Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast about web design and development.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
The State and Popular Culture
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
next generation web podcast
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
A place for elite leaders and teams.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Technical interviews about software topics.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
We talk about everything to do with coding bootcamps and technology education, including gender parity, scholarships, and the latest industry news.
…
continue reading

1
SE Radio 665: Malcolm Matalka on Developing in OCaml with Zero Frameworks
56:10
56:10
Play later
Play later
Lists
Like
Liked
56:10Malcolm Matalka, founder of Terrateam, joins host Giovanni Asproni to talk about the reasoning behind the choice of a not-so-widespread language (OCaml) and the (almost) total avoidance of frameworks for the development of Terrateam. While discussing the reasons for choosing a specific programming language and the advantages and disadvantages of us…
…
continue reading

1
Make sales not features (Interview)
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Kendall Miller is a bubbly extrovert who sticks his fingers in a lot of pies. He advises tech companies like FusionAuth, positions tech products like Civo & Tensorlake, organizes tech networks like CTO Lunches, and even sells whiskey & gin to tech people like us via his Friday Deployment Spirits brand. Kendall has learned a lot since he first enter…
…
continue reading

1
Microsoft Recall updates, Russian orgs deal with networking software updates, SSL.com certificate issuance vulnerability
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stop…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading

1
Shift-M/54: Michael Feathers on software engineering and testing
58:19
58:19
Play later
Play later
Lists
Like
Liked
58:19The video is here: https://www.youtube.com/watch?v=Wv3o4ORYv48By Yegor Bugayenko
…
continue reading

1
Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several…
…
continue reading
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading

1
896: Do I Still Need To Know JS/CSS/HTML with AI? × How To Sell An App × Is React Context Bad? × More
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57By Syntax
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
…
continue reading
If your organization is laser-focused on epics, features, and user stories, you may want to shift your attention to something else that can have an even greater impact on your product or solution. Michele Lanzinger, strategic advisor at Scaled Agile, explains what and why in this episode. Like what you hear? Connect with Michele on LinkedIn. Explor…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
881: Beyond GPUs: The Power of Custom AI Accelerators, with Emily Webber
1:17:06
1:17:06
Play later
Play later
Lists
Like
Liked
1:17:06Emily Webber speaks to Jon Krohn about her work at Amazon Web Services, from its Annapurna Labs-developed Nitro System, a foundational technology that can enhance securities and performance in the cloud and how Trainium2 became AWS’ most powerful AI chip with four times the compute of Trainium. Hear the specs of AWS’s chips and when to use them. Ad…
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading

1
Google OAuth abused, Japan's trading scams, hijacking with Zoom
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Google OAuth abused in DKIM replay attack Japan warns of sharp rise in unauthorized trading North Koreans hijacking Zoom’s Remote Control Huge thanks to our sponsor, Dropzone AI Security threats don't clock out at 5 PM, but your analysts need to sleep sometime. Dropzone AI delivers around-the-clock alert investigations with the same attention to de…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
This week, how a global game of cat and mouse led to a friendship—and an unexpected redemption. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Shift-M/55: Richard Pawson about Naked Objects and OOP
1:09:40
1:09:40
Play later
Play later
Lists
Like
Liked
1:09:40The video is here: https://www.youtube.com/watch?v=x6LKw-iQHZQBy Yegor Bugayenko
…
continue reading

1
Visually orchestrating data diagnostics but platform agnostic
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02Dataiku orchestrates data stacks and lets you create analytics, models, and agents. Find Florian on LinkedIn. This episode was recorded at HumanX last month. Next year’s conference will be April 6-9, 2026 in San Francisco. Register today!By Stack Overflow
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading

1
The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04In this episode, I break down what I believe is the emerging structure of the AI-powered world we're all building—consciously or not. I call it the “Four A’s”: Assistants, APIs, Agents, and Augmented Reality. This framework helps make sense of recent developments and where it’s all headed. I talk about: 1. Digital Assistants That Understand and Opt…
…
continue reading
Home For Good; LabHost Takedown and 250k More Pwned Passwords; Samsung Germany Data Breach; The New HIBP Personal Breach Page ; Sponsored by 1Password https://www.troyhunt.com/weekly-update-448/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts. The alleged operator…
…
continue reading
We drop our fourth Changelog Beats album, Dex Horthy proposes the 12-factor AI agent, Thorsten Ball takes us step-by-step through building a coding agent, Zachary Huang builds an LLM framework in 100 lines of code & Philip Laine’s Spegel project gets unknowingly forked by Microsoft. View the newsletter Join the discussion Changelog++ members save 1…
…
continue reading

1
#240: Why I repositioned Feature Upvote to the video game industry
18:20
18:20
Play later
Play later
Lists
Like
Liked
18:20I want to tell you what's happening with my product, Feature Upvote, over the last year or so. I've dramatically changed the positioning, to be a feedback management platform for the video games industry. Here's the story of why I repositioned - and how I did it. Check out the new "video games industry"-focused Feature Upvote home page.…
…
continue reading

1
Episode 457: How do I get off the on-call rotation and "big tech" == "big leagues"?
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25In this episode, Dave and Jamison answer these questions: I am a senior software engineer in a big tech/faang company and this week is my first ever on call rotation. My team is doing a lot of CI work, monitoring pipelines and support queues during on call. It is probably not as much of a hassle as on call for product teams, but for me personally o…
…
continue reading

1
895: React Server Components: Where are we at?
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44Scott and Wes break down the current state of React Server Components — what they are, how they work, and why they’re so controversial. From framework support to bundling complexity, it’s everything you need to know about RSC in 2025. Show Notes 00:00 Welcome to Syntax! 01:01 Brought to you by Sentry.io. 01:55 What exactly are React Server Componen…
…
continue reading

1
661: Working Vacations, Ripping Out JavaScript, and Non-US Cloud Service Options
58:56
58:56
Play later
Play later
Lists
Like
Liked
58:56Show Description What are the non-US cloud services options, falling off the blogging train and trying to get back on, working on vacation, Chris recaps the Alaskan Folk Festival experience, how often do you go back and clean out JavaScript, and the idea of gilding just one lily on a new project. Listen on Website → Links European Alternatives A la…
…
continue reading
April is a senior developer advocate and DevOps practice lead for GitHub, specializing in application transformation and DevOps ways of working. Her focus is working on Microsoft Azure to take customers on a journey from legacy technology to serverless and containers, where code comes first, while enabling them to take full advantage of DevOps. Apr…
…
continue reading

1
Microsoft Entra lockouts, wine tasting malware, job scam solution
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23Widespread Microsoft Entra lockouts cause by new security feature rollout Malware delivered through diplomatic wine-tasting invites British companies told to hold in-person interviews to thwart North Korea job scammers Huge thanks to our sponsor, Dropzone AI Growing your MSSP client roster while your alerts are multiplying? Dropzone AI works alongs…
…
continue reading

1
Cybersecurity Today: Allegations Against Elon Musk, Microsoft Lockout Issues, Cozy Bear's New Malware, and Canada's Anti-Fraud Proposals
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Cybersecurity Today: Allegations Against Elon Musk, Microsoft Lockout Issues, Cozy Bear's New Malware, and Canada's Anti-Fraud Proposals In this episode of Cybersecurity Today, hosted by David Shipley, we examine several major cybersecurity stories. A whistleblower accuses Elon Musk's team's involvement in a significant cyber breach at the National…
…
continue reading

1
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
…
continue reading

1
AI’s Impact on Testing Careers with Jason Arbon
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08In this episode, special guest Jason Arbon will be present for a truly eye-opening conversation about the rapidly evolving world of AI-driven software testing. Jason introduces us to the concept of MCP, a powerful AI workflow engine that’s changing how testers interact with tools and offers a behind-the-scenes look at the origins of Testers.AI is a…
…
continue reading

1
Rich Hale: Understanding the data. [CTO] [Career Notes]
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49Please enjoy this encore episode of Career Notes. Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fo…
…
continue reading

1
Crafting malware with modern metals. [Research Saturday]
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. The author …
…
continue reading
In this episode, I walk through a Fabric Pattern that assesses how well a given model does on a task relative to humans. This system uses your smartest AI model to evaluate the performance of other AIs—by scoring them across a range of tasks and comparing them to human intelligence levels. I talk about: 1. Using One AI to Evaluate Another The core …
…
continue reading

1
Week in Review: CISA workforce cuts, AI slopsquatting risk, CVE funding saga
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guest Trina Ford, CISO, iHeartMedia Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…
…
continue reading
A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ sh…
…
continue reading
Nick Nisi joins us to confess his AI subscription glut, drool over some cool new hardware gadgets, discuss why the TypeScript team chose Go for their new compiler, opine on the React team’s complicated relationship with Vercel, suggest people try Astro, update us on his browser habits, and more. Join the discussion Changelog++ members save 7 minute…
…
continue reading
Видео здесь: https://youtube.com/live/KDdZI_PaO9ABy Yegor Bugayenko
…
continue reading
First developed in China, Manus AI and DeepSeek have made great waves on an international scale. Sought-after for their cost-effectiveness compared to US-made tech, Manus AI and DeepSeek are quickly becoming dominant technologies inside the country. In this five-minute Friday, Jon Krohn asks: Do these technologies warrant the huge amount of resourc…
…
continue reading
Alex finally cracks a years-old mystery, Chris reveals his latest experiments, and we share updates on our freshest gear. Plus, a important show update. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 3 users and 100 devices for free. Unraid:…
…
continue reading

1
Cyberthreat sharing law renewal, APTs love ClickFix, GoDaddy mutes Zoom
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54Bipartisan push for renewal of cyberthreat information sharing law ClickFix becoming a favorite amongst state-sponsored hackers GoDaddy puts Zoom on mute for about 90 minutes Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for …
…
continue reading

1
Mic Drop: Former Deputy DNI Sue Gordon: ‘it is conceivable that the world order has already been broken’
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18This week, as national security agencies brace for deep cuts and digital expertise is shed from their ranks, we talk to former Principal Deputy Director of National Intelligence Sue Gordon about what happens when intelligence is stuck in the past. She says the real danger isn’t what we don’t know—it’s what we stop trying to understand. Learn about …
…
continue reading

1
The Secret CISO: Insights and Reflections from Cybersecurity Leaders
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46In this episode of Cybersecurity Today titled 'The Secret CISO,' host Jim Love, along with guests Octavia Howell, Daniel Pinsky, and John Pinard, delves into the personal and professional experiences of Chief Information Security Officers (CISOs). They share their journeys into cybersecurity, discuss the challenges and pressures of their roles, and…
…
continue reading