Application publik
[search 0]
Lebih
Unduh Aplikasinya!
show episodes
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
Unsubscribe
Bulanan+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
Unsubscribe
Bulanan
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
Unsubscribe
Bulanan
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
  continue reading
 
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
  continue reading
 
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
  continue reading
 
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
  continue reading
 
Artwork

1
Application: The TYPO3 Community Podcast

Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association

icon
Unsubscribe
icon
Unsubscribe
Bulanan
 
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
  continue reading
 
Artwork
 
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
  continue reading
 
Loading …
show series
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
Bedrohungen für IT-Systeme lauern auf allen Seiten – von Phishing-Attacken über komplexe Angriffe auf die Infrastruktur bis zum gezielten Ausnutzen von Schwachstellen. Ein starkes digitales Immunsystem ist dabei für die Früherkennung und Abwehr entscheidend – ohne die Modernisierung der Software öffnen sich allerdings drastische Lücken im digitalen…
  continue reading
 
Discover how the latest OCR and voice technology advancements from Mistral and OpenAI are revolutionizing business processes! In this episode, Bas Alderding and Koen Ter Velde explore: ✅ Mistral's breakthrough OCR technology with superior accuracy for complex documents ✅ OpenAI's new audio models for speech-to-text and text-to-speech capabilities ✅…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Alan Orwick, the CEO of Dominant Strategies, a development entity creating tooling and applications on the Quai Network. What You’ll Learn: Why traditional stablecoins represent an "Achilles heel" for crypto How Quai Network's dual-token model (QUAI and QI) creates a co…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
Unternehmen beseitigen Tool-Wildwuchs, lassen ihre Mitarbeitenden mit organisationseigenen Daten chatten und sorgen für Transparenz: KI-Spezialist IntraFind prognostiziert GenAI-Trends für das Jahr 2025. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/diese-fuenf-trends-werden-das-ki-jahr-2025-praegen/…
  continue reading
 
So wichtig ERP-Systeme auch sind, bei der Auswahl der richtigen Lösung und Anbieter gibt es für Unternehmen eine Reihe von Aspekten zu beachten – schließlich bringen nur passgenaue und ausgereifte Systeme auch die erwünschten Vorteile. IFS erklärt, worauf es bei der Suche ankommt. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/diese-…
  continue reading
 
Der Wechsel auf SAP S/4HANA wird im kommenden Jahr nochmals an Dringlichkeit gewinnen und damit auf die Archivierungsprozesse ausstrahlen. Der Umstieg zwingt die Unternehmen dazu, ihre Daten- und Dokumentenverwaltung, inklusive deren Archivierung, neu zu denken und bestehende Lösungen so anzupassen, dass sie mit den Anforderungen an Flexibilität, P…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Ingo Ruebe, the founder of Kilt Protocol, a decentralized digital identity solution serving enterprises, governments, and consumers. What You’ll Learn: Why Web2 identity is fundamentally broken The difference between identity and identification How W3C standards are res…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
Künstliche Intelligenz (KI) hat das Potenzial, unsere heutige Arbeitsweise völlig auf den Kopf zu stellen. Seit Jahren arbeiten branchenübergreifend Unternehmen daran, Machine und Deep Learning und weitere KI-basierte Algorithmen einzuführen, um zum Beispiel mit selbstlernenden Systemen große Datenmassen auszuwerten und mit darauf aufbauender Muste…
  continue reading
 
Die im Wandel befindliche Weltwirtschaft hat den Unternehmen im zurückliegenden Jahr viele Veränderungen und Anpassungen abverlangt. Dieser Trend wird sich nach Einschätzung von Patric Dahse, CEO der Natuvion Group, im kommenden Jahr fortsetzen. Lesen Sie den ganzen Beitrag hier: https://de.eas-mag.digital/dynamik-des-technischen-wandels-nimmt-weit…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by David Hoffman, the co-founder and host of Bankless, a cryptocurrency media brand and community that focuses on educating and empowering individuals to navigate the decentralized financial landscape. What You’ll Learn: The journey from Ethereum maximalism to broader cryp…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
Im Jahr 2025 wird die Rolle der künstlichen Intelligenz (KI) in Operations, Softwareentwicklung und Compliance rasant voranschreiten und transformative Auswirkungen auf verschiedene Branchen haben. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/ausblick-kuenstliche-intelligenz-ki-in-operations-softwareentwicklung-und-compliance/…
  continue reading
 
Unternehmen, die IoT-Lösungen einsetzen, benötigen eine Datenqualitätsstrategie. Was bei BI und der Analyse sowie Aufbereitung betriebswirtschaftlicher Daten vielfach verbreitet ist, sollten Unternehmen auch bei IoT-Daten etablieren. Wir erläutern die wichtigsten Maßnahmen für Aufbau und Betrieb eines Programms zur Erreichung einer hohen Datenquali…
  continue reading
 
Die Customer Journey beschreibt den gesamten Prozess, den ein Kunde in der Interaktion mit einem Unternehmen durchläuft: Von der ersten Kontaktaufnahme bis zum Support nach dem Kauf interagiert er an verschiedenen Touchpoints mit dem Unternehmen. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/schritt-fuer-schritt-zur-perfekten…
  continue reading
 
Die eigenen Geschäftsprozesse mit denen anderer Unternehmen intelligent zu verzahnen, ist speziell für KMUs in einem zunehmend digitalisierten und globalisierten Marktumfeld zentral wichtig, um wettbewerbsfähig zu bleiben. KMUs haben oftmals deutlich schlankere Kostenstrukturen als Großunternehmen. Diesen Vorteil können sie aber nur dann ausspielen…
  continue reading
 
Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of …
  continue reading
 
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
  continue reading
 
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
  continue reading
 
Die Datenbanklandschaft hat sich in den letzten zehn Jahren gravierend verändert. Wo früher meist eine einzige Plattform zum Einsatz kam, entsteht in vielen Unternehmen heute geradezu ein Wildwuchs an unterschiedlichen Technologien. Redgate, führender Anbieter von DevOps-Lösungen für End-to-End-Datenbankmanagement, nennt fünf Gründe, wie es dazu ka…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Patrick Young, Head of Go-to-Market at Galxe, a platform for Web3 community growth and engagement. Join them as they: Delve into Patrick's background in blockchain Explain how Galxe builds and maintains resilient Web3 communities Discuss Galxe's identity solutions, incl…
  continue reading
 
Skype hangs up for good, over a million cheap Android devices may be backdoored, parallels between jailbreak research and XSS, impersonating AirTags, network reconnaissance via a memory disclosure vuln in the GFW, and more! Show Notes: https://securityweekly.com/asw-321
  continue reading
 
Keywords AI, business, document management, retrieval augmented generation, proof of concept, facility management, asylum seekers, technology, innovation, data processing Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the practical applications of AI in business, specifically focusing on a proof of concept (POC) they deve…
  continue reading
 
Loading …

Panduan Referensi Cepat

Dengarkan acara ini sambil menjelajah
Putar