show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and developer at @Clearbit. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: developertea ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Conversations with the hackers, leaders, and innovators of software development. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
We're Emma Bostian, Kelly Vaughn, and Ali Spittel - three seasoned software developers working in different sectors. Since there's a major lack of technical podcasts out there, we've decided to start one. Just kidding -- there's already a ton! But, we wanted to add our voices to the space and share our experiences and advice. We'll have great discussions around how to start coding, the hot technologies right now, how to get your first developer job, and more!
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
Wireframe reveals the stories behind user experience design, for UX/UI designers, graphic designers, and the design-curious. Hosted by Khoi Vinh, principal designer at Adobe and one of Fast Company’s 100 Most Creative People in Business, the podcast explores unexpected ways that user experience design helps technology fit into our lives.
 
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. Each episode, we have a cadre of hosts discussing the latest hotness, pet peeves, and technologies we use every day. We all come from a Craft CMS background, but we’ll be focusing on other cool frontend development technologies as well.
 
The ThoughtWorks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
 
Loading …
show series
 
Philip Kiely discusses his book Writing for Software Developers. Software development primarily involves writing code but strong written communication skills are critical. Technical comprehension is vital but solid written communication skills are also...By IEEE Computer Society
 
Build it and they will come, right? Wrong. Search Engine Optimization is a key component of how people will discover your website or application. In this episode, we are joined by Netflix engineer, Cole Turner to talk with us about the importance of SEO and ways to improve your ranking in search engines.Guests:Cole Turner - @coleturnerPanelists:Rya…
 
The cybersecurity space is nothing if not crowded. Yet despite all the fantastic offers and promises being made by vendors, the sober reality persists that spending has not equated to improved security. Did you know that 80% of IT security budgets are focused on detection and containment controls, even though 70% of security experts believe that a …
 
Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She share…
 
After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize. Talos researchers tak…
 
This week, we welcome we welcome Mike Ware, Senior Director of Technology at Synopsys, to talk about the Key Findings From The Newly Released BSIMM11 Report! In our second segment, we welcome James Spiteri, Solutions Architect and Cyber Security Specialist Global Solutions Lead at Elastic, to discuss how Elastic Security Opens Public Detections Rul…
 
The US Commerce Department announces a clampdown on TikTok and WeChat, to begin Sunday. An overview of the Grayfly and Blackfly units of APT41. Maze begins delivering payloads inside a VM. A ransomware attack on a Düsseldorf hospital is implicated in the death of a patient. Google wants less stalkerware and misrepresentation in the Play store. Cale…
 
Ed Freyfogle steps in for me this week and interviews Hrishi Mittal, founder of online learning platform Learnetto. Hrishi shares his struggle to progress past a point of having limited success without finding real traction. He also talks about his desire to bring on a cofounder. Hrishi on Twitter Learnetto Learnetto on Twitter “The Complete React …
 
This week, Dr. Doug discusses Microsoft OneFuzz, Tik Tok, QAnon, Mozi, and more news from the sunny shores of Venus! Show Notes: https://wiki.securityweekly.com/swn66 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwee…
 
EPISODE 188-Privacy Updates & How to Disappear: Part 4This week I wrap up the How To Disappear series and present some concerns with online review extortion and IPv6 leaks.Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.Listen to ALL episodes a…
 
Investing in enterprise software has become a competitive business. Lots of venture capital firms compete for the good deals at every stage. This level of competition has driven more capital into the early stages. Ed Sim is a partner with Boldstart, an early stage enterprise investment firm. He joins the show to talk about modern enterprise investm…
 
This week we discuss Snowflake’s IPO, Forrester’s Multicloud Container Wave and Nvidia buying ARM. Plus, an extensive discussion of what constitutes a breakfast taco. The Rundown IPOs Snowflake shares more than double. It's the biggest software IPO ever Worth more than VMware. Sumo Logic's IPO prices above the expected range Tech investors await IP…
 
Oracle is in the midst of trying to negotiate and get approved a deal that would allow it to acquire Tik Tok's US Operations, and allow Tik Tok to avoid a ban on its service in the United States. For US citizens, software being banned over geopolitical concerns is a new reality. What will happen to the code if the deal goes through? Is there a clea…
 
OSSEC Active Response https://isc.sans.edu/forums/diary/Suspicious+Endpoint+Containment+with+OSSEC/26576/ Microsoft Patch for Office for Mac https://docs.microsoft.com/en-us/officeupdates/release-notes-office-for-mac VMWare Fusion Vulnerablity https://www.vmware.com/security/advisories/VMSA-2020-0020.html NSA Secure Boot Configuration Guide https:/…
 
Cerberus is available for free, the Empire Market’s old and betrayed customers are probably looking for another marketplace where English is spoken, and it seems the Russian mob is selling access to North Korea’s Lazarus Group. NSA thinks US elections will be safe and secure, but that influence operations are probably here to stay. Betsy Carmelite …
 
It’s been a pretty bad PR year for the world’s most popular ride-share app… And unsurprisingly it has poured money into good news stories, to kick up warm fuzzy feelings about a company that has been found, time and again, to not care very much about its drivers. Enter a CNBC paid partnership story about an UberEats driver who is about to make 100k…
 
Factories require quality assurance work. That QA work can be accomplished by a robot with a camera together with computer vision. This allows for sophisticated inspection techniques that do not require as much manual effort on the part of a human. Arye Barnehama is a founder of Elementary Robotics, a company that makes these kinds of robots. Arye …
 
This week, first we talk Enterprise News, discussing Acunetix new data retention policies, 5 things you should ask your web app pen test provider, Microsoft's open source tool for sniffing out Windows 10 bugs, Datadog unveils support for distributed tracing for AWS Step Functions via AWS X-Ray, and Gravwell's Data Fusion platform breaks the mold of…
 
Generally speaking, repeating the same actions under the same conditions should create the same results (or close enough that the results aren’t a surprise, at least). This tendency is at the root of all scientific pursuits, our development of technology, our understanding of economics (such as it is), and forms a core belief in a big chunk of the …
 
The need for high quality information at speed has never been greater thanks to competition and the impact of the global pandemic. Here, our podcast team are joined by David Coles and Danilo Sato to explore how data science is helping the enterprise respond: What new tools and techniques show promise? When does bias become a problem in data sets? W…
 
Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or maliciously to create accounts, The Catch of the Day is about a Netflix-themed campaign that's currently running, and later in the show, Dave's conversation …
 
Machine Learning has been around for years, what does it look like today? Carl and Richard chat with Zoiner Tejada about how he approaches machine learning today, starting with a focus on data. The bulk of the work for using machine learning is focused on sources, quality and bias in data. Zoiner talks about using data lakes to organize data simply…
 
Most Recent "Mirai" Bot Includes Code to Target Backups https://isc.sans.edu/forums/diary/Do+Vulnerabilities+Ever+Get+Old+Recent+Mirai+Variant+Scanning+for+20+Year+Old+Amanda+Version/26572/ Apple Security Updates https://support.apple.com/en-us/HT201222By Johannes B. Ullrich, Ph.D.
 
This week, we welcome David King, Founding Member and Owner at Cyber Support Alliance and Governing Goliath Media, to discuss How We Lost the Cybersecurity War (and What Happens Next), in this two part interview! Show Notes: https://wiki.securityweekly.com/scw43 Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twit…
 
CISA and the FBI warn of extensive Iranian cyberattacks that exploit flaws in widely used VPNs. The US indicts two men for website defacements undertaken for the benefit of Iran, and in retribution for the US drone strike that killed Quds Force commander Soleimani. The US has also indicted seven in a cybercrime and cyberespionage wave conducted in …
 
In this episode of Syntax, Scott and Wes talk about writing good CSS. LogRocket - Sponsor LogRocket lets you replay what users do on your site, helping you reproduce bugs and fix issues faster. It’s an exception tracker, a session re-player and a performance monitor. Get 14 days free at logrocket.com/syntax. Netlify - Sponsor Netlify is the best wa…
 
🌎 Naomi On the Web About The Quick Python Book Twitter Personal Website The Python Software Foundation 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: developertea.com. 🧡 Leave a Review If you're enjoying the show and want to support the content head over to iTunes and…
 
The most popular email client is Gmail, the web-based email client from Google. Gmail is dominant, but that dominance has come at a price, namely speed. Gmail caters to the lowest common denominator, serving a large ecosystem of use cases and plugins. This makes for a slow overall performance. Superhuman is an email client built for power users. Ra…
 
Traffic Analysis Quiz: Oh No... Another Infection https://isc.sans.edu/forums/diary/Traffic+Analysis+Quiz+Oh+No+Another+Infection/26566/ Magento 1 Stores Targeted By Recent Attack https://sansec.io/research/largest-magento-hack-to-date Adobe Media Encoder Patch https://helpx.adobe.com/security/products/media-encoder/apsb20-57.html Zerologin Reminde…
 
Chrome vs abusive ads, patch Tuesday palooza. BlindSide and BLURtooth Chrome gets tough on abusive ads The last hurrah for IE & Flash exploits Chromium Edge on Win10: Forcing the issue Edge enables "Ask me..." for each download Patch Tuesday Palooza! Excessive SSD Defragging also fixed The WordPress File Manager flaw... two weeks downstream Zoom...…
 
On this week’s show Patrick and Adam discuss the week’s security news, including: Russia, China, Iran having a red hot go at US political orgs Crowdstrike drops report, telcos having a bad time MSS owning US government with dumb bugs DoJ indicts Iranian script kiddie because reasons Proposed TikTok-Oracle deal barely makes sense The mother of all M…
 
This week, Dr. Doug talks Candiru fish, Office Phishing attacks with a twist, Fancy Bear, Zhenhua data leaks, TikTok and Oracle, and Big Eyed Beans from Venus! Jason Wood returns for Expert Commentary on a Russian hacker selling a how-to video on exploiting unsupported Magento installations to skim credit card details for $5,000! Show Notes: https:…
 
Details of the Zerologon vulnerability are published, and it seems a serious one indeed. CISA describes Chinese cyberespionage practices--they’re not exotic, but they’re effective. What’s the difference between highly targeted market research and intelligence collection against individuals? Better commercials? Ben Yelin explains a 9th circuit court…
 
This week, we welcome back John Loucaides, VP of Research & Development at Eclypsium, to discuss Cracks in the Foundation: Understanding the New Endpoint Challenge! In the Leadership and Communications section, we're playing 3 questions - Does Your Board Really Understand Your Cyber Risks?, How can the C-suite support CISOs in improving cybersecuri…
 
The Internet Archive collects historical records of the Internet. The Wayback Machine is one tool from the Internet Archive which you may be familiar with. One project you may be unfamiliar with is book scanning. Internet Archive scans high volumes of books in order to digitize them. In today’s episode, Davide Semenzin joins the show to talk throug…
 
Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winnings. This episode contains a story from Mikko Hypponen of F-Secure. We also interview Mikko to know mo…
 
“We’re stoked to hire a 10x Software Ninja with a coffee obsession who loves to work hard and play harder.” Looking for an engineering job requires you to wade through cringy job descriptions. Inspired by changes in the market, in this episode we explore good, bad, and ugly job descriptions. We start by looking at a recent posting by Tuple, who pre…
 
From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own …
 
Sophie founded Rest of World in 2019 after a decade of living and working across Asia, Africa & the Middle East, and with companies like Uber and Xiaomi. She graduated from Stanford Graduate School of Business, Harvard Kennedy School and Princeton University. Sophie is based in New York. Read why she started this publication in her founder’s note. …
 
Not Everything About ".well-known" is Well Known https://isc.sans.edu/forums/diary/Not+Everything+About+wellknown+is+Well+Known/26564/ BLE Lock Vulnerable to Replay Attack https://www.pentestpartners.com/security-blog/360lock-smart-lock-review/ Mobile Iron Exploit Released https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rc…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login