show episodes
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Cascading Style Sheets (CSS) is the web’s core styling language. For web developers, It’s one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Adam Argyle, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, Director of Content Brian Neville-O'Neill, and PodRocket producer Kate Trahan, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Loading …
show series
 
How do you consolidate all of the advice you receive? More importantly, how can you put it into practice day in and day out? We'll talk about two strategies for making this happen in today's episode. 🙏 Today's Episode is Brought To you by: Rollbar Rollbar is the leading platform that enables developers to proactively discover and resolve issues in …
 
Whether it is political turmoil, personal life issues, outbreaks of disease, economic changes, technological changes, financial problems, health problems, or “just” a sudden job loss, we’re all going to go through difficult times at some point in our lives. And if you’ve observed other people (or yourself) for a while, you’ve probably also noticed …
 
Vaughn Vernon, author of the book “Strategic Monoliths and Microservices” discusses his book with host Akshay Manchale about strategies for purposeful architecture from the perspective of both business decision makers and technical leaders.By IEEE Computer Society
 
Curious about Web3 but not sure where to start? Noah Hein joins us to share some blockchain and Web3 fundamentals. Links https://twitter.com/NHeinDev https://twitter.com/QuickNode https://www.quicknode.com https://www.quicknode.com/guides Review us Reviews are what help us grow and tailor our content to what you want to hear. Give us a review here.…
 
In this episode of Syntax, Scott and Wes talk through what to focus on at a beginner, intermediate, and advanced levels of coding skills. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix errors…
 
This week Matt Ahrens joins Adam to talk about ZFS. Matt co-founded the ZFS project at Sun Microsystems in 2001. And 20 years later Adam picked up ZFS for use in his home lab and loved it. So, he reached out to Matt and invited him on the show. They cover the origins of the file system, its journey from proprietary to open source, architecture choi…
 
Episode 228 Kim has 20+ years experience providing Software Engineering Teams with the confidence needed to produce software with the right level of security. He loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organizations increase productivity. Links https://binarymist.io/ ht…
 
Thanks for tuning in to another episode of the Rabbit Hole! Joining Michael in conversation today is one of our favorite cohosts, Sophie Creutz, Software Developer at Olive. Open source ethos and pathos form the springboard for our conversation, which spans the benefits and barriers to paying and not paying for information. Our discussion delves in…
 
Today’s guest is the CISO at Carta, a software company that helps other companies manage their valuations, investments, and equity plans. Garrett Held has many years of experience in many different arenas within the security space, as well as a degree in business and economics; the combination of these passions led him to develop the program which …
 
Developers are leading the Great Resignation, according to some reports. Others feel developers aren't resigning, so much as seizing the moment to find better opportunities. You can find out hosts online at the links below Cassidy Ceora Ryan Ben Have an experience with the Great Resignation you want to share with our podcast and blog? Hit us up by …
 
At Thoughtworks, our internal Techops team created a self-service developer platform — NEO — with the goal of slashing the time it takes for developers to build digital products within the company. We catch up with Swapnil Deshpande and Prakash Subramaniam about designing a platform that can deliver what developers need in an easy and intuitive man…
 
CISA warns of data-wiping attacks EU working on its own DNS service Biden expands the NSA’s cybersecurity purview Thanks to our episode sponsor, Datadog In Datadog's upcoming webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platform provides real-time th…
 
Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the…
 
What's your UX strategy? Carl and Richard talk to Brian Lagunas about his work on Prism, the UX framework that works WPF, Xamarin, and now the Uno Platform to build good-looking, consistent UX experiences. Brian talks about the challenges around simplifying the UX experience enough to make it easy to do the right thing, while still having enough fu…
 
0.0.0.0 in Emotet Spambot Traffic https://isc.sans.edu/forums/diary/0000+in+Emotet+Spambot+Traffic/28254/ Linux Patch to Make 0.0.0.0/8 Routable https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96125bf9985a WebKit Patch for Cross Origin Database Name Leak https://trac.webkit.org/changeset/288078/webkit ACER Care Center …
 
Vaughn Vernon, author of Strategic Monoliths and Microservices, discusses topics covered in his latest book on strategies for purposeful software architecture from the perspective of both business and technical leaders. Host Akshay Manchale talks to Vaughn about barriers that businesses face in managing change in software due to organizational hurd…
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
Sam and Ryan continue their discussions around React 18 and the in-progress work on data fetching with Suspense. They talk about the useTransition hook and how it helps eliminate inconsistent states from your application. They also talk about Topics include: 0:00 - Intro 4:13 - What does Suspense for Data Fetching mean? 15:00 - How Transitions allo…
 
When businesses share a common need such as payroll, commercial offerings can compete for market share with software solutions that easily adapt to a variety of businesses. Not all tasks can be easily commoditized or standardized. Take content moderation as an example. Every site that accepts user generated content is likely to have unique and nuan…
 
#142: We answer a new variation on a question that we get a lot. Sure, we all know we need to know how to code if we are doing DevOps, but do we also need to know how to use development frameworks and potentially even how to connect to and use databases? YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And B…
 
Beijing 2022 Winter Olympics app loaded with privacy risks Europol shuts down cybercriminals' VPN service of choice Newspaper accuses Israeli police of spying on its own citizens Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of their un…
 
Phishing E-Mail With an Advertisement https://isc.sans.edu/forums/diary/Phishing+email+withan+advertisement/28250/ Virustotal Credential https://www.safebreach.com/blog/2022/the-perfect-cyber-crime/ Oracle Quarterly Critical Patch Update https://www.oracle.com/security-alerts/cpujan2022.html Box MFA Bypass https://www.varonis.com/blog/box-mfa-bypas…
 
Picture of the Week "Hack the Pentagon" with Log4j Open Source Software Security Summit Microsoft's January Patch Tuesday Review: The GOOD News Microsoft's January Patch Tuesday Review: The Not So Good News Check Your Router Firmware Updates Chrome to Implement PNA Three High Severity Flaws in WordPress Add-ons Closing the Loop: Listener feedback S…
 
On this week’s show Patrick Gray, Adam Boileau and Dmitri Alperovitch discuss the week’s security news, including: Russia arrests REvil crew Ukraine government hit in messy hacks White House hosts open source pow-wow, but is it pointless? US cyber reporting law will come back from the dead Report: Israeli police targeted activists with NSO but with…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
Framer Motion is a production-ready motion library for React and Motion One is a new animation library, built on the Web Animations API for the smallest file size and the fastest performance. We speak to Matt Perry about Framer Motion, Motion One, animations, and open source. Links https://www.framer.com/motion https://motion.dev https://twitter.co…
 
Unsure about how and why to use Source Generators in .NET? Stefan Schranz explains them in an easy-to-understand way. He compares them to T4 templates and explains that there’s a new and more powerful way to generate code. Learn about how to get started, the limitations, and their use cases in this episode. Sponsors Top End Devs Raygun | Click here…
 
All links and images for this episode can be found on CISO Series CISOs agree that multi-factor authentication is the one security control that once deployed has the greatest impact to reduce security issues. Yet with all that agreement, it’s still so darn hard to get users to actually use it. This week’s episode is hosted by me, David Spark (@dspa…
 
If you’re working on a proof of concept which you hope will help you raise funding, it’s fine to take a few shortcuts. Use the tech stack you know the best, don’t fall in love with your code, and when you start to experience growing pains, hopefully you’ll have the time to thoughtfully and carefully identify the bottlenecks and limits of your tech …
 
Ukraine points fingers in recent cyber attacks Another dark web marketplace calls it quits Renewable energy targeted for cyber espionage Thanks to our episode sponsor, Datadog In Datadog's upcoming webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platfor…
 
Why are you getting blocked every sprint? Find the root cause. In this episode, we discuss 4 common root causes for engineers getting blocked. Which ones do you face? 🙏 Today's Episode is Brought To you by: Square Square has APIs for almost every aspect of running a business from employee management, to order creation and tracking, to inventory syn…
 
You can find Maureen here. You can find Scott here. There is a wealth of free courses available through the AWS training website, including Operations, Advanced Networking, Machine Learning, and Data Science.By Maureen Lonergan, Scott Barneson, Ceora Ford, Ryan Donovan, Cassidy Williams, Ben Popper
 
Log4Shell Attacks Getting Smarter https://isc.sans.edu/forums/diary/Log4Shell+Attacks+Getting+Smarter/28246/ Microsoft Releases Special Update to Deal with January Update Fail https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-oob-updates-for-january-windows-update-issues/ Cisco Unified Contact Center Management Portal and Unifed Co…
 
We’re pretty sure we’re almost done and we’re definitely all present for the recording as we continue discussing PagerDuty’s Security Training, while Allen won’t fall for it, Joe takes the show to a dark place, and Michael knows obscure, um, stuff. The full show notes for this episode are available at https://www.codingblocks.net/episode176. Sponso…
 
Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online – he wants them to learn even more advanced stuff, such as security analysis and hacking. Pete spoke with Nate Nelson about his Hacker Highschool initiative, and the lessons he learned f…
 
In this episode, Dave and Jamison answer these questions: Listener Sara asks, How can I deal with favoritism towards informal leaders in a group? The group is losing group intelligence because the informal leader’s reasoning and direction is favored. Example: when member A propose an argument is dismissed, but when the informal leader proposes the …
 
In this Hasty Treat, Scott and Wes talk about CSS + JS Hacks that they're ok with using. Sponsor - Freshbooks Get a 30 day free trial of Freshbooks at freshbooks.com/syntax and put SYNTAX in the "How did you hear about us?" section. Sponsor - Sentry If you want to know what’s happening with your code, track errors and monitor performance with Sentr…
 
Writing software is an absolute joy. Getting software to build is a chore. Thus, build systems emerged as a solution to automate this chore. At some point software engineers either use or hear legends about make and makefiles. While perhaps being the historically known tool, a great deal of thought has gone into approaches to build systems since 19…
 
Microsoft discloses malware attack on Ukraine government networks New unpatched Apple Safari browser bug allows cross-site user tracking Now you can get your vulnerability alerts by phone Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
I have taken a break from interviews on Software Engineering Daily. I’ll be returning to host the show this year, and want to make a post about why I needed some rest. The last two years have been extremely difficult for me and I have not responded well to it. After getting COVID in March 2020, my brain seemed to shut down, and I was unable to thin…
 
Use of Alternate Data Streams in Research Scans https://isc.sans.edu/forums/diary/Use+of+Alternate+Data+Streams+in+Research+Scans+for+indexjsp/28240/ Microsoft Resumes Windows Server 2019 Cumulative Updates https://www.bleepingcomputer.com/news/microsoft/microsoft-resumes-rollout-of-january-windows-server-updates/ Safari Index DB Leak https://finge…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login