Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming's seminal work described in his New Economics book - System of Profound Knowledge ( SoPK ). We'll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming's ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Where Automation Meets Security
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at TechTarget.
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Frans Oudendorp will talk with guests about Security related items. Most of the topics will be related to Microsoft Security.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Step into the DevOps Sauna with Darren Richardson and Marc Dillon as they dive deep into Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. DevOps Sauna makes sure you have all of the latest practices and trends to maintain a competitive edge.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
1
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
John Gilroy
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
…
continue reading
Security Boulevard Chats is the companion podcast to SecurityBoulevard.com. Hosted by long time cyber insiders, Techstrong CEO Alan Shimel and Techstrong CTO and GM Mitch Ashley discuss cyber-related topics making tomorrows headlines.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The show where we invite wonderful human beings to have a lightning-fast conversation about Devs, Ops and other Mythical Creatures. The show where each episode only lasts 15 minutes and we are focused on asking only 3 questions. So it’s short and sweet? Why? Well, because if there’s one thing we know it’s that great delivery comes in small batches.
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading
1
Continuous Discussions (#c9d9) - Community Podcast Discussing Agile, DevOps & Continuous Delivery
Electric Cloud
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what’s happening in the tech space — from startups to industry leaders, emerging tech, and what’s ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
In Post Mortem, engineers reflect on real-life incidents of IT systems they experienced. In each episode, we zoom on a specific event, ranging from a system outage, a cyber-attack, or a machine learning algorithm going wild with production data. We try to understand what happened and how the people behind those systems solved the situation. Along the way, you'll get hands-on advice shared by experienced practitioners that you can implement within your team to limit the risk of such incidents.
…
continue reading
The IBM Cloud podcast - covering capabilities, methods, and discoveries
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Welcome to Lessons in Cybersecurity. In this podcast, you’ll find effective strategies and tangible tactics you can apply in your organization to tighten network security. Avishai Wool is a professor at Tel Aviv University and co-founder and CTO of AlgoSec, the world‘s leading application connectivity and security policy company. He has served on the program committees of the leading IEEE and ACM conferences on computer and network security, has published more than 110 research papers and ho ...
…
continue reading
The CIO exchange podcast features technology and business leaders from around the world, discussing what's working, what's not, and what's next. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. This podcast is produced by VMware, a ...
…
continue reading
The Bee in Cyber Podcast is a brand new UK cyber careers podcast, focussed on the people who work within cyber security. The podcast will interview and showcase the diverse individuals who work in cyber security, their career journeys, and showcase all sides of the cyber hive. This podcast is not just for people who want to be in cyber, it is for all of the worker bees, who are 2 years plus into their career, and now thinking what is next for me? How do I get to where I want to be? We want t ...
…
continue reading
The podcast for Security Architecture Hosted by Moshe Ferber and Ariel Munafo. The world of software development has changed rapidly in the last years due to various factors – Cloud Computing, Digital Transformation, CI/CD & DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The sec ...
…
continue reading
Join Andrey and Mattias as they sit down with Paulina Dubas, an independent DevOps consultant and public speaker. Who is Paulina, and what experiences does she bring to the table? What topics particularly resonate with her? Tune in to learn more about Paulina since we have a feeling that she is here to stay Connect with us on LinkedIn or Twitter (s…
…
continue reading
1
CCT 191: Practice CISSP Questions - SDLC, Agile, and DevSecOps (Domain 8.1)
18:30
18:30
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
18:30
Send us a text Discover the hidden threats lurking in your kitchen appliances and learn why your next air fryer might be spying on you. On this episode of the CISSP Cyber Training Podcast, we unravel the alarming findings from Infosecurity Magazine about Chinese IoT devices and their potential to invade your privacy. We emphasize the critical impor…
…
continue reading
1
Navigating DevSecOps with GitHub: Insights from April Yoho
43:45
43:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
43:45
In this engaging episode of the TalkingSecurity podcast – DevSecOps series, host Frans Oudendorp, along with co-hosts Pouyan Khabazi and Sander ten Brinke, sits down online with special guest April Yoho from GitHub. Together, they explore April's unique journey in the DevSecOps field, delve into the world of GitHub and GitHub Advanced Security, and…
…
continue reading
1
Kayra Otaner -- DevSecOps
32:46
32:46
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
32:46
Kayra Otaner joins the podcast today to discuss DevSecOps and answer the question, is it dead? Kayra is the Director of DevSecOps at Roche and is highly involved in the DevSecOps community. Kayra states that DevSecOps in its traditional form is “dead” and that each organization should approach its needs based on their size. Otaner introduces the co…
…
continue reading
1
Building Resilient, Secure Software: Lessons from DevSecOps Experts
47:32
47:32
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
47:32
Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face t…
…
continue reading
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
…
continue reading
1
Data, observability and the future of DevSecOps
17:48
17:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:48
Esteban Gutierrez is chief information security officer and vice president of information security at observability vendor New Relic. Previously, he was an enterprise information security strategist at Intel, and he managed the network operations and security center for the US Army Corps of Engineers. He shares takeaways from New Relic's recent Sta…
…
continue reading
1
Ep. 187 Accelerating Application Refactoring with AI in DevSecOps
21:07
21:07
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:07
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Joel Krooswik from Gitlab has seen more code reviews than he can count. He has seen duplicate code, insufficient data, and insecure code. "Work harder" may be the maxim in the NFL, but this is a fool's errand rega…
…
continue reading
1
The Ongoing Challenges of DevSecOps Transformation and Improving Developer Experience
25:01
25:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
25:01
This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast Shane Hastie, Lead Editor for Culture & Methods spoke to Adam Kentosh about the ongoing challenges organisations face in their DevOps DevSecOps and digital transformation journeys.Read a transcript of this interview: https://bit.ly/3zS…
…
continue reading
No interview this week! Instead, Justin & Autumn sit down to talk about what they’ve been learning recently. Join the discussion Changelog++ members save 8 minutes on this episode because they made the ads disappear. Join today! Sponsors: Fly.io – The home of Changelog.com — Deploy your apps close to your users — global Anycast load-balancing, zero…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 85
13:42
13:42
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:42
Chris Steffen and Ken Buckler from EMA discuss end of year planning and budgeting for cybersecurity next year.Enterprise Management Associates + DEVOPSdigest tarafından oluşturuldu
…
continue reading
1
Making Digital Accessibility More Than Just High Contrast: Building Truly Inclusive Software
27:59
27:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
27:59
This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke to accessibility expert Sheri Byrne-Haber, about how digital accessibility goes far beyond just high contrast colours. The discussion is emphasizing that it encompasses making prod…
…
continue reading
1
Airgaps over AI? Cyberdefense pro's tips and predictions
23:14
23:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:14
Robert Slaughter is CEO of Defense Unicorns, a defense tech startup specializing in Airgap software delivery in highly secure and sensitive environments in the military and federal government. Previously, he was director of the U.S. Department of Defense's Platform One DevSecOps project and co-founder at Space CAMP, a predecessor of Platform One fo…
…
continue reading
1
Ep. 193 Evolution of DevOps to AIOps
23:14
23:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:14
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Everyone awake in biology class remembers the difference between a somatic and an autonomic nervous system. (Cheat sheet: You can control somatic, but the other kicks in without knowing.) What does this have to do…
…
continue reading
1
CR082: Surviving migration in the age of AI with Petra Molnar, Harvard Faculty Associate
43:37
43:37
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
43:37
As more people are displaced by war, economic instability, and a warming planet, more countries are turning to AI-driven technology to “manage” the influx. This week, Dave, Esmee and Rob talk to Petra Molnar, Harvard Faculty Associate and Author of 'The Walls Have Eyes'' about how tech is being deployed at borders, how it is impacting communities a…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Ep 192 Forensic Analysis and Digital Footprint
19:20
19:20
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
19:20
Ep 192 Forensic Analysis and Digital Footprint Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Cellebrite is a company that earned its stripes in the commercial world with its ability to find a needle in a haystack. In other words, they have developed an abilit…
…
continue reading
1
CCT 190: Integrating Security in Software Development - Exploring SDLC, Agile, and DevSecOps for the CISSP (Domain 8.1)
46:13
46:13
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
46:13
Send us a text Unlock the secrets of integrating security within every phase of software development as we tackle Domain 8 of the CISSP exam. Our exploration begins with a deep dive into the software development lifecycle (SDLC) and its various methodologies like Agile, Waterfall, DevOps, and DevSecOps. Through a gripping tale of a Disney World IT …
…
continue reading
1
AI & Emerging Tech for a Better Future with Marsha Maxwell
59:10
59:10
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
59:10
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss …
…
continue reading
1
AI's Role in Automotive Cyber Security – PlaxidityX Ep 4
13:31
13:31
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:31
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
…
continue reading
1
196 - What are Shared Fate Model and Trust Anchors?
28:46
28:46
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:46
Enjoying the content? Let us know your feedback! In this week's episode I will unpack the complexities of the cybersecurity world and help you stay informed and secure. Today, we’re going to dig into some intriguing concepts shaping the cybersecurity landscape: the Shared Fate Model and Trust Anchors. Some say these concepts are becoming so vital i…
…
continue reading
1
Infosec & OpenTelemetry
1:08:45
1:08:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:08:45
Maybe Jira for your kids’ chores is a good idea… Probably not. Join the discussion Changelog++ members save 11 minutes on this episode because they made the ads disappear. Join today! Sponsors: Sentry – Code breaks, fix it faster. Don’t just observe. Take action. Sentry is the only app monitoring platform built for developers that gets to the root …
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 84
11:24
11:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:24
Chris Steffen and Ken Buckler from EMA discuss using AI to influence elections and election security in general.Enterprise Management Associates + DEVOPSdigest tarafından oluşturuldu
…
continue reading
1
The Philosophical Implications of Technology: A Conversation with Anders Indset
27:51
27:51
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
27:51
This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast Shane Hastie, Lead Editor for Culture & Methods spoke to Anders Indset, a Norwegian-born philosopher focusing on the implications of technology for humanity.Read a transcript of this interview: https://bit.ly/3YnDOTGSubscribe to the So…
…
continue reading
1
CCT 189: Practice CISSP Questions - Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
20:39
20:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
20:39
Send us a text Unlock the keys to safeguarding the future of our global supply chains as we tackle the formidable intersection of IT and OT environments in cybersecurity. Imagine the chaos if operational technology systems on ships and cranes were compromised. Discover how the notorious Maersk hack serves as a cautionary tale illustrating the poten…
…
continue reading
1
SecOps "where bits and bytes meet flesh and blood"
25:00
25:00
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
25:00
Joshua Corman is executive in residence for public safety & resilience at The Institute for Security and Technology (IST), a non-profit think tank based in the San Francisco Bay Area. He is also co-leader of a Cybersecurity and Infrastructure Security Agency (CISA) community working group for SBOM on-ramps & adoption. Previously, he was vice presid…
…
continue reading
1
Ep. 190 The Surge of Google Public Sector
19:04
19:04
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
19:04
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Google's public sector has exploded into the federal technology marketplace. Today, we recapitulated the recent Google Public Sector event and tried to understand the reasons for the success. Our guest is Troy Ber…
…
continue reading
1
CR081: Cloud on the rocks [AAA]
59:21
59:21
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
59:21
[AAA] In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they try to unpick some issue or other. It might get a bit messy. This week, sometimes ‘big rocks’ exist in organizations and transformations that prevent or slow down getting to successful outcomes. Dave, Esmee and Rob are joined by, Georgia Smith, Cloud T…
…
continue reading
1
ep2024-10 Don't be Scared, It's just a Pen Test with Brad Causey
37:19
37:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
37:19
There's no reason to be scared about a pen test - especially when it's run by a professional like Brad Causey. I catch up with Brad in this episode to discuss what's recently changed in pen testing in how you test and people's motivations for hiring a pen testing. Interesting and not spooky at all.Show Links:Brad on LinkedIn- https://www.linkedin.c…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Ep. 190 Going Deeper with Federal User Experience
22:41
22:41
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:41
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Humans can be easily deceived. You look at an iceberg and think that is all you have; the same approach can be applied to federal websites. At first glance, you notice the visual and do not understand how the webs…
…
continue reading
1
A product-driven approach to platform engineering
30:01
30:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:01
Send us a text In this episode, Darren and Marc are joined by Dan Grøndahl and Emma Dahl-Jeppesen. Emma and Dan advocate for a product-driven approach to platform engineering, with clear boundaries and purpose to prevent team burnout—a shift from traditional, sometimes ambiguous DevOps roles. They humorously explore “10 things we hate about platfor…
…
continue reading
1
CRSP01: Reimagining Telecom Industry pt.1 - Simplification with Dr. Rainer Deutschmann, Global Telecom Leader
1:01:18
1:01:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:01:18
Telecoms is an industry undergoing a fundamental change. This is creating new business opportunities and services, but also brings with it substantial transformation and modernization challenges. In a new 5 part mini-series, 'Reimagining Telecoms', we are going to look at the challenge through five different lenses: Growth, Networks, Simplification…
…
continue reading
1
CCT 188: Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
27:57
27:57
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
27:57
Send us a text Ready to elevate your cybersecurity acumen and conquer the CISSP exam? Tune in to our latest episode, where we unravel the intricacies of a significant ransomware attack that exploited a supply chain vulnerability, impacting 60 US credit unions via the Citrix bleed vulnerability. This real-world scenario stresses the necessity of sec…
…
continue reading
1
S4 E22 - Dr. Jabe Bloom - Navigating the Myths and Realities of AI with Pragmatism
1:09:51
1:09:51
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:09:51
In this episode of The Profound Podcast, I sit down with Dr. Jabe Bloom, a researcher and expert in systems thinking, AI, and digital transformation. We explore Eric Lawson’s book The Myth of AI, tackling the contentious debate around artificial general intelligence (AGI). Dr. Bloom offers insights from his dissertation and divides the ongoing disc…
…
continue reading
1
ECU Cyber Security: SELinux & Host Protection – PlaxidityX Ep 3
10:48
10:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
10:48
As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
…
continue reading
1
195 - Top Common Password Attacks and How to Defend Against Them
38:15
38:15
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
38:15
Enjoying the content? Let us know your feedback! Lets face it, the cyber crooks are always lurking aroud waiting for an opportunity to come in. They choose the path of least resistant and password is often their way in. Unfortunately password is still with us and for sometime to come too. In today episode, we’re digging deep into top common types o…
…
continue reading
1
Your customer is Amazon.com
1:15:21
1:15:21
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:15:21
From switching ISPs to migrating Amazon off Oracle, Pete Naylor knows which database to use. Join the discussion Changelog++ members get a bonus 8 minutes at the end of this episode and zero ads. Join today! Sponsors: Fly.io – The home of Changelog.com — Deploy your apps close to your users — global Anycast load-balancing, zero-configuration privat…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 83
14:25
14:25
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
14:25
Chris Steffen and Ken Buckler from EMA discuss communications security.Enterprise Management Associates + DEVOPSdigest tarafından oluşturuldu
…
continue reading
1
Using a Product Value Curve to Prioritize Work
16:11
16:11
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
16:11
This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast Shane Hastie, Lead Editor for Culture & Methods spoke to Lakshmi Uppala about the product value curve and her involvement in women in tech communities.Read a transcript of this interview: https://bit.ly/3A8w8NaSubscribe to the Software…
…
continue reading