Application halka açık
[search 0]
Daha fazla
Download the App!
show episodes
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
Unsubscribe
Aylık+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
Unsubscribe
Aylık
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
Unsubscribe
Aylık
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
  continue reading
 
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
  continue reading
 
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
  continue reading
 
Welcome to "Reviews on Software Applications," the podcast where we review and discuss the latest software applications. Each episode, we explore new and popular apps, looking at their features, design, and how well they work. Whether you're a developer, tech fan, or just someone who loves trying out new apps, our honest reviews and insights will help you stay informed. Join us as we break down what makes these apps great, share our thoughts, and keep you up-to-date in the digital world.
  continue reading
 
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
  continue reading
 
Artwork

1
Application: The TYPO3 Community Podcast

Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association

icon
Unsubscribe
icon
Unsubscribe
Aylık
 
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
  continue reading
 
Our mission is to build a technology-enabled community to improve the health and wellness of medical patients and user alike, through data optimization of medical cannabis research and production. Our Citizen Green platform is the world’s first medical cannabis network that builds a cross-industries knowledge base which drives confidence in cannabis products, enhances prescription efficacy, and improves the lives of patients around the world.
  continue reading
 
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
  continue reading
 
Loading …
show series
 
Skype hangs up for good, over a million cheap Android devices may be backdoored, parallels between jailbreak research and XSS, impersonating AirTags, network reconnaissance via a memory disclosure vuln in the GFW, and more! Show Notes: https://securityweekly.com/asw-321
  continue reading
 
Keywords AI, business, document management, retrieval augmented generation, proof of concept, facility management, asylum seekers, technology, innovation, data processing Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the practical applications of AI in business, specifically focusing on a proof of concept (POC) they deve…
  continue reading
 
Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons lea…
  continue reading
 
Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
  continue reading
 
Mit dem Aufkommen der Remote-Arbeit hat für viele Mitarbeiter die Anzahl von Video-Meetings sprunghaft zugenommen. Eine Folge davon ist die sogenannte „Meeting-Fatigue“. Sie drückt sich in Erschöpfung und Müdigkeit aus, begleitet von Ungeduld und Konzentrationsproblemen. Derweil sorgt künstliche Intelligenz (KI) während Meeting-Marathons für mehr E…
  continue reading
 
Keywords AI implementation, project canvas, data requirements, skills, metrics, governance, integration, stakeholders, cost analysis, project timeline Summary In this conversation, Bas Alderding and Koen Ter Velde discuss the importance of proper planning in AI implementation, introducing the AI Project Canvas as a structured approach to navigate t…
  continue reading
 
Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
  continue reading
 
Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a fra…
  continue reading
 
Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
  continue reading
 
Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
  continue reading
 
Im Qualitätsmanagement sind „Non-Conformance Reports“ (NCR) oder Nichtkonformitätsberichte wertvoll, um aus Fehlern zu lernen, diese proaktiv zu verhindern und das Unternehmen dem Ziel der „Predictive Quality“ näherzubringen. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/5-tipps-zu-non-conformance-reports-mit-ki/…
  continue reading
 
Generative KI verbraucht Strom, sogar sehr viel Strom. Vor allem das Training der großen Sprachmodelle erfordert aufgrund der benötigten Rechenleistung eine enorme Menge an Energie. Dell Technologies nennt wichtige Maßnahmen, um den Verbrauch und die Umweltauswirkungen zu reduzieren. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digi…
  continue reading
 
Effizientere Prozesse, zufriedenere Kunden und Mitarbeiter. Diese Potenziale haben Software-Roboter im Kundendienst. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/innovationsmotor-rpa-mit-diesen-vier-tipps-bringen-unternehmen-ihren-customer-service-auf-touren-2/EAS-MAG.digital tarafından oluşturuldu
  continue reading
 
Der Kunde ist König, doch ein König kann zum Tyrannen werden. Beispiele dafür gibt es auch aus der virtuellen Welt. Drei Tage Lieferzeit werden klar kommuniziert und der Kunde startet bereits nach einem Tag ein Sperrfeuer an E-Mails. Eine Bewertung fällt negativ aus, obwohl der Online-Shop sämtliche Zusagen eingehalten hat. Eine E-Mail wird nicht b…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Joe Doll, general counsel at Magic Eden, a leading cross-chain NFT marketplace. Join them as they discuss: The transformative impact of the new administration's pro-crypto executive order How stablecoins could cement U.S. dollar dominance Magic Eden's journey to becomin…
  continue reading
 
Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. …
  continue reading
 
Applying forgivable vs. unforgivable criteria to reDoS vulns, what backdoors in LLMs mean for trust in building software, considering some secure AI architectures to minimize prompt injection impact, developer reactions to Rust, and more! Show Notes: https://securityweekly.com/asw-319
  continue reading
 
Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
  continue reading
 
Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
  continue reading
 
Keywords AI, reasoning models, deep research, business applications, AI developments, OpenAI, DeepSeek, market research, automation, technology Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the latest advancements in AI, focusing on reasoning models and deep research tools. They explore how these technologies are evolvin…
  continue reading
 
We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
  continue reading
 
We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Eli Cohen, general counsel at Centrifuge, a platform for tokenized real-world assets. Join them as they discuss: The evolution from traditional finance to tokenized assets How T-Bills are being brought on-chain Building regulatory-compliant RWA infrastructure Designing …
  continue reading
 
Mehran Koushkebaghi, a seasoned engineering expert, delves into the intricacies of systemic security. He draws parallels between civil engineering and IT systems, and explains the importance of holistic thinking in security design. Discover the difference between semantic and syntactic vulnerabilities and understand how anti-requirements play a cri…
  continue reading
 
Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
  continue reading
 
Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
  continue reading
 
Loading …

Hızlı referans rehberi

Keşfederken bu şovu dinleyin
Çal