show episodes
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
We're Emma Bostian, Sidney Buckner, Kelly Vaughn, and Ali Spittel - four seasoned software developers working in different sectors. Since there's a major lack of technical podcasts out there, we've decided to start one. Just kidding -- there's already a ton! But, we wanted to add our voices to the space and share our experiences and advice. We'll have great discussions around how to start coding, the hot technologies right now, how to get your first developer job, and more! Check out our web ...
 
Loading …
show series
 
Interest in autonomous vehicles dates back to the 1920s. It wasn’t until the 1980s that the first truly autonomous vehicle prototypes began to appear. The first DARPA Grand Challenge took place in 2004 offering competitors $1 million dollars to complete a 150-mile course through the Mojave desert. The prize was not claimed. Since then, rapid progre…
 
This week we’re joined by Adam Jacob, CEO of System Initiative and Co-Founder of Chef, about open source business models and the model he thinks is the right one to choose, his graceful exit from Chef and some of the details behind Chef’s acquisition in 2020 for $220 million…in cash, and how his perspective on open source has or has not changed as …
 
This week we recap some of the Apple News and discuss the latest productivity research from Microsoft. Plus, an update on Coté’s struggle to adopt Apple Notes… Rundown Apple wins and loses in court, patches a vulnerability and release new products Apple’s App Store Dealt Blow by Judge in Epic Antitrust Case Apple must allow other forms of in-app pu…
 
Should we all be software engineers? Carl and Richard talk to Chad Michel and Doug Durham about the discipline of software engineering - separate from computing science and software development. Doug and Chad discuss the elements of lean engineering in software, referencing their book Lean Software Systems Engineering for Developers. The conversati…
 
Josef Strzibny the author of Deployment from Scratch discusses how and why it’s valuable to learn how to self host applications. Host Jeremy Jung spoke with Strzibny about why self hosting can be overwhelming; choosing a linux distribution; Security Enhanced Linux; systemd; running background services; installing language runtimes; where to put app…
 
Financial security, building working relationships, having a positive impact on the people around you; which of these examples resonates with the way you find meaning in your work? It could be one of them, or all or them, or you may have completely different sources of meaning. In today’s episode, my guest, Sophie Creutz, and I, share how we person…
 
Google expands app permissions reset Epik confirms it got hacked Telegram suspends Russian election bots Thanks to our episode sponsor, Kanu Solutions Over the next few weeks Kanu Solutions is offering a series of educational sessions on a variety of topics in security, such as endpoints, networks, privileged access management, Internet of things, …
 
Tarn and his brother Zach are the brains behind Dwarf Fortress and the community that rose around it. Dr. Tarn Adams received a math PhD, but left his post-doc because he was too busy making games. A bug created the statue Planepacked, a massive structure that contained the entire history of the world as well as 73 copies of the statue itself. Many…
 
OMIGOD Exploits Captured in the Wild. https://isc.sans.edu/forums/diary/OMIGOD+Exploits+Captured+in+the+Wild+Researchers+responsible+for+half+of+scans+for+related+ports/27852/ Apple iOS/iPadOS/tvOS 15 Updates (and WatchOS, Xcode, Safari) https://support.apple.com/en-us/HT201222 ManageEngine ADSelfService Plus Exploited https://us-cert.cisa.gov/ncas…
 
Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security. Our guest is Padra…
 
While “quality” can be subjective, certainly there are items with which we can agree? This is what Roy was saying Clayton is weirdly zen Azure DevOps Podcast with Jeffrey Palermo & Capers Jones missed requirements When agreements have been broken, understand the constraints? Team Agreements? Resources Quality assurance Project management triangle C…
 
In this Hasty Treat, Scott and Wes talk about webhooks — one of those concepts that seems a lot scarier than it actually is. Linode - Sponsor Whether you’re working on a personal project or managing enterprise infrastructure, you deserve simple, affordable, and accessible cloud computing solutions that allow you to take your project to the next lev…
 
Every year, seemingly, there’s a new story of some software – like ‘Tik Tok’ or ‘FaceApp’ – from a hostile country that may or may not be a security threat to us in the west. So what should be done in cases like this? What if the U.S. just banned all technology from Russia and China? Is it a good idea? Is it even possible?…
 
Interest in autonomous vehicles dates back to the 1920s. It wasn’t until the 1980s that the first truly autonomous vehicle prototypes began to appear. The first DARPA Grand Challenge took place in 2004 offering competitors $1 million dollars to complete a 150-mile course through the Mojave desert. The prize was not claimed. Since then, rapid progre…
 
In this episode, Ben and I talk about the conception of CodeLand, last year's CodeLand, which had to switch to a virtual conference due to covid-19, and the biggest differences between CodeLand 2020 and CodeLand 2021. Registration for CodeLand is pay-what-you-want -- starting at $0. Grab your CodeLand 2021 ticket today at codelandconf.com. That’s c…
 
Email scammers posed as DOT officials in phishing messages focused on $1 trillion bill A new banking Trojan abuses YouTube for remote configuration Admin of DDoS service behind 200,000 attacks faces serious prison time Thanks to our episode sponsor, Kanu Solutions Over the next few weeks Kanu Solutions is offering a series of educational sessions o…
 
In this episode of Running in Production, CJ Avilla goes over buildinga fund raising platform with Ruby on Rails. It’s hosted on Heroku and has beenrunning in production since 2015. CJ talks about rewriting an app with Rails, processing $30 million dollars ofdonations, using Stripe, maintaining a Rails 4.2 app, carefully sending outbulk emails, ens…
 
Malicious Calendar Subscriptions Are Back https://isc.sans.edu/forums/diary/Malicious+Calendar+Subscriptions+Are+Back/27846/ Simple Analysis of a CVE-2021-40444 (MSHTML) Document https://isc.sans.edu/forums/diary/Simple+Analysis+Of+A+CVE202140444+docx+Document/27848/ Mirai Botnet Hunting OMIGOD https://twitter.com/1ZRR4H/status/1438580885142507528 …
 
It’s always hard to know when is the right time to make a career change. There’s likely never a perfect time, but in this episode, we talk about how we have made decisions and what’s worked and what hasn’t.Panelists:Ryan Burgess - @burgessdryanAugustus Yuan - @augburtoJem Young - @JemYoungStacy London - @stacylondonerPicks:Ryan Burgess - FigRyan Bu…
 
We speak with Relativity's CSO & CIO, Amanda Fennell and the APAC Managing Director, Georgia Foster for an insight into the company and trends in the APAC region. Relativity is on the mission to help organizations organize data, discover the truth, and act on it. This is especially resonant for customers who are dealing with sensitive data, demandi…
 
Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow…
 
Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that…
 
Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 201…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, Sep 13-17, 2021, is hosted by Rich Stroffolino with our guest, Geoff Belknap, CISO, LinkedIn Thanks to our episode sponsor, Sonrai Sonrai is changing Public Cloud Security by focusing on protecting data from over-privileged human and non-human identities. Sonrai provides a sin…
 
This week I discuss the importance of offline maps, a recent Protonmail court order, online petition privacy issues, and another site which provides free historical domain information.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates…
 
Today we talk with Grygrflzr about his journey to becoming a maintainer and his views on React, Vite and a host of other things. Enjoy! Notes: Svelte is the most loved framework Scott Tolinski: 5 Things I like about Svelte Scott Tolinski: 5 More things I like about Svelte Dev environment issue Unpopular Opinions: Shawn: Social media > SEO > Social …
 
Money laundering is not a new crime. However, the growth of digital communications has greatly expanded the opportunity for money launderers to find innovative new ways to hide their true intent. Some estimates suggest it could be as high as 2-5% of the world’s GDP. Unit21 is a customizable no-code platform for risk and compliance operations. They …
 
Money laundering is not a new crime. However, the growth of digital communications has greatly expanded the opportunity for money launderers to find innovative new ways to hide their true intent. Some estimates suggest it could be as high as 2-5% of the world’s GDP. Unit21 is a customizable no-code platform for risk and compliance operations. They …
 
New Windows security updates break network printing Bitdefender releases decryptor as REvil shows signs of return Biden announces joint deal with U.K. and Australia to counter China Thanks to our episode sponsor, Sonrai Are you a security expert who’s afraid to admit you don’t know what the heck is going on in your cloud? Relax. Public cloud securi…
 
Former co-host Sara Chipps now manages engineering teams at LinkedIn, but her best content is still on Twitter. Cassidy's former boss, Sarah Drasner, recently wrote a book to help engineers level up to management: Engineering Management for the Rest of Us. Cassidy's new favorite software tool is Astro, a single-site generator that looks to minimize…
 
Phishing 101: why depend on one suspicious message subject when you can use many https://isc.sans.edu/forums/diary/Phishing+101+why+depend+on+one+suspicious+message+subject+when+you+can+use+many/27842/ PrintNightmare Fix Breaks Network Printing https://www.bleepingcomputer.com/news/security/new-windows-security-updates-break-network-printing/ Malwa…
 
Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-part…
 
A strange press release went out on September 13th. Retail giant Walmart, it seemed, would soon be accepting crypto currency. “The eCommerce giant intends to give its millions of shoppers across the world an opportunity to seamlessly make payments with cryptocurrencies,” the press release said. The press release was bullshit. The world of cryptocur…
 
Facebook’s goal is to connect the world and allow every human to foster better relationships. Today is a rare treat. Mark Zuckerberg is the CEO of Facebook. After I spent nearly 3 years writing a book about how his company works, he has finally agreed to do an interview. Special thanks to Jennifer Li at Andreessen Horowitz for the introduction and …
 
Facebook’s goal is to connect the world and allow every human to foster better relationships. Today is a rare treat. Mark Zuckerberg is the CEO of Facebook. After I spent nearly 3 years writing a book about how his company works, he has finally agreed to do an interview. Special thanks to Jennifer Li at Andreessen Horowitz for the introduction and …
 
All links and images for this episode can be found on CISO Series SIEM tools that ingest and analyze data are ubiquitous in security operations centers. But just knowing what's happening in your environment is not enough. For competitive reasons, must SIEM tools expand and offer more automation, intelligence, and the ability to act on that intellig…
 
Web applications often have some sort of login system, and once a user creates an account, they have access to features anonymous users can’t see. In time, application designers will often add an admin level of access for special users. This is often a slow trickle of technical debt. Proper execution of a programmatic authorization system requires …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login