show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. We cover JavaScript frameworks like React, Vue.js, and Svelte, tooling like webpack, Docker, Nginx, Next, Nuxt, etc. and CMS systems like Craft CMS.
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Cascading Style Sheets (CSS) is the web’s core styling language. For web developers, It’s one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Adam Argyle, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
 
Loading …
show series
 
This week we’re talking with Nick Janetakis about modern unix tools, and the various commands, tooling, and ways we use the commmand line. Do you Bash or Zsh? Do you use cat or bat? What about man vs tldr? Today’s show is a deep dive into unix tools you know and love, or should know and maybe love. Discuss on Changelog News Join Changelog++ to supp…
 
L Peter Deutsch of Aladdin Enterprises and formerly of Sun Microsystems joined host Jeff Doolittle to discuss the fallacies of distributed computing. Peter retold the history and origin of the fallacies and how they have been addressed over...By IEEE Computer Society
 
Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data…
 
Cozy Bear’s active command-and-control servers are found, and people conclude that Moscow’s not too worried about American retaliation after all. Spyware found in an app for companies doing business in China. What to make (and not make) of the Iranian documents Sky News received. Phishing with Crimean bait. HTML smuggling may be enjoying a moderate…
 
EPISODE 227-Eleven TopicsThis week I present Eleven assorted topics surrounding privacy, security, and OSINT including a Pegasus recap, ID.Me challenges, more Airtag concerns, the Protonmail audit, results from a ProtonMail search warrant, new uBlock Origin features, another email masking option, upcoming Google Voice changes, GrapheneOS updates, L…
 
In this episode we discuss venture capital and more with Preface Ventures Founder and General Partner Farooq Abbasi. This interview was also recorded as a video podcast. Check out the video on the Software Daily YouTube channel. Sponsorship inquiries: sponsor@softwareengineeringdaily.com The post Preface with Farooq Abbasi appeared first on Softwar…
 
This week we discuss Infrastructure as Code, GCP's new API policy and The State of Developer Ecosystem Survey. Plus, some thoughts on Olympic Swimming. Rundown Evolving Infrastructure-as-Code to Integration-as-Code Google sets all-time records as search and YouTube profits soar Saved by Google? New API policy promises stability and availability. Th…
 
We chat discrete mathematics, differential privacy, and homomorphic encryption. But don't worry, we also break it down in laymen's terms. Interested in working in security? Mahmoud will personally extend an offer to anyone who solves this puzzle. Puzzles not your thing? You can still learn more about Very Good Security and its open positions here. …
 
Malicious Content Delivered Trhough archive.org https://isc.sans.edu/forums/diary/Malicious+Content+Delivered+Through+archiveorg/27688/ A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI https://arxiv.org/abs/2107.12699 Crimea "manifesto" deploys VBA Rat using double attack vectors https://blog.malwarebytes.com/threat-intell…
 
Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Ou…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, July 26-30, 2021, is hosted by Rich Stroffolino with our guest, Robb Reck (@robbreck), founder and host, Colorado = Cybersecurity Thanks to our sponsor, Varonis What is your ransomware blast radius? The average employee can access 17 million files they don’t need, and only a h…
 
If you’ve tried catching an Uber recently you may have noticed that prices and wait times are worse than they’ve ever been. Rideshare companies like Uber and Lyft didn’t fare well during the pandemic and now that restrictions are easing, drivers just aren’t coming back. Motherboard Staff Writer Edward Ongweso Jr spent some time talking to Uber driv…
 
All links and images for this episode can be found on CISO Series How are you measuring your progress and success with cloud security? How much visibility into this are you providing to your engineering teams? Check out this post and this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), produc…
 
In today’s containerized world, it’s common to encounter similar issues with known solutions across multiple pods. For most people there are 2 solutions: go pod-by-pod finding and fixing the problem, or do that while also spending months trying to automate that process. This is significant time and manual labor. The company Shoreline orchestrates r…
 
Relationships are work, hard work at times. Loving another person is more than a feeling, it’s a choice. The sense and feeling most books and movies ascribe to love is just an emotional reaction. Real love comes from choosing to be with that one person over all the others. Sometimes that choice is easy and other times it is difficult, but one that …
 
Guest Dr. Charles Chaffin, author of the book "Numb: How the Information Age Dulls Our Senses and How We Can Get them Back," joins Dave this week, we have some listener follow up from John with a tip on ATM security, Dave's got a two-fer this week including a useful site called www.shouldiclick.org and a Twitter report on multi-factor authenticatio…
 
Bring the fight to the hackers with some clever code! Carl and Richard talk to Dana Epp about honeytokens - adding code and elements to your applications that are there only to attract bad actors. Dana talks about how hackers attack applications, looking for vulnerabilities. Often those attempts take weeks or even months and are hard to detect in r…
 
A Sextortion E-Mail From ... IT Support?! https://isc.sans.edu/forums/diary/A+sextortion+email+fromIT+support/27682/ AV-Test Compares Android Anti-Virus Software https://www.av-test.org/en/news/15-security-apps-for-android-in-an-endurance-test/ Oscorp evolves into UBEL: Advanced Android Malware https://www.cleafy.com/cleafy-labs/ubel-oscorp-evoluti…
 
F# empowers everyone to write succinct, robust and performant code. Today Scott talks to Don Syme, the designer and architect of the F# programming language, described by a reporter as "the most original new face in computer languages since Bjarne Stroustrup developed C++ in the early 1980s." How can F# help join both the .NET and JavaScript ecosys…
 
US formally establishes its Industrial Control System Cybersecurity Initiative. Shooting wars in cyberspace. Developments in the ransomware criminal souks. This week’s iOS update may have closed the vulnerability exploited by NSO Group’s Pegasus intercept tool. The US, UK, and Australia issue a joint advisory on the most exploited vulnerabilities. …
 
Prophecy is a complete Low-Code Data Engineering Platform for the Enterprise. Prophecy enables all your teams on Apache Spark with a unique low-code designer. While you visually build your Dataflows – Prophecy generates high-quality Spark code on Git. Then, you can schedule Spark workflows with Prophecy’s low-code Airflow. Not only that, Prophecy p…
 
In this episode of Syntax, Scott and Wes do a collaboration with Chis Coyier and Dave Rupert from ShopTalk Show! They talk about favorite tech stacks, podcasting, learning new tech, dealing with FOMO, and more! Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of …
 
#117: Many times, people question why gates exist in business. It's good to question why a gate exists. However, it's not ok to remove a gate without first doing the work necessary to figure out what will happen if the gate is removed. YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And Blueprints https://w…
 
Are you acting on impulse? How would you know? One door to understanding this "acting without thinking" is to investigate our hypotheses. Implicit hypotheses are expressed as instances of our beliefs. What implicit hypotheses are you relying on today? ✨ Sponsor: Elastic Elastic enables the world’s leading organizations to put their data to work usi…
 
Microsoft rushes fix for PetitPotam attack PoC Apple releases urgent zero day bug patch for Mac, iPhone and iPad devices Google launches new Bug Hunters vulnerability rewards platform Thanks to our episode sponsor, Varonis The first time we got hit with ransomware it took us weeks to recover. The second time we got hit, it took us two hours. Why? B…
 
Details about CVE-2021-30807. (Patch released Monday for MacOS/iOS) https://saaramar.github.io/IOMobileFrameBuffer_LPE_POC/ Zimbra 8.8.15 XSS and SSRF Vulnerability https://blog.sonarsource.com/zimbra-webmail-compromise-via-email LockBit Ransomware Uses Group Policies https://www.bleepingcomputer.com/news/security/lockbit-ransomware-automates-windo…
 
On this week’s show Patrick Gray and Adam Boileau discuss recent security news, including: Analysis suggests the Kaseya REvil incident was actually a bit of a fizzer They also obtained a decrypt key and no one knows how EU to follow US Treasury on Bitcoin controls Israeli Government has eyes on NSO fallout PetitPotam Active Directory technique is v…
 
Picture of the Week. Faster and more efficient phishing detection in Chrome 92. A Universal Decryptor for all Kaseya victims. The printer driver used by millions of HP, Samsung and Xerox Printers is exploitable. Windows' Process Hacker. "GoLang" gains supply chain security features at GitHub. Closing the Loop. SeriousSAM & PetitPotam. We invite you…
 
Jane Lo, Singapore Correspondent speaks with Ms Lynette TAN, Chief Executive. Singapore Space and Technology Limited (SSTL). As Chief Executive and Board Member of SSTL, Lynette develops the organisation’s industry initiatives, leads its startup accelerator programmes and drives its consulting business, identifying opportunities for government orga…
 
Transnet declares force majeure over cyberattack on South African port management. The IRGC apparently is Googling a bunch of stuff about gas stations and merchant ships. Kaseya’s denial of paying ransom has legs. Criminal coders like obscure languages. The AvosLocker gang is looking for pentesters, access brokers, and affiliates. The US and China …
 
L. Peter Deutsch of Aladdin Enterprises and formerly of Sun Microsystems joined host Jeff Doolittle to discuss the fallacies of distributed computing. Peter retold the history of the fallacies themselves and corrected some frequent misattributions and misunderstandings regarding their origin. The discussion also addressed interrelationships between…
 
We’ve been running Software Daily for 6 years. When we started it back in 2015, the goal was to create a software engineering podcast that was 60% as good as Software Engineering Radio, but aired with 5x the frequency. 5 shows per week, 50 weeks per year, 5 ads per show, means 1,250 advertising spots. We are a two sided marketplace for podcast ads …
 
Count on The CSS Podcast to cover counters. Una and Adam teach all the ways to create, reset, and update counters. Use them for lists, games and more! Links Counters Level 3 → https://goo.gle/3f2BP18 Pure CSS Games Collection → https://goo.gle/3l0wrQe Una Kravets (co-host) Twitter | Instagram | YouTube Making the web more colorful ✨🎨 Web DevRel @go…
 
As the world slowly reopens after more than a year of COVID-19 shutdowns, coming together is more important than ever. Today’s episode takes a human-centered approach to how to create more meaningful gathering spaces and some simple tips you can follow to do so. From committing to a clear purpose to asking how your gathering impacts the wider world…
 
Recovering Malspam Password https://isc.sans.edu/forums/diary/Failed+Malspam+Recovering+The+Password/27674/ Apple Patches 0-Day https://support.apple.com/en-us/HT201222 Attackers Adopt Exotic Programming Languages https://blogs.blackberry.com/en/2021/07/old-dogs-new-tricks-attackers-adopt-exotic-programming-languages LemonDuck/LemonCat Coinminers G…
 
Kaseya isn’t saying where it got its REvil decryptor. Transportation services disrupted at two major South African ports by an unspecified cyber incident. Another company is mentioned as an alleged source of abused intercept tools as the controversy over NSO Group’s Pegasus software continues. Johannes Ullrich from SANS on supply chains, developmen…
 
In this episode, Dave and Jamison answer these questions: Questions Should I change tech stacks every few years in order to not get pigeonholed? Is it a good idea to stick with a tech stack for as long as I can or should I follow the market trend and try to learn another promising tech and then try switching into that? Would you advise me to be mor…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login