Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Experienced Open Source professionals exploring the tech we actually use. If it runs on Linux, we're into it. Whether you're tweaking your desktop, gaming, self-hosting, developing software, improving terminal productivity, or running production infrastructure — we cover the tools and workflows that actually matter. New episode every fortnight. Upbeat and family-friendly for Linux enthusiasts of all ages.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
next generation web podcast
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
continue reading
…
continue reading
Cascading Style Sheets (CSS) is the web's core styling language. For web developers, It's one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Bramus Van Damme, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
…
continue reading
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Software developer at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Audio podcasts on software testing.
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about web design and development.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Our old friend Lars Wikman returns to the show to discuss Linux distro hopping, Elixir, Nerves, embedded systems, home automation with Home Assistant, karate, and more. Join the discussion Changelog++ members save 8 minutes on this episode because they made the ads disappear. Join today! Sponsors: Tiger Data – Postgres for Developers, devices, and …
…
continue reading
1
Game Development on the PICO-8 with Johan Peitz
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27PICO-8 is a software-based gaming console for making, sharing, and playing small games with a retro aesthetic. It emulates the look and feel of 8-bit consoles, providing limited color palettes, screen resolutions, and memory constraints. The PICO-8 dev environment uses Lua and is focused on being accessible to developers while offering depth for co…
…
continue reading
1
SE Radio 696: Flavia Saldanha on Data Engineering for AI
1:14:25
1:14:25
Play later
Play later
Lists
Like
Liked
1:14:25Flavia Saldanha, a consulting data engineer, joins host Kanchan Shringi to discuss the evolution of data engineering from ETL (extract, transform, load) and data lakes to modern lakehouse architectures enriched with vector databases and embeddings. Flavia explains the industry's shift from treating data as a service to treating it as a product, emp…
…
continue reading
1
A new stealer hiding behind AI hype. [Research Saturday]
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as …
…
continue reading
1
#199 Tips from a serial career changer with GitHub's Andrea Griffiths
1:14:12
1:14:12
Play later
Play later
Lists
Like
Liked
1:14:12Today Quincy Larson interviews Andrea Griffiths, who taught herself programming using freeCodeCamp while working in construction. She moved to the US from Colombia when she was 17, and within 6 months she joined the US Army. She ran a chain of gyms before landing a support role at a tech company, then ascending to Product Manager and ultimately Dev…
…
continue reading
1
Microsoft blocks Entra, AI scammer legislation, ASUS patches AiCloud
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Microsoft to block unauthorized scripts in Entra ID logins with 2026 CSP update New legislation targets scammers that use AI to deceive ASUS firmware patches critical AiCloud vulnerability Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows …
…
continue reading
1
Former Deputy DNI Sue Gordon: ‘it is conceivable that the world order has already been broken’
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16Washington is trimming budgets… and bleeding digital expertise. So what happens when national security is run by agencies living in the past? Sue Gordon, former Principal Deputy Director of National Intelligence, helps us break it down. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
F87: Business Owners | SQL-Speaking Objects | Северная Корея | Тесты | Булинг на работе | Семья
1:21:42
1:21:42
Play later
Play later
Lists
Like
Liked
1:21:42Video is here: https://youtube.com/live/YIDayNTvOesBy Yegor Bugayenko
…
continue reading
1
Pass the intel, please. [Only Malware in the Building]
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the r…
…
continue reading
Darryl Lyons, co-founder and Chief Rainmaker at Rainstick, joins the show to dive into advancements in AgTech and how Rainstick is using bioelectricity to enhance agricultural productivity. They discuss how Rainstick mimics natural thunderstorms to create electric fields and frequencies that promote plant growth, challenges and breakthroughs in the…
…
continue reading
1
Espionage and Intelligence - What Cybersecurity Professionals Can Learn
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of …
…
continue reading
Google kept collecting sensor data even after bricking Nest thermostats, FreeBSD’s container support gets serious, and where to find cheap (or even dirt cheap) used hardware. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes How to Set Up a Highly Available ZFS Pool Using Mirroring and iSCSI December Webinar: The…
…
continue reading
1
The Digital Runway: IT at the Philadelphia Airport with Camille Tomlin
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15Scott sits down with Camille Tomlin, Head of IT at Philadelphia International Airport, to explore the intersection of aviation, technology, and leadership. They discuss how airports are transforming digitally — with IoT, data analytics, and smart infrastructure — and how Camille leads a team that bridges city government, airlines, and millions of p…
…
continue reading
1
The useless useCallback: React performance myths unpacked, with Dominik Dorfmeister (Repeat)
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55In this repeat episode, Dominik Dorfmeister unpacks the pitfalls of React’s useCallback and useMemo, revealing how these hooks often introduce more complexity than performance gains. He explores the promise of the React Compiler, the practical power of the “latest ref” pattern, and strategies to boost code readability and maintainability at scale. …
…
continue reading
1
AWS outage botnet smacks 28 countries, LLMs help malware authors evade detection, Anthropic pressed over Claude espionage
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02AWS outage botnet smacks 28 countries LLMs help malware authors evade detection Anthropic questioned over Claude espionage Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across you…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
We still need to talk about vibe coding: Reflections on 2025's word of the year
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23Vibe coding was, remarkably, named word of the year by the Collins English Dictionary at the start of November 2025 — pretty good going for a term that was only coined in February. We first discussed it on the Technology Podcast back in April, and, given its prominence in the collective lexicon this year, thought we should revisit and reflect on th…
…
continue reading
Please enjoy this encore of Caveat. This week, we are joined by Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab discussing Women's health apps and the legal grey zone that they create with HIPAA. Ben has the story of the potential sale of TikTok to U.S. investors. Dave's got …
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading
1
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding…
…
continue reading
1
More Sustainable Software with Tom Kerkhove
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00What does it take to make more environmentally sustainable software? Carl and Richard talk to Tom Herkhove about Microsoft's efforts to make carbon footprint and emissions visible for applications. Tom talks about the Azure API Management interface as a great starting point, and the ability to shift workloads to low-emission data centers as needed.…
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading
1
The inner workings of Wikipedia (Interview)
1:48:57
1:48:57
Play later
Play later
Lists
Like
Liked
1:48:57Let’s hear how Wikipedia actually works from long-time Wikipedian, Bill Beutler! Bill has been heavily involved with this “8th wonder of the modern world” for two decades and even built a career on it, founding Beutler Ink –a digital agency known for its pioneering work in Wikipedia public relations. We discuss: the official (and not so official) r…
…
continue reading
The Syntax team brings us their annual Holiday Gift Guide! They’ve curated the best gadgets, tools, food, and even kitchen essentials for the dev in your life — plus a few treats anyone would love to unwrap. Show Notes 00:00 Welcome to Syntax 00:54 Our Favorite Things 01:03 Wes - Bambu Lab 3d Printers 01:50 Wes - Leatherman Arc Multi-tool 03:07 Kai…
…
continue reading
1
F86: Тесты | Начальство | Квартира в аренду | Ленин | XML | Дети после себя
1:14:48
1:14:48
Play later
Play later
Lists
Like
Liked
1:14:48Video is here: https://youtube.com/live/Zf8Gnr47TnoBy Yegor Bugayenko
…
continue reading
1
DOP 326: Stop Reinventing The Wheel - Use Dapr Instead
52:13
52:13
Play later
Play later
Lists
Like
Liked
52:13#326: Microservices architecture has evolved far beyond simple distributed systems, but most development teams are still rebuilding the same foundational patterns over and over again. Mark Fussell, co-founder of Dapr and Diagrid, explains how his team at Microsoft identified this repetitive reinvention problem and created a solution that abstracts …
…
continue reading
1
CISA warns of app break-ins, StealC V2 spread through blender files, Russian entrepreneur arrested for treason
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09CISA warns of app break-ins StealC V2 spread through blender files Russia arrests cybersecurity entrepreneur for treason Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your …
…
continue reading
1
Major US Bank Data Linked Through Breach At SitusAMC
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new ma…
…
continue reading
1
Risky Business #816 -- Copilot Actions for Windows is extremely dicey
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is b…
…
continue reading
1
SANS Stormcast Wednesday, November 26th, 2025: Attacks Against Messaging; Passwords in Random Websites; Fluentbit Vuln; #thanksgiving
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
…
continue reading
1
SN 1053: Banning VPNs - The Equals Coffee Hack
2:56:06
2:56:06
Play later
Play later
Lists
Like
Liked
2:56:06Could banning VPNs really become law in the US? This episode breaks down the jaw-dropping legislation in Wisconsin and Michigan that targets VPN access for everyone, not just kids—and what it means for your digital privacy. The EU finally comes to its "Chat Control" senses. Windows 11 to include SysInternals Sysmon natively. Chrome's tabs (optional…
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
Show notes: Testing Rants IIBy Testing Podcast
…
continue reading
In this episode: Mark is now buying his audiobooks from Libro.fm, and supporting Coles Books. Martin has merged Ubuntu and Nix in Nøughty Linux Nøughty Linux GitHub Project Alan has been live streaming. You can send your feedback via [email protected] or the Contact Form. If you’d like to hang out with other listeners and share your feedback wit…
…
continue reading
1
Why Architect for Human Error When We Can Make People Feel Really Bad About It?
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility. In this episode Mindset over tools When hygiene becomes risk Systems for actual humans Conversations over compliance Huge than…
…
continue reading
1
Running Doom in TypeScript with Dimitri Mitropoulos
1:00:51
1:00:51
Play later
Play later
Lists
Like
Liked
1:00:51Doom has seemingly been ported to every electronic device imaginable, including picture frames, lamps, and coffee machines. The meme of “it runs Doom” has become so widespread that it spawned the r/itrunsdoom sub-Reddit. Recently, Doom made headlines again for being ported to TypeScript. The project involved representing Doom entirely in TypeScript…
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
…
continue reading
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.…
…
continue reading
We tend to picture cyberattacks as distant battles—state hackers, big targets, glowing maps of global chaos. But often, the frontlines are more local: a water plant, a 911 system, the power lines outside your window. In this CyberMonday crossover with WAMU’s 1A, we examine a small-town breach, the fragility of our digital infrastructure—and what it…
…
continue reading
1
Career Fundamentals - Avoid Career Traps by Focusing on Primary Paths of Improvement
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30If you're looking to accelerate your career growth, this episode gives you what may feel like hard truths about the path forward. So many engineers fall into traps of overthinking, chasing minor optimizations (like 5% or 10% productivity boosts), or playing the games of politics and networking. While these sideline activities aren't necessarily use…
…
continue reading
Our Bike Shed trio check back in with one another to follow up on some topics that caught their attention over the course of season 1. Sally covers her time working with React over the last few months and the challenges it still presents to her workflow, Joël goes back over typescripts and the benefits he’s found when debugging, and the cast reflec…
…
continue reading
1
CISA orders feds to patch OIM, Delta Dental incurs breach, Ukraine postal operator systems down
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31CISA orders feds to patch OIM Delta Dental of Virginia incurs data breach Systems down at postal operator in Ukraine Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your orga…
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading
Ryan is joined by Jared Quincy Davis, CEO and co-founder of Mithril, to explore the importance of efficient resource allocation and GPU utilization in AI, the myth and misconceptions of the GPU shortage, and how the economics of GPU will change with new scheduling and utilization strategies. Episode notes: Mithril’s omnicloud platform aggregates an…
…
continue reading
1
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
…
continue reading
1
Department of Know: Overconfidence new zero-day, FCC torches Salt Typhoon rules, AI uninsurable
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Keith Townsend, Keith Townsend, host CTO Advisor Podcast, founder of The Advisor Bench, and creator of the Virtual CTO Advisor; and Howard Holton, CEO, GigaOm Thanks to our show sponsor, Knowbe4 Cybersecurity isn't just a tech problem—it's a human one. Tha…
…
continue reading