show episodes
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
H
Hacked

1
Hacked

Sticks & Stones

Unsubscribe
Unsubscribe
Monthly
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
 
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, Director of Content Brian Neville-O'Neill, and PodRocket producer Kate Trahan, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
 
Loading …
show series
 
In this episode, we talk about the newest release of Node.js 18 with Beth Griggs, Senior Software Engineer at RedHat and Node.js TSC Member, what the new features are, how devs can contribute, and the future of Node. Links https://events.linuxfoundation.org/openjs-world/ https://github.com/nodejs/node https://github.com/nodejs/help https://twitter.…
 
Gill Hoffer, co-founder and CTO at Salto, talks with SE Radio host Kanchan Shringi about a new persona -- the Business Engineer -- created by the rise of SaaS and adoption of best-of-breed business applications for back office systems. They examine...By IEEE Computer Society
 
In this episode of Syntax, Wes and Scott talk through TypeScript tooling, build tools, configs, and editors. LogRocket - Sponsor LogRocket lets you replay what users do on your site, helping you reproduce bugs and fix issues faster. It’s an exception tracker, a session re-player and a performance monitor. Get 14 days free at logrocket.com/syntax. M…
 
Productivity measurements often show nothing of value at all. Today we'll discuss how complexity (or "story") points may actually show exactly the opposite of productivity. 🙏 Today's Episode is Brought To you by: Instabug Building and maintaining mobile applications is not simple. Through comprehensive bug and crash reports, performance monitoring …
 
This week we’re talking with Bruce Schneier — cryptographer, computer security professional, privacy specialist, and writer (of many books). He calls himself a “public-interest technologist”, a term he coined himself, and works at the intersection of security, technology, and people. Bruce has been writing about security issues on his blog since 20…
 
[00:02:49] Jason and Andrew have been working on some GitHub actions and what’s been going on with that. Also, Jason and Chris challenge Andrew to do the typing speed test before the end of this episode! ☺ [00:06:07] We hear about a cool thing Andrew’s been working on, Chris and Jason tell us they ran out of build minutes, and Andrew mentions “act”…
 
Supabase, the open-source database-as-a-service company, raised $80 million in Series B funding in a round led by Felicis Ventures. In case you were wondering: YYes, the company is named for the Nicki Minaj song!. Today in tech recs: Cassidy recommends budgeting app Lunch Money for everything from crypto to cash. Matt recommends Magnet for window m…
 
Thanks for tuning in to a brand new episode of the Secure Developer! Joining us in conversation today is Peter Oehlert, Chief Security Officer at Highspot. We hear about Peter’s journey with Facebook, Smartsheet, and Microsoft, learn the difference between establishing a new security practice when there is an existing security culture and when ther…
 
A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 Decemb…
 
Popular open source libraries leaked keys for “research” DuckDuckGo gives Microsoft a pass on trackers Microsoft weathers the vulnerability storm Thanks to today’s episode sponsor, Optiv Need a guide on your Zero Trust journey? Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise Guide" shares the following t…
 
Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of social engineering she's seen from her experience, Dave and Joe share some listener follow up about macros in Office documents, Joe's has two stories this w…
 
How do you modernize a .NET application? While at NDC Porto, Carl and Richard talked to Mark Rendle about his work on Visual Recode, a tool for migrating WCF apps to gRPC, and dug into the broader story of what a modern .NET application looks like. Mark talks about why you would bother to modernize at all - because the standard framework isn't goin…
 
One of the challenges with Microservices architecture is how you manage dependencies between your services when implementing workflows. Conductor is an open-source microservices and workflow orchestration platform. Boney Sekh co-founded Orkes Inc – a company focused on offering Conductor as a service. Boney joins the show to discuss how engineers l…
 
Using NMAP to Assess Hosts in Load Balanced Clusters https://isc.sans.edu/forums/diary/Using+NMAP+to+Assess+Hosts+in+Load+Balanced+Clusters/28682/ Attacker Modifying Libraries Claims "Research" https://www.bleepingcomputer.com/news/security/hacker-says-hijacking-libraries-stealing-aws-keys-was-ethical-research/ Heroku GitHub Integration Re-Enabled …
 
Gill Hoffer, co-founder and CTO at Salto, talks with SE Radio host Kanchan Shringi about a new persona — the Business Engineer — created by the rise of SaaS and adoption of best-of-breed business applications for back office systems. They examine the evolution of tooling for developers and IT and the parallels with tooling needed […]…
 
Soon there will be no shame in that snake game, the big trend that is not our friend, and Microsoft reinvents the widget. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Tailscale: Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. Support Coder Radio…
 
More cyberespionage targets Russian networks. Lincoln Project veterans visit Ukraine with advice on conducting an influence campaign against President Putin. A politically motivated DDoS attack hits the Port of London Authority website. Is REvil back and looking into new criminal techniques, or is a recent DDoS campaign the work of impostors? Ranso…
 
On May 24, several news outlets reported on the internal workings of a Chinese run Uyghur internment camp in Xinjiang. The reports included detailed blueprints of the camp’s interiors, classified speeches from officials, and the personal information of police officers. An anonymous source hacked the information and got it out of China and into the …
 
We talk to Michele Riva, Senior Software Architect for Nearform, about his recent BeJS conference talk, "Compiling and bundling JavaScript," including why it's difficult and how to make it painless. Links https://www.bejs.io/conf https://twitter.com/MicheleRivaCode https://www.nearform.com https://webpack.js.org/concepts/module-federation https://e…
 
#160: If you are new to Continuous Integration/Continuous Delivery (CI/CD), you may be a little overwhelmed. There are so many tools and technologies out there to choose from, and it can be difficult knowing where to start. You may have heard of or even tried some of the tools on your own, but without success. What if we told you that the tools tha…
 
In this episode, Tracy Lee speaks with Alaina Percival, CEO of Women Who Code, an international non-profit working to support women in their tech careers. Alaina talks about many of the challenges women face while pursuing careers in technology, particularly in Software Engineering, and what resources Women Who Code offers to help women remain, and…
 
Interpol warns nation-state malware could become a commodity on dark web soon General Motors Hit by cyber-attack exposing car owners' personal info Canada to ban China's Huawei and ZTE from its 5G networks Thanks to today’s episode sponsor, Optiv Up for a Zero Trust Crash Course? Join our expert, Jerry Chapman, Engineering Fellow at Optiv and autho…
 
Notifications have typically been an area of a product where building in-house has been the only option. However, building a best-in-class notifications system that delivers a great customer experience requires a significant investment when you start to layer in complexities like batching, cross channel orchestration, and user preferences. Chris Be…
 
ctx Python Library Updated with "Extra" Features https://isc.sans.edu/forums/diary/ctx+Python+Library+Updated+with+Extra+Features/28678/ Zoom Updates https://explore.zoom.us/en/trust/security/security-bulletin/ VMWare Exploit About to Be Released https://twitter.com/Horizon3Attack/status/1528935531333177344 Zyxel Firewalls, AP Controllers, APs Patc…
 
Picture of the Week. Emergency mid-cycle update for Active Directory. Clearview AI -vs- {Illinois, Australia, Canada and the United Kingdom}. Clearview AI in Ukraine. Pwn2Own Vancouver 2022. The DoJ takes a welcome step back. Sometimes, unlocking can be too convenient. Closing The Loop. Dis-CONTI-nued: The End of Conti? We invite you to read our sh…
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: Conti’s war against Costa Rica DoJ revises CFAA guidance Naughty kids get access to DEA portal A look at a Russian disinfo tool PyPI and PHP supply chain drama Much, much more This week’s show is brought to you by Thinkst Canary. Its founder Haroon Meer w…
 
Verizon's 2022 Data Breach Investigation Report shows a sharp rise in ransomware. Origins of the Chaos ransomware operation. The GuLoader campaign uses bogus purchase orders. Security researchers are targeted in a malware campaign. Hyperlocal disinformation. Turla reconnaissance has been detected in Austrian and Estonian networks. Ben Yelin describ…
 
This week’s Cyberlaw Podcast covers efforts to pull the Supreme Court into litigation over the Texas law treating social media platforms like common carriers and prohibiting them from discriminating based on viewpoint when they take posts down. I predict that the court won’t overturn the appellate decision staying an unpersuasive district court opi…
 
In June 2012, an anonymous hacker posted a list of 6.5 Million encrypted passwords belonging to LinkedIn users on a Russian hacker forum. It was soon discovered that these passwords were hashed using an outdated and vulnerable hashing algorithm – and were also unsalted. The lawsuits followed suit shortly… what is ‘hashing’ and ‘salting’, and can we…
 
We talk to Ramiro Berrelleza about Okteto, a platform to help software teams launch dev environments into the cloud, and about his recent talk about developer experience at the DevX conference. Links https://www.okteto.com/ https://twitter.com/rberrelleza https://www.ycombinator.com/ https://www.youtube.com/c/OktetoHQ/featured https://www.okteto.co…
 
All links and images for this episode can be found on CISO Series I have talked to vendors who get all excited about Gartner opening up a new category for them. All I can think is uggh, something new to confuse the security marketplace. I know there's a need to label products in categories to simplify sales. But the complexity is driving buyers nut…
 
Cyberattack divorces Zola users from registries A look at the RansomHouse data-extortion operation Now we have to worry about pre-hijacking attacks Thanks to today’s episode sponsor, Optiv Need a guide on your Zero Trust journey? Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise Guide" shares the following…
 
Companies like Meta, Twitter, and Netflix are enacting hiring freezes and layoffs, a situation that’s not great for anybody but is likely to have outsize effects on people of color in tech. Gen Z may not understand file structures, but they sure understand Twitter toxicity. MegaBlock from Gen Z Mafia allows users to block bad tweets, their authors,…
 
Steph has a baby update and thoughts on movies, plus a question for Chris related to migrating Test Unit tests to RSpec. Chris watched a video from Google I/O where Chrome devs talked about a new feature called Page Transitions. He's also been working with a tool called Customer.io, an omnichannel communication whiz-bang adventure! Page transitions…
 
Attacker Scanning for jQuery-File-Upload https://isc.sans.edu/forums/diary/Attacker+Scanning+for+jQueryFileUpload/28674/ Oracle Security Alert Advisory - CVE-2022-21500 https://www.oracle.com/security-alerts/alert-cve-2022-21500.html How to find NPM dependencies vulnerable to account hijacking https://www.theregister.com/2022/05/23/npm_dependencies…
 
There’s a new loader identified in wiper campaigns. President Putin complains of sanctions and cyberattacks, and vows to increase Russia's cybersecurity. Coordinated inauthenticity at scale. Killnet crows large over Italian operations. Conti's dissolution doesn't mean its operators' disappearance. Rick Howard looks at software defined perimeters. D…
 
In this episode, Dave and Jamison answer these questions: I recently told my boss I thought my comp was below market value and that, while I enjoy working here, I may have to start looking elsewhere for my next opportunity unless there was a way to adjust my salary. He actually agreed with me and said he would go to HR to see what he could do. A fe…
 
In this episode of Syntax, Scott talks about his new office setup where he records videos and podcasts, writes codes, and gets his steps in. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix err…
 
Adam Tornhill is a programmer who combines degrees in engineering and psychology. He's the founder of CodeScene where he designs tools for software analysis. He’s also the author of Software Design X-Rays, the best-selling book Your Code as a Crime Scene, Lisp for the Web, and Patterns in C. Adam’s other interests include modern history, music, and…
 
In this episode, we talk about how to think like a CTO with Joel Beasley, author of Modern CTO, and host of the Modern CTO podcast. Joel talks about getting hit by a car when he was younger and using that rehabilitation period to learn how to code, selling his first technology at the age of 18 for one million dollars, and what he’s learned from int…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login