A podcast about web design and development.
…
continue reading
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. As web development agency owners for the better part of a decade, they’ve worked with all sorts of technologies, through the rise of responsive web design, the revolution of serverless computing, and the popularity gain of many no-code tools for small business owners. They commonly discuss foundational web development technologies like HTML, CSS, and JavaScript - in ...
…
continue reading
The award winning Big Web Show features special guests and topics like web publishing, art direction, content strategy, typography, web technology, and more. It's everything web that matters. Hosted by Jeffrey Zeldman.
…
continue reading
This is a podcast for anyone buried under spreadsheets, stuck in broken systems, or simply trying to make operations run more smoothly. Each episode explores how to solve real-world business problems with practical strategies, low-code tools like Zoho Creator, and of course smart thinking! Whether you're building platforms for your business, managing complex data, or just trying to streamline your team's workflow, Trailblazer FM brings you conversations and insights to help make sense of the ...
…
continue reading
CSS-Tricks Screencasts is focused on showing you tips, tricks, techniques about web design. Code samples can be extremely helpful, but sometimes it is even more helpful to watch someone as they code. In CSS-Tricks Screencasts will show you real live CSS and HTML code being written and tested right on the screen. Topics will vary but will always center around design and usability.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading

1
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
28:47
28:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:47
…
continue reading

1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:52
…
continue reading

1
Is Web Development Too Easy Now?
1:01:54
1:01:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:01:54על ידי Matt Lawrence and Mike Karan
…
continue reading

1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
continue reading

1
685: Fix My Home Tech, What’s Up with Firefox, and the MVP Car
1:06:14
1:06:14
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:14Show Description Who's the person to hire when your home network isn't working as reliably as it should? And while we're at it - can you also fix Dave's Find My notifications? What's the plan with Firefox in 2025? And Dave blogs (and mouth blogs) about his struggles with the MVP car. Listen on Website Links Why I hate the MVP car - daverupert.com T…
…
continue reading

1
Web News: Phones, Golf, and the Problem of Always Being Connected
28:20
28:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:20In this edition of the Web News, Matt dives into a thought he had while out on the golf course: are we ever going to have tech that’s so seamless it doesn’t pull us out of the moment? We’ll talk about the current state of ‘analog’ versus ‘digital’ experiences, why even the most advanced wearables can’t fully disappear into the background yet, and w…
…
continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-517
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
continue reading

1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
HTML Crash Course (For Absolute Beginners)
50:19
50:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
50:19Learning HTML is the first step to building websites, but it can feel overwhelming when you’re starting from scratch. In this crash course, Matt and Mike break down the absolute basics of HTML in a way that’s clear, practical, and beginner-friendly. You’ll learn what HTML is, how tags work, why structure matters, and how semantic HTML makes your si…
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
684: What Motivates Chris to Keep Working on CodePen?
1:09:48
1:09:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:09:48Show Description Listener questions about CSS ruby-position, crafting adaptive layouts using a responsive component, what keeps Chris motivated to work on CodePen, why are there no positive issues on GitHub., tech support in the age of AI, and a semi-regular segment of inbox therapy. Listen on Website Watch on YouTube Links Crafting adaptive layout…
…
continue reading

1
Web News: Making Developer Tutorials Beginner-Friendly
32:34
32:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:34When beginners try to learn coding, jargon-heavy tutorials can leave them feeling confused and discouraged. In this Web News episode, Matt and Mike discuss the importance of using accessible language when writing tutorials, landing pages, and guides. Developers don’t need to explain every detail, but making your explanations approachable helps more…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
My New Development Workflow | Spec Driven Development
1:01:57
1:01:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:01:57In this episode of the HTML All The Things Podcast, Matt explores his new development workflow centered around spec-driven development. With AI tools and coding agents becoming more powerful, the key to success isn’t just in writing code—it’s in writing clear, detailed specs first. Matt breaks down what spec-driven development is, why it works so w…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
683: iOS 26 Safari, Material Support on the Web, and Fixing The Button Problem
54:33
54:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
54:33Show Description Dave and Chris discuss the release of Safari in iOS26, the aesthetics of Liquid Glass in CSS, the importance of material design, and the role of TypeScript in modern web development. The conversation also touches on when to consider rebuilding a tech stack, the significance of user experience, and how to know when to choose a new t…
…
continue reading

1
Web News: The Shai‑Hulud Worm Attack (NPM Hack)
37:06
37:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:06In this episode of Web News, Matt and Mike dive into two massive worm attacks that recently hit npm, targeting packages used in millions of projects. While the attackers aimed to steal crypto wallet keys, the actual damage was small—but the implications are enormous. We break down how these man-in-the-middle attacks worked, why shadow dependencies …
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading

1
Fixing Vibe Coded Apps | w/ Nathaniel Rogers
1:24:09
1:24:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:24:09In this episode, Matt sits down with developer and solutions architect Nathaniel Rogers to discuss the challenges of working with non-tech-savvy founders, the differences between startup, product-based, service-based, and app-based business models, and how to guide entrepreneurs through both technical and business hurdles. Nathaniel shares his expe…
…
continue reading

1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading

1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
Handling the Variety of Client Requests as a Freelancer
1:07:18
1:07:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:07:18In this episode of the HTML All The Things Podcast, Matt and Mike explore how freelancers can handle diverse client requests with confidence. From quick initial calls and clarifying client goals to managing knowledge gaps and knowing when to outsource, they share strategies for simplifying complex requests, building trusted networks, and keeping co…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
682: Whiskey, Security, Antitrust, and Fun with CSS Functions
57:05
57:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
57:05Show Description Dave's got a Whiskey related content warning, recent security vulnerabilities in NPM, challenges with password management, and the complexities of digital security. They delve into Google's antitrust issues and the dynamics of the browser market, before transitioning to innovations in CSS, including custom properties and functions.…
…
continue reading
Uptime ideals vs reality in the AI era. A recent post from Theo (t3.gg) calling out sub-90% uptime on a major AI service reignites the question: how seriously should we treat downtime for non-critical apps? In this episode Matt and Mike dig into SLAs, the real cost of monitoring and rapid support, why “always-on” isn’t free, and whether 24/7 expect…
…
continue reading

1
Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More... - SWN #511
33:44
33:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:44Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-511
…
continue reading

1
Americans Can't Hack It - PSW #891
2:09:32
2:09:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:09:32This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
…
continue reading

1
From Geek Squad to MongoDB Advocate | w/ Jesse Hall
35:22
35:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:22In this episode of HTML All The Things, Mike sits down with Jesse Hall, Staff Developer Advocate at MongoDB and creator of the popular codeSTACKr platform. Jesse shares his journey from working at Geek Squad to becoming a self-taught developer, educator, and now an advocate at one of the biggest players in the database space. They discuss the princ…
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading

1
Interview Tips To Help You Land A Job In Web Development
1:02:25
1:02:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:25Landing a tech job can feel like a marathon—getting the interview is tough, and nailing it is even harder. In this episode, Matt shares insider tips from his experience interviewing dozens of engineers, highlighting the strategies that helped candidates stand out. From making a strong first impression to handling tough technical questions, these in…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
681: CSS Reset Update, Arc Gets Bought, and Why Websites?
1:07:22
1:07:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:07:22Show Description Chris is updating us on the progress of his CSS reset, thoughts on The Browser Company and Arc being bought by Atlassian, and in 2025 why would anyone build a website? Listen on Website Watch on YouTube Links Bend Old-Time Jams and Events Join or Die Join or Die on Netflix Bowling Alone - Wikipedia Microsoft CTO Kevin Scott on the …
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Web News: Should You Niche Down as a Developer?
21:59
21:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
21:59When it comes to starting an online business, one of the most common pieces of advice is to “niche down.” Instead of trying to cover an entire industry or topic family, niching down means choosing a smaller slice of the pie to specialize in. In this week’s Web News, Matt and Mike explore whether that same strategy can apply to developers. Is there …
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading

1
Content Creator or Web Developer? | w/ Dylan Israel
1:11:37
1:11:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:11:37In this episode of HTML All The Things, Matt chats with Dylan Israel about balancing careers in content creation and web development. Dylan has done it all — from building popular YouTube videos and courses, to co-hosting the Self Taught or Not podcast, to landing a role at Amazon. We dive into whether content creation was ever a full-time goal or …
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading