue reading
 
How do you write better PowerShell? Richard talks to Jeff Hicks about his latest book, Behind the PowerShell Pipeline, and his efforts to promote writing PowerShell scripts that are easy to understand, use, and maintain! Jeff talks about how making a script work is not enough anymore - you can use GitHub Copilot. The goal is to make the output as u…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play