The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Audio files of our weekly radio show on WDBO where we talk about your electronic life. Help and advice are given on a range of technical issues from computers to everything internet-related.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Adam Pearce and Adam Wignall from Strawberry7 are here to bring you the latest updates about everything that’s happening around Google Workspace. This podcast is also available in video form on our YouTube channel - youtube.com/strawberry7
…
continue reading
We Cover the Cyberspace.
…
continue reading
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is a Principal Engineer at Microsoft in the Azure Compute group, working on strategic initiatives for datacenter deployment.
…
continue reading
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. Each episode covers various topics, from technology updates to marketing strategies, business best practices, and interviews with industry experts.
…
continue reading
Let's Talk Tech
…
continue reading
Hosted by Rick from DALY Computers (www.daly.com), the Technology Pulse podcast takes a look at new and existing technologies that will benefit the SLED (state/local government, education) sector in Maryland and Virginia. Episodes will feature guests from innovative product/service providers, the DALY team, and strategic partners.
…
continue reading
1
Cyber Security Today, April 19, 2024 - Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more
4:46
4:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:46
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and moreبقلم Howard Solomon
…
continue reading
1
Near Protocol: 'Blockchains Cannot Scale Without Sharding!' - Illia Polosukhin & Alex Skidanov
1:45:33
1:45:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:45:33
The initial scaling roadmap for Ethereum featured execution layer sharding. However, the rapid advancements of layer 2 scaling solutions in general, and zero knowledge proofs in particular, caused a restructuring of the original plan. The reason was that rollups would have required less changes made to Ethereum’s base layer, hence lower risks. On t…
…
continue reading
1
Ransomware attack turns legal attack.
39:41
39:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:41
A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurit…
…
continue reading
1
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland... - SWN #383
35:15
35:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:15
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-383
…
continue reading
1
HN732: Juniper’s PTX Platforms: 800GE and Double-Density 400GE for DC and WAN (Sponsored)
39:23
39:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:23
The future has arrived: 800 gig Ethernet is here. Amit Bhardwaj and Dmitry Shokarev from today’s sponsor, Juniper Networks, join the show to tell us all about Juniper’s 800 gig Ethernet and what we need to know as engineers: use cases, transition plans, fiber and power needs (a lot less than you’d think). We also... Read more »…
…
continue reading
1
Cyber Security Today, May 3, 2024 - North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches
8:07
8:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:07
This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure, and moreبقلم Howard Solomon
…
continue reading
1
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
1:57:07
1:57:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:57:07
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
…
continue reading
1
127. Mic Drop: NSC’s Neuberger on mitigating cyber attacks: ‘We should be using an operational approach’
13:42
13:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:42
The White House’s top cyber official is keen to set minimum cybersecurity standards for industry, put contingencies in place in case cyberattacks are successful, and start looping ordinary people into an effort to make products secure by design.بقلم Recorded Future News
…
continue reading
1
Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean ...
22:27
22:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:27
Unveiling the Origin Story In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity …
…
continue reading
1
SE Radio 614: Wouter Groeneveld on Creative Problem Solving for Software Development
51:10
51:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
51:10
Wouter Groeneveld, author of The Creative Programmer and PhD researcher at KU Leuven, discusses his research related to programming education with host Jeremy Jung. Topics include evaluating projects, constraints, social debt in teams, common fallacies in critical thinking, maintaining flow state, documenting and retaining knowledge, and creating e…
…
continue reading
1
Network Security News Summary for Friday May 03th, 2024
5:34
5:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:34
Scans for Stupid Router Vuln; npm xml-crypt Vuln; Cuddlefish; ArubaOS Vuln; https://isc.sans.edu/diary/Scans%20Probing%20for%20LB-Link%20and%20Vinga%20WR-AC1200%20routers%20CVE-2023-24796/30890 Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796 Buffer Overflow Vulnerabilities in ArubaOS https://www.arubanetworks.com/support-servic…
…
continue reading
1
Kicking Off With Crypto - PSW #827
3:04:10
3:04:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:04:10
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
…
continue reading
1
Kicking Off With Crypto - PSW #827
3:04:10
3:04:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:04:10
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
…
continue reading
1
New Podcast | On Cyber & AI | The why, the how, and the vision behind Christina Stokes's New Podcast | A Conversation With Host Christina Stokes | Audio Signals Podcasts With Marco Ciappelli
34:30
34:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:30
Guest: Christina Stokes, Host, On Cyber & AI Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www.itspmagazin…
…
continue reading
1
Dropbox sign breach exposes secrets.
40:39
40:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:39
Dropbox’s secure signature service suffers a breach. CISA is set to announce a voluntary pledge toward enhanced security. Five Eyes partners issue security recommendations for critical infrastructure. Microsoft acknowledges VPN issues after recent security updates. LockBit releases data from a hospital in France. One of REvil’s leaders gets 14 year…
…
continue reading
1
Easily Answer the Questions Fundamental to a Modern Organization’s Security and Resilience | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Mitiga Story with Ariel ...
7:04
7:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:04
Today organizations have a large part of their environment outside of their control. They have authentication, email, data, code—some organizations have the majority of their most important assets in cloud and SaaS applications. And yet the security team does not have effective tooling to investigate across this surface. So when a complex breach un…
…
continue reading
As part of our ongoing series on IPv6 basics, today we cover the differences you should be aware of between ICMPv4 and ICMPv6. Internet Control Message Protocol (ICMP) is the protocol that lets you test reachability: Pings, echoes, TCP connections, etc. We explain what you need to know and why you need to know it,... Read more »…
…
continue reading
1
The Evolution to Highly Reliable, Highly Performant Workload IAM | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | An Aembit Story with Apurva Davé
7:04
7:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:04
Aembit is the first Workload Identity and Access Management Platform. It discovers, enforces, and audits workload access. By using native identities and short-lived credentials, we eliminate the need for secrets scanning and credential rotation. We let your teams focus on building your software, without worrying about sharing API keys or misusing v…
…
continue reading
1
Predictive Risk, Data Integrity and the Role of Large Language Models in Cybersecurity | An RSA Conference 2024 Conversation With Edna Conway and Andrea Little Limbago | On Location Coverage with Sean ...
1:39
1:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:39
Guests: Edna Conway, CEO, EMC ADVISORS On LinkedIn | https://www.linkedin.com/in/ednaconway On Twitter | https://twitter.com/Edna_Conway At RSAC | https://www.rsaconference.com/experts/edna-conway Andrea Little Limbago, Senior Vice President, Research & Analysis, Interos On LinkedIn | https://www.linkedin.com/in/andrea-little-limbago/ At RSAC | htt…
…
continue reading
1
Silent Tech: Exploring Advanced AI Noise Suppression
41:43
41:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:43
On this episode of Embedded Insiders, Alexander Kain, Skyworks Solutions’ Senior Principal Artificial Intelligence Systems Engineer joins the podcast to discuss his company’s advanced AI noise suppression, designed to reduce noise in a variety of environments and applications. Next, Rich and Vin are back with another Dev Talk joined by Ron Konezny,…
…
continue reading
1
The Five Most Dangerous New Attack Techniques You Need to Know About | An RSA Conference 2024 Conversation With Ed Skoudis, Heather Mahalik Barnhart, and Johannes Ullrich | On Location Coverage with Sean ...
29:30
29:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:30
Guests: Ed Skoudis, President at SANS Technology Institute [@SANS_EDU] On LinkedIn | https://www.linkedin.com/in/edskoudis/ At RSAC | https://www.rsaconference.com/experts/ed-skoudis Heather Mahalik Barnhart, Faculty Fellow & DFIR Curriculum Lead at SANS, Sr Dir of Community Engagement at Cellebrite [@Cellebrite] On LinkedIn | https://www.linkedin.…
…
continue reading
1
Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape
37:10
37:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:10
Host Paul Roberts speaks with Jim Broome, the CTO and President of MSSP DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSP). The post Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape …
…
continue reading
1
Unveiling the Future of Cybersecurity From A Venture Capital Investors as we approach the beginning of RSA Conference 2024 | An RSA Conference 2024 Conversation With Dave DeWalt | On Location Coverage ...
34:54
34:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:54
Guest: Dave DeWalt, Founder & CEO, NightDragon [@nightdragon] On LinkedIn | https://www.linkedin.com/in/ddewalt/ At RSAC | https://www.rsaconference.com/experts/dave-dewalt ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | htt…
…
continue reading
1
626 Kaseya Connect & Troubleshooting Wi-Fi
27:44
27:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:44
The show begins with a commercial for the NetAlly EtherScope NXG, a network analyzer that supports Wi-Fi 6 and 6E. Uncle Marv then introduces the episode, mentioning that he has exclusive news to share. However, he quickly realizes that the news he had - Kaseya's announcement of their new Kaseya 365 subscription service - had already been announced…
…
continue reading
Sean Lardo, the program manager for Pitch It, shares that this year's application process saw a record number of submissions, with a diverse group of vendors applying from various business sectors. While there were concerns about an influx of AI-focused applicants, Lardo notes that the program still attracted a healthy mix of solutions, with AI, cy…
…
continue reading
1
The closed loop conundrum, default passwords, and Baby Reindeer
54:03
54:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
54:03
The UK Government takes aim at IoT devices shipping with weak or default passwords, a man spends two years incarcerated after being mistaken for the person who stole his identity, and are you au fait with the latest scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham C…
…
continue reading
1
Network Security News Summary for Thursday May 02th, 2024
6:51
6:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:51
Linux Trojan; Denial of Wallet Attack; EU iOS Appstore User Tracking; BentoML Vuln; Linux Trojan - Xorddos with Filename eyshcjdmzg https://isc.sans.edu/diary/Linux%20Trojan%20-%20Xorddos%20with%20Filename%20eyshcjdmzg/30880 AWS S3 Denial of Wallet Amplification Attack https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bil…
…
continue reading
1
Deception Is on the Rise, But Is It Time to Unleash Engagement Operations? | An RSA Conference 2024 Conversation With Ondrej Nekovar and Jan Pohl | On Location Coverage with Sean Martin and Marco Ciappelli ...
23:46
23:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:46
Guests: Ondrej Nekovar, Director of Cyber Security, Board Member, SPCSS s.p. [@csirtspcss] On LinkedIn | https://www.linkedin.com/in/onekovar/ At RSAC | https://www.rsaconference.com/experts/Ondrej%20Nekovar Jan Pohl, Analyst, SPCSS s.p. [@csirtspcss] On LinkedIn | https://www.linkedin.com/in/jan-pohl-89231a264/ At RSAC | https://www.rsaconference.…
…
continue reading
1
Retirement plan breach shakes financial giant.
39:57
39:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:57
A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finn…
…
continue reading
1
NAN062: The Team Behind Nautobot (Part 1)
28:57
28:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:57
Today we chat with the maintainers of Nautobot, the open source network source of truth and network automation platform. Jason Edelman, Ken Celenza, John Anderson explain how their day jobs at professional services company, Network to Code, informs their work on Nautobot. They walk us through Nautobot’s core, out-of-the-box capabilities as well as …
…
continue reading
1
Theory to Code: Building the Breakthrough zkVM Jolt
1:15:09
1:15:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:15:09
with @SuccinctJT @samrags_ @moodlezoup @rhhackett Welcome to web3 with a16z, a show about building the next era of the internet by the team at a16z crypto. That includes me, host Robert Hackett. Today's all new episode covers a very important and now fast developing area of technology that can help scale blockchains, but that also has many uses bey…
…
continue reading