Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Become the best software developer you can be
…
continue reading
Software’s best weekly news brief, deep technical interviews & talk show.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Technical interviews about software topics.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for combining creativity, community, and business.
…
continue reading
Playful explorations of the rich past and exciting future that we're all building with our silly little computers. Hosted by Jimmy Miller and Ivan Reese.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Daily update on current cyber security threats
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
next generation web podcast
…
continue reading
1
Agile and Project Management - DrunkenPM Radio
Dave Prior, Agile Trainer, Consultant and Project Manager
A podcast about Agile and Project Management
…
continue reading
A podcast about web design and development.
…
continue reading
A place for elite leaders and teams.
…
continue reading
The State and Popular Culture
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every week we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
1
Why your framework doesn't matter (News)
8:03
8:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:03
Bahaa Zidan says your web framework doesn’t matter, DHH writes about magic machines, Dylan Huang reviews thousands of opinions on HTMX, Tim Ottinger says programming is thinking & Tim Spann says small language models (SLM) for the win. Leave us a comment Changelog++ members support our work, get closer to the metal, and make the ads disappear. Join…
…
continue reading
1
SE Radio 613: Shahar Binyamin on GraphQL Security
56:17
56:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:17
Shahar Binyamin, CEO and co-founder of Inigo, joins host Priyanka Raghavan to discuss GraphQL security. They begin with a look at the state of adoption of GraphQL and why it's so popular. From there, they consider why GraphQL security is important as they take a deep dive into a range of known security issues that have been exploited in GraphQL, in…
…
continue reading
1
765: JS Promises Fundamentals - Part 1
22:01
22:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:01
In this 3-course series, Scott and Wes serve up some JavaScript Promises treats. In part 1, they unravel the concept of promises and delve into common examples of their usage, from creating and waiting on promises, to database queries and user permissions. Show Notes 00:00 Welcome to Syntax! 01:27 Brought to you by Sentry.io. 02:32 What is a promis…
…
continue reading
1
Anaconda and Accelerating AI Development with Rob Futrick
44:21
44:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:21
Anaconda is a popular platform for data science, machine learning, and AI. It provides trusted repositories of Python and R packages and has over 35 million users worldwide. Rob Futrick is the CTO at Anaconda, and he joins the show to talk about the platform, the concept of an OS for AI, and more. This episode is hosted by Lee Atchison. Lee Atchiso…
…
continue reading
1
Web development according to The Primeagen [Repeat]
36:34
36:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:34
On this repeat episode, The Primeagen, content creator, Twitch streamer, and all-around fun internet guy, gives his take on all the latest trends in web development. Links https://youtube.com/ThePrimeagen https://www.twitch.tv/theprimeagen https://twitter.com/ThePrimeagen https://discord.gg/3ujcVMe https://github.com/ThePrimeagen https://www.youtub…
…
continue reading
1
DOP 261: Visionary Views on Internal Developer Platforms and Portals with Port
41:09
41:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:09
#261: The future of developer portals is one of seamless integration and intuitive operation. By bridging the gap between complex platforms and the developers who use them, portals can significantly enhance productivity and innovation. This vision aligns with the ethos of companies like Port, which emphasizes an open and adaptable approach to devel…
…
continue reading
1
Interview Prep: Two Counterintuitive Tips
21:58
21:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:58
In today's episode we'll discuss some counterintuitive advice for your interviews. This advice applies in interview settings, but also applies in 1-1 meetings as well. 🙏 Today's Episode is Brought To you by: Unblocked Unblocked provides helpful and accurate answers developers need to get jobs done. It tailors answers by augmenting your source code …
…
continue reading
1
Secrets Management With Doppler's Brian Vallelunga
26:15
26:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:15
Episode Summary In this episode of The Secure Developer we're joined by Brian Vallelunga, Founder and CEO of Doppler, to discuss the importance of secrets management in modern application development. Brian shares his journey in creating Doppler, a secrets manager designed for developers and DevOps teams, and highlights the challenges organizations…
…
continue reading
1
Foundations of Design for Developers with Kathryn Grayson Nanz
29:37
29:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:37
Kathryn Grayson Nanz Is a designer who's written an ebook called Foundations of Design for Developers. She understands that developers need to participate in the design process, and often developers can identify that something is wrong with the design but they can't figure out why. In this episode she talks to Scott about how engineers and develope…
…
continue reading
1
AI & Hype & Security (Oh My!) & Hacking AI Bias - Caleb Sima, Keith Hoodlet - ASW #284
1:04:57
1:04:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:04:57
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
…
continue reading
1
Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know
8:58
8:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:58
The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself. Learn more about your ad choices. Visit megaphone.fm/adchoicesبقلم SpokenLayer
…
continue reading
This week I talk about career moves for the DFIR professional. The skill set is valuable, but it must be combined with the right additional technical skills to maximize future job opportunities. Of course, there is one skill set that stands out above the rest...
…
continue reading
1
Scaling Large ML Models to Small Devices with Atila Orhon
56:48
56:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:48
The size of ML models is growing into the many billions of parameters. This poses a challenge for running inference on non-dedicated hardware like phones and laptops. Argmax is a startup focused on developing methods to run large models on commodity hardware. A key observation behind their strategy is that the largest models are getting larger, but…
…
continue reading
1
Scaling Large ML Models to Small Devices with Atila Orhon
56:48
56:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:48
The size of ML models is growing into the many billions of parameters. This poses a challenge for running inference on non-dedicated hardware like phones and laptops. Argmax is a startup focused on developing methods to run large models on commodity hardware. A key observation behind their strategy is that the largest models are getting larger, but…
…
continue reading
1
128. Taking aim at Democracy: Russia’s Doppelgänger gang isn’t just targeting elections anymore
29:22
29:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:22
In a year that could bring a perfect storm of disinformation, meet Doppelgänger, a Russian-backed group seeking not just to shake up the world’s elections, but its institutions too.بقلم Recorded Future News
…
continue reading
1
LockBit’s website is back, Germany takes action amid alleged Russian attack, Chinese-linked ArcaneDoor targets infrastructure
9:21
9:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:21
LockBit’s website is back Germany takes action amid alleged Russian attack Chinese-linked ArcaneDoor targets global network infrastructure Huge thanks to our sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help you streamline security reviews to win …
…
continue reading
Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. S…
…
continue reading
1
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra ...
16:21
16:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:21
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, interviews Eugene Spafford about his 2024 Cybersecurity Canon Hall of Fame book: “Cybersecurity Myths and Misconceptions.” References: Eugene Spafford, Leigh Metcalf, Josiah Dykstra, Illustrator: Pattie Spafford. 2023. Cybersecurity Myths and Misconceptions: Avoiding the Ha…
…
continue reading
1
ISC StormCast for Tuesday, May 7th, 2024
6:27
6:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:27
DHCP Based VPN Routing Leaks https://www.leviathansecurity.com/blog/tunnelvision Mullvad VPN DNS Traffic Leak https://mullvad.net/en/blog/dns-traffic-can-leak-outside-the-vpn-tunnel-on-android Tiny Proxy Vulnerability https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889بقلم Dr. Johannes B. Ullrich
…
continue reading
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.بقلم N2K Networks
…
continue reading
1
Reshaping the future of API platforms
26:28
26:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:28
Kong is a cloud-native API gateway. Find them on GitHub. We last spoke with Marco in 2023. inf Connect with Marco on LinkedIn. Congrats to Famous Question badge winner mjbradford7 on How to re-render one component from another in React.بقلم Marco Palladino, Ryan Donovan
…
continue reading
Stephanie shares an intriguing discovery about the origins of design patterns in software, tracing them back to architect Christopher Alexander's ideas in architecture. Joël is an official member of the Boston bike share system, and he loves it. He even got a notification on the app this week: "Congratulations. You have now visited 10% of all docki…
…
continue reading
1
Human Hacking with Christopher Hadnagy and Dr. Abbie Marono
50:56
50:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
50:56
SummaryIn this conversation, Dave Prior interviews Chris Hadnagy and Dr. Abbie Maroño about social engineering and human hacking. They discuss the definition of social engineering and how it differs from human hacking. They emphasize the importance of intent in social engineering, with the goal being to influence someone's actions for their benefit…
…
continue reading
1
Charting the course: Biden's blueprint for global cybersecurity.
33:03
33:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:03
Secretary of State Antony Blinken is set to unveil a new international cybersecurity strategy at the RSA Conference in San Francisco. Paris prepares for Olympic-sized cybersecurity threats. Wichita, Kansas is recovering from a ransomware attack. A massive data breach hits citizens of El Salvador. Researchers steal cookies to bypass authentication. …
…
continue reading
1
Say Easy, Do Hard - Train How You Fight, Part 1 - Malcolm Harkins - BSW #349
1:00:29
1:00:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:29
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
…
continue reading
The spy movie is dying, despite efforts to reform it in recent years. In this episode we examine Argylle, the... The post ClandesTime 266 – Argylle first appeared on Spy Culture. (Read more...)بقلم Tom Secker
…
continue reading
1
Episode 407: I'm too territorial and should I quiet quit?
25:53
25:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:53
In this episode, Dave and Jamison answer these questions: I am a data scientist and have been at my company for 2 years. Each of the data scientists on my team specialize in a different area of the business (growth, marketing, etc). I have developed a reputation for being the expert in my area and have worked really hard to understand my domain. I …
…
continue reading
1
Object-Oriented UX (OOUX) with Sophia Prater
44:04
44:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:04
In this episode, Thomas Betts talks with Sophia Prater about Object-Oriented UX (OOUX). OOUX focuses on identifying the objects and relationships within a system, allowing for better communication and collaboration among designers, product owners, engineers, and architects. Prater explains the process of OOUX, which involves multiple rounds of disc…
…
continue reading
1
Cyber Security Today, May 6, 2024 - Ransomware gang claims responsibility for attacking Italian healthcare service, Russian gang blamed for attacks in Europe, and more
7:04
7:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:04
This episode reports on vulnerable routers, an attack on a Canadian digital library service and moreبقلم Howard Solomon
…
continue reading
1
614: CSS Grid Level 3 aka Masonry with Adam Argyle
56:48
56:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:48
Show Description Adam Argyle stops by to chat about the conversation that's happening around CSS Grid / Masonry. What do we want? What might Apple's response to Google be? And nitpicking the spec just for fun. Listen on Website → Guests Adam Argyle Guest's Main URL • Guest's Twitter CSS DevRel Google Chrome, CSSWG member, host on GUIchallenges, co-…
…
continue reading
1
Neuberger proposes improvements, Olympic cybersecurity preparations, Microsoft VPN warning
8:10
8:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:10
NSC’s Neuberger suggests operational approach for on mitigating cyberattacks French cybersecurity teams prepare for “unprecedented” Olympic threat Feds warn about North Korean exploitation of improperly configured DMARC Huge thanks to our sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest…
…
continue reading
1
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]
18:21
18:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
18:21
Rick Howard, N2K’s CSO and The Cyberwire’s Chief Analyst and Senior Fellow, interviews Andy Greenberg about his 2024 Cybersecurity Canon Hall of Fame book: “Tracers in the Dark.” References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Larry Pesce, 2024. Tracers in the Dark: The…
…
continue reading
1
ISC StormCast for Monday, May 6th, 2024
5:32
5:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:32
DNS Debugging with nslookup https://isc.sans.edu/diary/nslookups+Debug+Options/30894/ Microsoft Plans DNS Lockdown https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns-private-preview/ba-p/4110366 Microsoft Graph API Abuse https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats SANSFIRE…
…
continue reading
1
Encore: Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]
6:58
6:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:58
Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. El…
…
continue reading
1
Geopolitical tensions rise with China. [Research Saturday]
35:22
35:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:22
Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations. Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these gro…
…
continue reading
1
Cybersecurity professional Madison Horn runs for Congress. Cyber Security Today Weekend Show May 3, 2024
42:02
42:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
42:02
If you've ever been frustrated by how poorly you think politicians are dealing with the issues that face us in Cyber Security, maybe you've thought we should have more cyber security professionals in government. Madison Horn, cyber security professional feels the same way. So she's running for the a seat in the House of Representatives. This is my …
…
continue reading
1
UL NO. 430: The Courage to be Disliked
30:15
30:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:15
How I use local AI models, MI5 vetting research students, the first AI deepfake racism attack, and more… Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See …
…
continue reading
1
Week in Review: Dropbox Sign breach, Cybersecurity consultant arrested, Ukraine Microsoft hack
26:24
26:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:24
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Phil Beyer, former CISO, Etsy Thanks to today’s episode sponsor, Dropzone.ai Dropzone.ai’s AI Autonomous Analyst is transforming cybersecurity as we know it. By replicating the techniques of elite analysts and autonomously investigating …
…
continue reading
1
Ransomware attack turns legal attack.
39:41
39:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:41
A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurit…
…
continue reading
Our friend Ron Evans is a technologist for hire, an open source developer, an author, a speaker, an iconoclast, and one of our favorite people in tech. This conversation with Ron goes everywhere: from high-altitude weather balloons, to life on Mars, to Zeno’s paradox applied to ML, to what open source devs should learn from the Wu-Tang Clan & more.…
…
continue reading
1
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland... - SWN #383
35:15
35:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:15
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-383
…
continue reading
1
Shifting to Agility: From Project Manager to Scrum Master with Mike Guiler
32:25
32:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:25
This week, Dan Neumann and Justin Thatil are joined by Mike Guiler to discuss the journey of a Project Manager shifting to fill the Scrum Master accountability. This episode mainly focuses on those Scrum Masters who are newer to this accountability and have a Project Management background. In this episode, they explore what happens when a Project M…
…
continue reading
1
Episode 180: The C++0x Concepts Story with Doug Gregor (Part 1)
48:58
48:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
48:58
In this episode, Conor and Bryce chat with Doug Gregor from Apple about the history of C++0x Concepts. Link to Episode 180 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Twitter ADSP: The Podcast Conor Hoekstra Bryce Adelstein Lelbach About the Guest: Douglas Gregor is is a Distinguished Engineer at Apple working on…
…
continue reading
Join Scott and Wes as they delve into the fascinating realm of Biome.JS alongside Emanuele Stoppa, the mastermind behind it all. Why is it written in Rust? Why are other tools so slow? Could Biome be the ultimate successor to ESLint or Prettier? Grab a seat at the table and find out! Show Notes 00:00 Welcome to Syntax! 00:10 Brought to you by Sentr…
…
continue reading
What if the tools you trust were actually betraying you? Join us for a riveting story where a team of software developers discovers that their compiler is compromised. What starts as suspicion of a simple bug quickly escalates into the alarming realization. In this 100th episode celebration past show regulars Don and Krystal join Adam lend their vo…
…
continue reading
How Chris created live TV streaming from his local media collection, Alex breaks down the new Open Home Foundation and what it means for self-hosters. Brent's been trying out an open-source AirDrop replacement for all systems, and much more! Special Guest: Brent Gervais. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any de…
…
continue reading
1
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
1:57:07
1:57:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:57:07
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
…
continue reading
1
Cyber Security Today, May 3, 2024 - North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches
8:07
8:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:07
This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure, and moreبقلم Howard Solomon
…
continue reading
1
127. Mic Drop: NSC’s Neuberger on mitigating cyber attacks: ‘We should be using an operational approach’
13:42
13:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:42
The White House’s top cyber official is keen to set minimum cybersecurity standards for industry, put contingencies in place in case cyberattacks are successful, and start looping ordinary people into an effort to make products secure by design.بقلم Recorded Future News
…
continue reading