Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
A podcast about web design and development.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Audio podcasts on software testing.
…
continue reading
next generation web podcast
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Technical interviews about software topics.
…
continue reading

1
#167 From drop-out to software architect with Jason Lengstorf
1:20:55
1:20:55
Play later
Play later
Lists
Like
Liked
1:20:55On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Jason Lengstorf. He learned to code out of necessity building websites for local emo bands. He dropped out of college but eventually worked as an engineer at IBM and has gone on to roles at many other companies doing everything from software architecture to managem…
…
continue reading
Jerod turns Adam into Lego, a Walrus, and a Walrus in the style of Studio Ghibli…and so much more. This is a good one to watch on YouTube. Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Augment Code – Developer AI that uses deep understanding of your large codebase a…
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several…
…
continue reading

1
SE Radio 662: Vlad Khononov on Balancing Coupling in Software Design
56:19
56:19
Play later
Play later
Lists
Like
Liked
56:19Software architect and author Vlad Khononov joins host Jeff Doolittle for a discussion on balancing coupling in software design. They start by examining coupling and its relationship to complexity and modularity. Vlad explains the historical models for assessing coupling and introduces his updated approach, integration strength, which aims to simpl…
…
continue reading

1
Practicing Software Testing – Guest James Lyndsay
52:17
52:17
Play later
Play later
Lists
Like
Liked
52:17Show notes: Practicing Software Testing – Guest James LyndsayBy Testing Podcast
…
continue reading

1
Episode 455: UX designer without a mentor and I get bored too easily and stressed too easily
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this episode, Dave and Jamison answer these questions: A listener named Dakota asks, I’m a UX designer, and I’m constantly looking for growth opportunities. I’m having trouble finding mentors to help challenge me, as every time my boss/senior designer leaves the company, I assume their work and we don’t backfill their spot or my old position. Th…
…
continue reading
Light mode? Dark mode? Scott and Wes break down the best ways to implement theme switching in CSS, from prefers-color-scheme to manual overrides. Plus, tips on handling shadows, icons, and the dreaded flash of dark mode! Show Notes 00:00 Welcome to Syntax! 01:05 Brought to you by Sentry.io. 02:06 Light and dark mode, things to consider. 02:31 Light…
…
continue reading

1
659: CSS Carousel Configurator Demos with Adam Argyle
1:10:29
1:10:29
Play later
Play later
Lists
Like
Liked
1:10:29Show Description Adam Argyle joins us to chat about new CSS features that are demo'd in a carousel configurator - a builder-like experience to help visualize the capabilities of a CSS only Carousel: buttons, markers, paging and inertness. Listen on Website → Guests Adam Argyle Guest's Main URL • Guest's Social CSS at Google. Links Chrome Canary Fea…
…
continue reading

1
NSA Haugh fired, New WinRAR flaw, ChatGPT fake passport
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24Haugh fired from leadership of NSA and Cyber Command WinRAR flaw bypasses Windows Mark of the Web security alerts Researcher creates fake passport using ChatGPT Thanks to our episode sponsor, Nudge Security Nudge Security helps you mitigate security risks stemming from SaaS sprawl by discovering every SaaS account ever created by anyone in your org…
…
continue reading

1
Tax Time Accelerates Phishing Attacks and Cybersecurity Expert Falsifies Credentials: Cyber Security Today for April 7, 2025
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50In this episode of Cybersecurity Today, host David Shipley covers a range of crucial issues. With tax day approaching, Microsoft reports a rise in sophisticated tax-themed phishing campaigns. The IRS has issued a warning against using its name in phishing simulations to avoid legal repercussions. Furthermore, cybersecurity journalist Brian Krebs re…
…
continue reading

1
SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
…
continue reading

1
Defensive Security Podcast Episode 302
1:12:02
1:12:02
Play later
Play later
Lists
Like
Liked
1:12:02In this episode, Jerry and Andrew discuss various cybersecurity topics, including the recent Oracle Cloud security breach, a GitHub supply chain attack, insider threats, and the implications of AI in cybersecurity. They explore the challenges of maintaining trust in cloud services, the complexities of insider threats, and the evolving landscape of …
…
continue reading

1
How To Optimize your Automation CI/CD Pipelines (and Save Money) with Gaurav Mittal
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02Welcome to the TestGuild Automation Podcast! In this episode, host Joe Colantonio sits down with Gaurav Mittal, a cybersecurity, data science, and IT expert with over two decades of experience. Gaurav, recognized for his thought leadership in AI and automation with multiple industry awards, shares his insights on making How To Optimize your Automat…
…
continue reading

1
Rick Howard: Give people resources. [CSO] [Career Notes]
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Respon…
…
continue reading
I’m in Ireland; Dealing with the Phish Fallout; HIBP UX Rebuild Task List; Sponsored by Malwarebytes https://www.troyhunt.com/weekly-update-446/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Bybit’s $1.4B breach. [Research Saturday]
35:32
35:32
Play later
Play later
Lists
Like
Liked
35:32Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com re…
…
continue reading

1
Cybersecurity Month-End Review: Oracle Breach, Signal Group Chat Incident, and Global Cybersecurity Regulations
48:19
48:19
Play later
Play later
Lists
Like
Liked
48:19In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton. The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud bre…
…
continue reading

1
Week in Review: Microsoft’s account bypass, CrushFTP CVE clash, 23andMe warning
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Howard Holton, COO and industry analyst, GigaOm Thanks to our show sponsor, Qualys Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in cl…
…
continue reading
President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransom…
…
continue reading

1
DevOps Transformation: Culture, Strategy, and Lessons Learned with Derek Ferguson
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36Show notes: DevOps Transformation: Culture, Strategy, and Lessons Learned with Derek FergusonBy Testing Podcast
…
continue reading
In this episode, Conor and Bryce chat about Tesla, Twitter and Elon. Link to Episode 228 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Bryce Adelstein Lelbach Show Notes Date Generated: 2025-03-20 Date Released: 2025-04-04 ADSP Episode …
…
continue reading

1
876: Hugging Face’s smolagents: Agentic AI in Python Made Easy
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Small, simple, accessible: Hugging Face makes a huge contribution to the agentic AI wave with its smolagents. Jon Krohn explores how this small-but-mighty new Python library can act as the best personal assistant you never had. Hear about its features and use cases in this five-minute Friday. Additional materials: www.superdatascience.com/876 Inter…
…
continue reading
We're joined by Xe Iaso, who discusses a creative solution to relentless AI bots and the unexpected delights of running an outrageously overpowered homelab. Special Guest: Xe Iaso. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 3 users and 1…
…
continue reading

1
Google patches Quick Share, ChatGPT temporary outage, UK Mail breach
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58Google patches Quick Share vulnerability ChatGPT suffered brief outage Wednesday UK’s Royal Mail investigates data leak claims Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in clear financial terms and focus…
…
continue reading

1
Mic Drop: Nakasone on Vanderbilt's future of war summit
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25More from our exclusive conversation with former NSA Director Gen. Paul Nakasone. He now leads the Institute of National Security at Vanderbilt and will convene a summit on Modern Conflict and Emerging Threats next week. Think cyber warfare, AI, and disinformation and how they will shape wars in the future. He gave us a preview. Learn about your ad…
…
continue reading

1
Cybersecurity Today: Unauthorized Scans, Signal App Usage, AI Image Risks, and a Missing Professor
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18In this episode, host Jim Love discusses a rise in unauthorized network scans targeting Juniper and Palo Alto devices, raising concerns about espionage and botnet activities. The podcast also delves into the controversial use of the Signal app by National Security Advisor Mike Waltz's team for sensitive communications, sparking debates on security …
…
continue reading

1
Is AI a bubble or a revolution? The answer is yes.
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:052024 was a defining year for AI investment. Read the HumanX/Crunchbase report. You can learn more about HumanX or register for next year’s event, April 7-9, 2026 in San Francisco. Follow Stefan on LinkedIn. Follow Jager on LinkedIn.By Ryan Donovan, Stefan Weitz, Jager McConnell
…
continue reading

1
SANS Stormcast Friday, Apr 4th: URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
…
continue reading

1
Tiny Experiments with Anne-Laure Le Cunff
39:47
39:47
Play later
Play later
Lists
Like
Liked
39:47By Scott Hanselman
…
continue reading
A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical C…
…
continue reading

1
Where have all the junior quality roles gone? Ep 83
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45Show notes: Where have all the junior quality roles gone? Ep 83By Testing Podcast
…
continue reading
Whether tech debt is inevitable and where the blame lies, how to properly organise ZFS datasets, and selectively managing updates. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Orchestration Tools – Part 2: Replication SysCloud Over 2,000 IT admins already trust SysCloud to protect their SaaS data. Head t…
…
continue reading

1
ESPIONAGE vs. SALES: The Shocking Connection | Day 8
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01Find your Spy Superpower: https://yt.everydayspy.com/4ffYFzN Espionage, business, and sales, all revolve around the same core principle: Value. The problem is, society has lost their understanding of this simple, powerful word. If you are a career professional, entrepreneur, or just now starting your career/business, you don’t want to miss this les…
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
North Korean IT workers move into Europe, Stripe API skimming unveils theft techniques, Verizon API flaw exposes call history
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26North Korean IT worker army expands operations in Europe Stripe API skimming campaign unveils new techniques for theft Verizon call filter API flaw exposed customers' incoming call history Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Managemen…
…
continue reading

1
568: What does Carbon even mean? With Polly and Otto from True
42:38
42:38
Play later
Play later
Lists
Like
Liked
42:38Sami goes back to school as he asks Otto Terrell and Polly Gupta, head of sustainability and sustainability strategist at True, the key questions around the environmental buzz words of 2025. Sami finds out the differences between carbon neutral and net zero, why the big corporations have been so slow to adopt a sustainable model, and how true is wo…
…
continue reading
This week, we are joined by Daniel Barber, CEO and Co-Founder of DataGrail, to discuss why data privacy should matter to companies in 2025. Ben has the story of a California lawmaker’s proposal to regulate kids’ use of AI companions. Dave's got the story of a reporter's 300 mile trek through rural Virginia in search of license plate readers. While …
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick sh…
…
continue reading
How do you measure the quality of a large language model? Carl and Richard talk to Dr. Jodie Burchell about her work measuring large language models for accuracy, reliability, and consistency. Jodie talks about the variety of benchmarks that exist for LLMs and the problems they have. A broader conversation about quality digs into the idea that LLMs…
…
continue reading

1
SANS Stormcast Thursday Apr 3rd: Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
…
continue reading

1
The 1000x faster financial database (Interview)
1:40:28
1:40:28
Play later
Play later
Lists
Like
Liked
1:40:28In July of 2020, Joran Dirk Greef stumbled into a fundamental limitation in the general-purpose database design for transaction processing. This sent him on a path that ended with TigerBeetle, a redesigned distributed database for financial transactions that yielded three orders of magnitude faster OLTP performance over the usual (general-purpose) …
…
continue reading

1
Chrome & Firefox squash the latest flaws.
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28Google and Mozilla patch nearly two dozen security flaws. The UK’s Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud…
…
continue reading
Brent Jensen and Alan Page Show notes: Episode 217: Remote Work and Big NewsBy Testing Podcast
…
continue reading

1
ep174 Monthly Platform 202503 | mozaic.fm
2:34:26
2:34:26
Play later
Play later
Lists
Like
Liked
2:34:26第 174 回のテーマは 2025 年 3 月の Monthly Platform です。Show Note はこちら: https://mozaic.fm/episodes/174/monthly-platform-202503.htmlBy Jxck
…
continue reading

1
890: Accepting Money on the Internet in 2025
46:27
46:27
Play later
Play later
Lists
Like
Liked
46:27Wes and Scott talk about the ins and outs of accepting payments online—from choosing processors like Stripe and PayPal to handling fraud, taxes, custom checkouts, and more. Show Notes 00:00 Welcome to Syntax! 02:34 Payment processors Stripe PayPal Square Authorize.net 09:29 Checkouts 18:22 The checkout flow 23:10 Methods of accepting money 25:30 Br…
…
continue reading

1
Story: briffa_sep98_e.pro - The File That Sparked a Storm
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47Can a single line of code change the way we see science, policy, and trust? In this episode we explore the "Climategate" scandal that erupted from leaked emails and code snippets, fueling doubts about climate science. What starts as an investigation into accusations of fraud leads to an unexpected journey through the messy reality of data science, …
…
continue reading

1
Mozilla Thunderbird takes on Gmail, surge in scans on PAN GlobalProtect VPNs, Microsoft uncovers bootloader vulnerabilities
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Mozilla Thunderbird finally takes on Gmail with new email service Surge in scans on PAN GlobalProtect VPNs hints at attacks Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Manageme…
…
continue reading