show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
How does design impact the world around you? Discover how graphic designers, UX designers, illustrators, typographers, artists, activists and other creatives empower creativity for all. Can the design of an app, a logo, a graphic, a sound effect, or an illustration make your life better? Find out with Adobe’s Khoi Vinh, one of Fast Company’s Most Creative People in Business.
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Loading …
show series
 
This week we take a deep look inside life at Amazon by discussing the book Working Backwards written by two former Amazon Executives. Rundown Working Backwards Amazon Leadership Principles Stevey's Google Platforms Rant AWS Compensation Explained The Everything Store Nonsense 17 Remarkable Facts About Outdoor Amsterdam Urinals Sponsors CBT Nuggets …
 
Apache Hudi is an open-source data management framework used to simplify incremental data processing and data pipeline development. This framework more efficiently manages business requirements like data lifecycle and improves data quality. Some common use cases for Hudi is record-level insert, update, and delete, simplified file management and nea…
 
Otakar Nieder, Senior Director of Development at Bohemia Interactive Simulations, discusses how simulation apps are different from gaming and the delta needed over gaming engines to build apps for simulation. Host Kanchan Shringi spoke with Nieder about goals of a simulation versus those of a game, as well as about challenges when developing simula…
 
This week Elixir creator José Valim joins Jerod and Practical AI’s Daniel Whitenack to discuss Numerical Elixir, his new project that’s bringing Elixir into the world of machine learning. We discuss why José chose this as his next direction, the team’s layered approach, influences and collaborators on this effort, and their awesome collaborative no…
 
CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the…
 
You can follow David on Twitter here and read his blog here. Check out more about Dapper Labs and it's work with the NBA and NFTs here. David has written some influential pieces on the world of digital music and the role of software platforms. Check out a few of his pieces here. Read about David's adventure's setting up a Minecraft server for his k…
 
This week I present my own credit reports and data broker profiles in order to explain my successes and failures while trying to disappear, while offering steps to avoid during your own pursuit of privacy. Please learn from my mistakes.Direct support for this podcast comes from sales of my books, services, and online video training. More details ca…
 
Colonial Pipeline makes ransom payment of nearly $5 million Biden signs executive order to bolster federal cyber defenses Apple failed to disclose security incident affecting millions of users Thanks to our episode sponsor, Altitude Networks Wouldn’t it be great if you could INSTANTLY KNOW if a file containing sensitive information was shared in th…
 
Ilya brought a host of good topics to the table. Bold Penguin went from one offshore developer, to one key dev, to one team, to multiple teams, multiple leaders, multiple external teams, to having a complete reboot only to go through it again. Ilya explains the lessons learned along the way. If you’re trying to grow a software startup, you have to …
 
Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.anomali.com/blog/threat-actors-use-msbuild-to-deliver-rats-fil…
 
The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say th…
 
Home Assistant allows you to control all your devices without storing any of your data in the cloud. The project was started as a Python application by Paulus Schoutsen in September 2013 and has turned into a massively popular series of projects that span hundreds of devices! Plus, they like to keep your privacy private! https://www.home-assistant.…
 
Apache Hudi is an open-source data management framework used to simplify incremental data processing and data pipeline development. This framework more efficiently manages business requirements like data lifecycle and improves data quality. Some common use cases for Hudi is record-level insert, update, and delete, simplified file management and nea…
 
FBI warns of phishing sites using search ads Researcher finds WiFi vulnerable to “frag attacks” Data transfer demonstrated on Apple’s Find My network Thanks to our episode sponsor, Altitude Networks Imagine an employee just left and went to a competitor: did they take proprietary documents or critical roadmaps with them? Did they add a backdoor acc…
 
While the typical user of your application probably won’t be interested in your audit trails, that doesn’t mean that you can get by without them. Whether it is due to regulatory compliance issues, security policies, or simply because you need to troubleshoot something in production, you’ll have to deal with setting up and managing application audit…
 
Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some follow-up from listener Jonathan on two-factor authentication, Joe's story is about an employee in Scotland sued for making payments based on phishing em…
 
So another band of hackers struck again: a criminal gang known as ‘DarkSide’ unleashed a ransomware attack on the Colonial Pipeline, which shut down an integral line that supplies the East Coast with oil and gas. While the cyberattack itself didn’t physically knock out the pipeline with a string of code, the resulting attack majorly disrupted a cri…
 
What's new in Visual Studio 2022? Carl and Richard talk to Simon Calvert, Anthony Cangialosi, and Andy Sterland about the upcoming version of Studio. First on the docket is 64-bit: While Studio has been able to build 64-bit applications for more than a decade, the devenv.exe itself has remained a 32-bit application. The team discusses why it makes …
 
It's possible we all will have a lifelong relationship with your inner critic. It begins with acceptance that its there...something that guides your actions, and possibly limits your greatness. Oddly, it's supposed to be your friend, protecting you from harm, but it doesn't understand the modern context of danger and risk, so it often overshoots th…
 
Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infrastructure https://www.sans.org/webcasts/119775 Links to FragAttacks Vendor Bu…
 
As regular listeners would know, Snake OIlers is a wholly sponsored podcast series we do here at Risky Biz HQ where vendors give us money so they can come on and pitch their products to you, our dear, dear listeners. And we have three vendors along today to pitch you: Google Cloud Security is in the top slot pitching their Zero Trust product suite …
 
Apple's brand new AirTag product got hacked already. Things you can learn from Colonial Pipeline's ransomware misfortune. Why Dell patched a bunch of driver bugs going back more than a decade. And the "Is it you in the video?" scam just keeps on coming back.Stories discussed:https://nakedsecurity.sophos.com/apple-airtag-jailbroken-alreadyhttps://na…
 
FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Androi…
 
An application programming interface, API for short, is the connector between 2 applications. For example, a user interface that needs user data will call an endpoint, like a special URL, with request parameters and receive the data back if the request is valid. Modern applications rely on APIs to send data back and forth to each other and save, ed…
 
An application programming interface, API for short, is the connector between 2 applications. For example, a user interface that needs user data will call an endpoint, like a special URL, with request parameters and receive the data back if the request is valid. Modern applications rely on APIs to send data back and forth to each other and save, ed…
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about freelancing, climbing the corporate ladder, Throttling vs debounce, how to build skills with your free time, and more! Freshbooks - Sponsor Get a 30 day free trial of Freshbooks at freshbooks.com/syntax and put SYNTAX in the “How did you hear about us?” section. LogRoc…
 
Chris struggles with his nature, while Mike shares some sage developer advice that everyone should hear before using a platform like AWS. Then we react, strongly, to Docker charging to skip updates. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a your …
 
#107: As a software development community, we're used to hearing the terms sprints, projects, and agile. However, the people that sign our paychecks, in other words, the business people, could care less and wonder why everything is taking so long and why it is so complex. Today, we speak with Steve Pereira, the found of Visible.is, a consulting fir…
 
The shift away from web application security, caused by the pandemic and the focus on remote workforces, resulted in an increased number of web vulnerabilities, as shown in the latest Acunetix by Invicti Web Application Vulnerability Report. In this segment, Ryan will discuss the main results, the trends that might have caused them, and advise how …
 
A flurry of legislative and legal activity is re-shaping the way privacy and cybersecurity professionals conduct business. As a result, in addition to actually carrying out their protection responsibilities, professionals charged with protecting private and confidential data must be also be constantly aware of these evolving regulatory and legal ob…
 
Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Lapor…
 
On this week’s show Patrick Gray, Adam Boileau and Chris Krebs discuss the week’s security news, including: An analysis of the Colonial pipeline ransomware attack More ransomware news UK and US expose APT29’s preferred exploits (again) IntrusionTruth drops a new post 128m Apple devices were hit by XCodeGhost Much, much more This week’s sponsor inte…
 
Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial re…
 
This week in the Security Weekly News: Elon, Jerry Lee Lewis, Colonial Pipeline, Net Neutrality redux, Lemon Duck, Rico, & Jason Wood returns for Expert Commentary! Show Notes: https://securityweekly.com/swn121 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us …
 
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China’s number one target for corporate espionage – and an early victim of its new ‘Unrestricted Warfare’ doctrine. The post China’s Unrestricted Warfare, Part 2 appeared first on Malicious Life.…
 
While the vision for app security is relatively clear, executing on that vision is still somewhat of a work in progress. Fast-moving, interdependent pieces—custom code and open source packages, infrastructure and network configurations, user entitlements—make for complex systems. In this episode, we discuss the challenge in addressing each piece in…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login