Best Software Development Podcasts (2025)
show episodes
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

Unsubscribe
Unsubscribe
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Syntax - Tasty Web Development Treats

Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers

Unsubscribe
Unsubscribe
Weekly+
 
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
  continue reading
 
Artwork

1
Soft Skills Engineering

Jamison Dance and Dave Smith

Unsubscribe
Unsubscribe
Weekly
 
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Happy Path Programming

Bruce Eckel & James Ward

Unsubscribe
Unsubscribe
Monthly
 
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
2.5 Admins

The Late Night Linux Family

Unsubscribe
Unsubscribe
Weekly
 
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
  continue reading
 
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
  continue reading
 
Artwork
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
  continue reading
 
Artwork

1
Algorithms + Data Structures = Programs

Conor Hoekstra & Bryce Adelstein Lelbach

Unsubscribe
Unsubscribe
Weekly
 
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
  continue reading
 
Artwork

1
Software Defined Talk

Software Defined Talk LLC

Unsubscribe
Unsubscribe
Weekly
 
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
  continue reading
 
Artwork

1
Caveat

N2K Networks

Unsubscribe
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Developer Tea

Jonathan Cutrell

Unsubscribe
Unsubscribe
Monthly+
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
  continue reading
 
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
  continue reading
 
Loading …
show series
 
Mat Ryer is back! He plays the piano, we tell each other truths/lies, we pay homage to the 8” floppy disk, Mat accepts an open source medal, and so much more. It’s a real circus. MatGPT! Join the discussion Changelog++ members get a bonus 11 minutes at the end of this episode and zero ads. Join today! Sponsors: Sentry – Use the code CHANGELOG when …
  continue reading
 
Over the years, Google has released a variety of ML, data science, and AI developer tools and platforms. Prominent examples include Colab, Kaggle, AI Studio, and the Gemini API. Paige Bailey is the Uber Technical Lead of the Developer Relations team at Google ML Developer Tools, working on Gemini APIs, Gemma, AI Studio, Kaggle, Colab and Jax. She j…
  continue reading
 
Praveen Gujar, Director of Product at LinkedIn, joins SE Radio host Kanchan Shringi for a discussion on how generative AI (GenAI) is transforming digital advertising technology platforms. The conversation starts with a look at how GenAI facilitates scalable ad content creation, using self-attention mechanisms for customized ad generation. They expl…
  continue reading
 
This week, we are joined by Kyla Cardona and Aurora Johnson from SpyCloud discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark…
  continue reading
 
Please enjoy this encore episode, where we are joined by Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. as he shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal …
  continue reading
 
Cybersecurity 2025: Predictions, Challenges, and AI Impacts Welcome to Cybersecurity Today with your host, Jim Love! In this special episode, our expert panel looks ahead to 2025, discussing potential cybersecurity threats and emerging themes. Featuring Laura Payne from White Tuque, Daina Proctor from IBM, and David Shipley, CEO and culture critic …
  continue reading
 
In today's episode, we're focusing on taking your resolutions and making them matter. I will give you two challenges in this episode to improve the quality and potential of success for your resolutions. 🙏 Today's Episode is Brought To you by: Wix Studio Devs, if you think website builders mean limited control—think again. With Wix Studio’s develope…
  continue reading
 
Navigating AI's impact on work, the rise of transnational threats, a grim new reality in air travel, and how to harness the chaos of 2025 for personal and professional growth. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiess…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bil Harmer, operating partner and CISO, Craft Ventures Thanks to our show sponsor, Nudge Security Nudge Security helps you mitigate security risks stemming from SaaS sprawl by discovering every SaaS account ever created by anyone in y…
  continue reading
 
New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organizatio…
  continue reading
 
In this episode, Conor and Ben chat about programming paradigms, algorithms, and much more! Link to Episode 216 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Ben Deane: Twitter | BlueSky Show Notes Date Generated: 2024-12-16 Date Releas…
  continue reading
 
Alex dives into the perils of upgrading and migrating critical infrastructure—uncovering embarrassing pitfalls and hard-won lessons along the way. Meanwhile, Chris takes his audiobook obsession to the next level, showcasing a couple self-hosted projects that are very ambitious. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on…
  continue reading
 
Proton recovers from worldwide outage BayMark Health Services announces data breach U.S. Treasury breach linked to Silk Typhoon group Huge thanks to our sponsor, Nudge Security Are you struggling to secure your exploding SaaS footprint? With Nudge Security, you can discover all SaaS apps and accounts, manage access, ensure secure configurations, ve…
  continue reading
 
Cybersecurity Alert: Free VPN Risks, Packers' Data Breach, and SonicWall Vulnerability In this episode, host Jim Love delves into critical cybersecurity issues including the hidden dangers of free VPNs, a payment skimmer attack on the Green Bay Packers’ online pro shop, and a severe vulnerability in SonicWall’s SonicOS firmware. Learn why 90% of fr…
  continue reading
 
Bret and Nirmal reunite for their traditional annual Holiday Special episode of breaking down the most significant developments in cloud native from 2024 and sharing predictions for 2025. 💥 This episode is brought to you by our valued sponsor and friends at Aikido!💥 Aikido is a no-nonse platform that helps developers get security done. It consolida…
  continue reading
 
This week, we dive into the state of SBOMs, what’s going on with Harness, and the ongoing collision of tech and politics. Plus, Coté finds himself a stranger in the Texas he once called home. Watch the YouTube Live Recording of Episode 501 Runner-up Titles Who knows what’s going to happen on that side of the planet? There are no hacks in The Nether…
  continue reading
 
Twilio, a communication platform as a service (CPaaS), allows developers to build voice, video, and messaging capabilities into their apps. Devs can get started with their docs. Find Inbal on LinkedIn. Kudos to Stack Overflow user Wesos de Queso for explaining how to Prevent a toggle group from not having a toggle selected - Java FX. AI, Twilio, In…
  continue reading
 
In this episode, we explore the following stories: "Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics" Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques. URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its …
  continue reading
 
DNA sequencer vulnerabilities, threat actor naming conventions, new CNAs and problems, backdoors are not secrets (again), The RP2350 is hacked!, they know where your car is, treasury department hacked, what if someone hacked license plate cameras? Tenable CEO passes away, and very awkwardly, a Nessus plugin update causes problems, who needs fact-ch…
  continue reading
 
The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple vulnerabilities in its retired migration tool. Fake exploits for Micro…
  continue reading
 
Ash Hynie created CountrPT as to bridge the gap between manager perception and employee impact. Folks are tired, folks feel micro-managed, there's all this talk about return to office (RTO). Did we hire grown adults or not? What's the right way to manage technical teams, remote or other wise? How do we build relationships within our teams and with …
  continue reading
 
Jim and Allan explain the benefits of a lithium iron phosphate “UPS”, whether it’s possible to delete every single copy of a file, and using Bluetooth in a Windows 11 VM. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes Discussion Anker SOLIX C300 Anker SOLIX F3800 Free Consulting We were asked about using Blueto…
  continue reading
 
Florian Rappl, solutions architect at smapiot GmbH, joins the podcast to give insights on micro frontends, discussing the misconceptions, architectural patterns, challenges, and exciting benefits of using micro frontends over traditional monolithic applications. Links https://florian-rappl.de https://github.com/FlorianRappl https://x.com/FlorianRap…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLock…
  continue reading
 
Over the years, Google has released a variety of ML, data science, and AI developer tools and platforms. Prominent examples include Colab, Kaggle, AI Studio, and the Gemini API. Paige Bailey is the Uber Technical Lead of the Developer Relations team at Google ML Developer Tools, working on Gemini APIs, Gemma, AI Studio, Kaggle, Colab and Jax. She j…
  continue reading
 
Rob PunselieA truly customer-focused content strategy is the cornerstone of good customer experiences.Over the past 25 years, Rob Punselie has developed and honed content discovery research methods based on time-tested usability knowledge and the Jobs to Be Done product-development framework.This approach has helped him consistently deliver to his …
  continue reading
 
PowerSchool hacked Lawmakers expected to revive attempts for new Cyber Force study European Commission receives first GDPR fine Huge thanks to our sponsor, Nudge Security Nudge Security is the only solution for SaaS security and governance that can discover up to two years of historical SaaS spend along with usage insights so you can uncover wasted…
  continue reading
 
Software architecture necessarily intersects with a diverse range of critical things, including implementation, infrastructure, data and engineering practices. All these elements require serious consideration and reflection if you're to architect effectively. To discuss these various intersections, Thoughtworks' Neal Ford and his long-time collabor…
  continue reading
 
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diam…
  continue reading
 
Caleb Barlow is joining Ben and Dave to discuss executive protection and the intersection with cybersecurity. They dive into the recent killing of UnitedHealthcare CEO Brian Thompson, and how it has alarmed corporate America, prompting companies to reassess security measures and protect executives amid concerns of copycat attacks. Security firms re…
  continue reading
 
How is your architectural intelligence? Carl and Richard talk to Thomas Betts about his thoughts on implementing AI-related technologies into applications. Thomas talks about stripping the magic out of AI and focusing on the realities - in the end, it's just another API you can call. The conversation digs into what useful implementations of large l…
  continue reading
 
In this episode, we discuss critical vulnerabilities in Ivanti Connect Secure and Policy Secure, command injection risks in Aviatrix Network Controllers, and the risks posed by hijacked abandoned backdoors. Episode Links and Topics: More Governments Backdoors in Your Backdoors https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/…
  continue reading
 
Rachel Plotnick joins us for the first show of 2025 to discuss her book “Power Button” and the research she did, and why we love/hate buttons so much. We also discuss her upcoming book “License to Spill” as well as the research she’s doing on energy drinks. Join the discussion Changelog++ members save 9 minutes on this episode because they made the…
  continue reading
 
Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFace. A PayPal phishing scam exploits legitimate platform functionality.…
  continue reading
 
Scott and Wes look into their crystal ball to predict what’s coming in web development next year. From the rise of on-device AI to the vanilla CSS comeback, Bun’s big moves, and React’s evolution, this episode is packed with bold predictions and hot takes! Show Notes 00:00 Welcome to Syntax! 02:00 Brought to you by Sentry.io. 03:09 The agenda. 03:4…
  continue reading
 
#297: In today's digital landscape, ensuring secure and efficient access to systems is crucial. Authorization plays a vital role in granting the right access levels — but how can businesses implement it effectively? In this episode, we speak with Alex Olivier, co-founder & CPO at Cerbos, about how Cerbos presents an adaptable solution that streamli…
  continue reading
 
Video game emulation is the process of using software to replicate the functionality of gaming hardware. It’s a fundamental approach to making older games accessible on modern devices. The Carbon Engine is a tool developed internally at video game publisher and distributor Limited Run Games. It allows a variety of emulators to interface with modern…
  continue reading
 
Video game emulation is the process of using software to replicate the functionality of gaming hardware. It’s a fundamental approach to making older games accessible on modern devices. The Carbon Engine is a tool developed internally at video game publisher and distributor Limited Run Games. It allows a variety of emulators to interface with modern…
  continue reading
 
Data is the fastest growing enterprise attack surface, and is projected to surpass 181 Zettabytes in 2025. Couple data growth with the growing demands of Artificial Intelligence, and the attack surface expands even more. How should organizations adapt their security programs to safeguard their data? Lamont Orange, Chief Information Security Officer…
  continue reading
 
CES 2025 Secrets Revealed: A developer’s dream or just more hype? Plus, NVIDIA flexes its AI muscles, and we're admittedly impressed. Then, our thoughts on Dell's historic rebrand. Sponsored By: Bitcoin Well: Bitcoin sent directly to your wallet is the safest way to buy Bitcoin. Immediate settlement, direct to self-custody. Supports the Lightning N…
  continue reading
 
Cybersecurity Updates: New US Cyber Trust Mark & Rising Threats In this episode of Cyber Security Today, host Jim Love discusses the launch of the US Cyber Trust Mark, a new cybersecurity safety label for smart devices. The episode also covers increasing Mac OS attacks by North Korean hackers, including the discovery of the Spectral Blur backdoor, …
  continue reading
 
Cyber Trust marks to roll out in 2025 UK to criminalize sexually explicit deepfakes CISA says government hack limited to Treasury Huge thanks to our sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, and Google Workspace. With Nudge, you’ll be alerted of identity security risks like weak or…
  continue reading
 
The consequences of Internet content restriction. The measured risks of 3rd-party browser extensions. The consequences of SonicWall's unpatched 9.8 firewall severity. The incredible number of still-unencrypted email servers. SonicWall vulnerability patching Shadowserver Foundation & eMail Encryption Salt Typhoon Evicted HIPAA gets a long-needed cyb…
  continue reading
 
In this episode, we dive into active exploitation of a zero-day in SonicWall SSL-VPN, privilege escalation vulnerabilities in Moxa devices, and a BitLocker bypass in Windows 11. We also cover cryptocurrency mining malware hitting PHP servers and the White House's launch of the U.S. Cyber Trust Mark to secure connected devices. Episode Links and Top…
  continue reading
 
Robert Seacord, the Standardization Lead at Woven by Toyota, the convenor of the C standards committee, and author of The CERT® C Coding Standard, Effective C, and Secure Coding in C and C++, speaks with SE Radio host Gavin Henry about What's New in the C Programming Language. They start with a review of the history of C and why it has a standard, …
  continue reading
 
All appsec teams need quality tools and all developers benefit from appsec guidance that's focused on meaningful results. Greg Anderson shares his experience in bringing the OWASP DefectDojo project to life and maintaining its value for over a decade. He reminds us that there are tons of appsec teams with low budgets and few members that need tools…
  continue reading
 
Loading …