Application відкриті
[search 0]
більше
Download the App!
show episodes
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Learn how to Check application status quickly and easily with our detailed guide on the Application Status of Asaan Karobar Finance. This step-by-step walkthrough will help you track your loan application progress, resolve common verification issues, and understand what each status means.
  continue reading
 
Artwork

1
Application Paranoia

Colin Bell, Rob Cuddy & Kris Duer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця
 
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
  continue reading
 
Welcome to Peace Over Perfection — the podcast that helps overwhelmed Christian women trust God in everyday situations. Do you feel like you’re running on empty — physically, emotionally, or even spiritually? Are you buried in expectations, to-do lists, and the pressure to have it all together? Do you ever feel guilty for only turning to God when things go wrong? You’re not alone — and you’re in the right place. I’m Susan — wife, empty nester, small business owner, and fellow faith-walker wh ...
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
  continue reading
 
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
  continue reading
 
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
  continue reading
 
Artwork
 
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
  continue reading
 
Artwork

1
Application: The TYPO3 Community Podcast

Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця
 
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
  continue reading
 
Artwork

1
Global Cannabis Applications Corp (CSE: APP)

Global Cannabis Applications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця
 
Our mission is to build a technology-enabled community to improve the health and wellness of medical patients and user alike, through data optimization of medical cannabis research and production. Our Citizen Green platform is the world’s first medical cannabis network that builds a cross-industries knowledge base which drives confidence in cannabis products, enhances prescription efficacy, and improves the lives of patients around the world.
  continue reading
 
Artwork

1
Acupuncture Points and their Clinical Application

Dr. Daoshing Ni, Dr. James Skoien

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Щомісяця
 
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
  continue reading
 
Loading …
show series
 
Generative KI schickt sich an, die Prozesse und Arbeitsmethoden von Behörden und Unternehmen zu revolutionieren. Eine Herausforderung bleibt jedoch die Wahl des richtigen Large Language Model (LLM), denn es gibt viele Faktoren zu beachten – etwa die Modellgröße, die Sprachunterstützung sowie die Kosten und die Sicherheit. KI- und Enterprise-Search-…
  continue reading
 
We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve …
  continue reading
 
Feeling Anxious? 8 Faith-Based Ways to Help You Find Peace Do you feel overwhelmed by anxious thoughts, fears about the future, or that low-grade worry that never fully lets go? Do you wish you could actually rest—mentally, emotionally, and spiritually—even when life doesn’t slow down? In this episode, we’re diving into what the Bible says about wo…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Josh McIntyre, Chairperson of the CCE Committee at C4, a non-profit organization advancing the understanding and adoption of Bitcoin, cryptocurrency, blockchain technology, and secure private key management. Together, they explore essential blockchain security practices…
  continue reading
 
Do you feel guilty when your day gets away from you and time with God doesn’t happen? Ever wonder if your quick prayers or scattered spiritual moments really “count”? Do you long to feel spiritually grounded—even in the middle of your busiest days? In this episode, I’m sharing how to stay spiritually connected with God throughout your day—even when…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
UiPath, führender Anbieter für Enterprise Robotic Process Automation, beleuchtet kurz und bündig die zentralen Aspekte rund um RPA. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/die-wichtigsten-fragen-zu-rpa-hier-beantwortet/EAS-MAG.digital
  continue reading
 
Vier von fünf Unternehmen haben kein schlüssiges Konzept, um den Herausforderungen der fortschreitenden Digitalisierung strategisch zu begegnen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/5-huerden-beim-digitalen-wandel/EAS-MAG.digital
  continue reading
 
Welcome to Peace Over Perfection, a podcast that invites you to let go of striving for a picture-perfect faith routine and instead embrace a genuine walk with God in the midst of life's chaos. Hosted by Susan, a dedicated wife, mom, and small business owner, this episode dives deep into the emotional and physical exhaustion many of us face. Do you …
  continue reading
 
Das Gelingen des digitalen Wandels hängt maßgeblich davon ob, ob auch die Mitarbeiter mitziehen können. Daher ist ein neuer Mitarbeitertyp unter Industrie 4.0 gefragt. Den ganzen Beitrag lesen sie hier: https://de.eas-mag.digital/der-mitarbeitertyp-unter-industrie-4-0/EAS-MAG.digital
  continue reading
 
Sarah Jane Madden joins us to discuss the evolving role of AI in software development. We reflect on the changes and challenges posed by AI, including the potential for over-reliance and the misconception that traditional software engineering practices like the SDLC are obsolete. The conversation explores the nuances of AI-generated code, emphasizi…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Revolutionen kommen öfter vor, als man denkt. In der Cybersecurity gab es beispielsweise bereits mehrere Revolutionen, in denen neue Technologien wie Künstliche Intelligenz und Machine Learning alles bisher Dagewesene auf den Kopf stellten. Ontinue, der führende Experte für Managed Extended Detection and Response (MXDR), wirft einen Blick in die Ge…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Sam MacPherson, CEO and co-founder of Phoenix Labs, the R&D company behind the multi-chain DeFi platform Spark. What you’ll learn: How Spark Liquidity Layer helps solve cross-chain fragmentation by automatically deploying capital across multiple L2s Why the transition f…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Welche Vorteile gibt es die Anwendungsentwicklung im Low-Code-Konzept im Unternehmen selbst zu machen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/fuenf-gruende-fuer-low-code/EAS-MAG.digital
  continue reading
 
Cyber-Angriffe können überall lauern. Gerade wenn es um sensible Kundendaten geht, können schon die scheinbar kleinsten Angriffe eine große verheerende Wirkung haben. Dabei bildet der Mensch selbst oft die größte Schwachstelle im System. Deswegen gibt es folgende Tipps im Umgang mit Kundendaten. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag…
  continue reading
 
Künstliche Intelligenz (KI) revolutioniert die Übersetzungsbranche – und schafft zugleich neue Risiken. Schnell, effizient, global – doch wo sensible Daten im Spiel sind, wird Datenschutz zur unternehmerischen Pflicht. Unternehmen, die auf KI-gestützte Übersetzungen setzen, müssen Sicherheit ganzheitlich denken. Den ganzen Beitrag lesen Sie hier: h…
  continue reading
 
Von Business-Intelligence-Lösungen profitieren nicht nur die Management-Ebene. Je mehr Entscheider gewinnbringend mit BI-Applikationen und kontextrelevanten Daten arbeiten, desto größer der Nutzen für das Unternehmen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/5-kriterien-zur-auswahl-einer-enterprise-bi-plattform/…
  continue reading
 
Für Marketing & Vertrieb im Sanitär- Heizungs- und Klima- Handwerk (SHK) sind eine Bandbreite an Produktvarianten und seitenstarke Preislisten Alltag. Die Hersteller und Händler sind gefordert, die Produktdaten in allen Kanälen technisch korrekt mit den Branchenstandards (Datanorm, GAEB, ARGE Neue Medien) zu halten. Damit Unternehmen dies effizient…
  continue reading
 
Wenn es um die digitale Transformation in der öffentlichen Verwaltung geht, rückt Künstliche Intelligenz immer stärker in den Fokus. Initiativen und Förderprogramme zeigen, dass die Technologie als Schlüsselfaktor für die Modernisierung massiv an Bedeutung gewinnt – ein Umstand, der jedoch nicht nur Chancen, sondern auch dringenden Handlungsbedarf …
  continue reading
 
Die Potenziale der Robotic Process Automation sind vielfältig und immens: Sie reichen von massiven Kosteneinsparungen und Produktivitätssteigerungen über höhere Mitarbeiterzufriedenheit und verbesserte Prozessqualität bis hin zur Abfederung des Fachkräftemangels. UiPath zeigt auf, welche Eigenschaften eine RPA-Plattform aufweisen muss, damit Untern…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Die intelligente Fabrik ist längst Realität – und auch der „unwissende“ Roboter von einst gehört mehr und mehr der Vergangenheit an. Eine solche Fabrik zeichnet sich durch die Kombination verschiedener Technologien aus, die nahtlos ineinandergreifen. NTT DATA erklärt, welche Rolle KI und Edge Computing dabei spielen. Den ganzen Beitrag lesen Sie hi…
  continue reading
 
CEOs und Geschäftsführer haben bisher die Konzeption von Schnittstellen (Englisch: Application Programming Interface, kurz: API) meist in die IT-Abteilung deligiert. Die digitale Transformation muss aber die Unternehmenslenker wach rütteln. Auch CEOs müssen sich mit dieser Thematik beschäftigen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag…
  continue reading
 
eCommerce ist nicht nur im letzten Jahr stark gewachsen. Der Webshop-Trend boomt schon seit langer Zeit, und auch hier gilt: besser spät als nie! Unternehmen profitieren massiv von einem Shop auf ihrer Website. Solange dieser richtig erstellt sind und das Marketing den Onlineshop auch voll ausnutzt. Doch um online einen erfolgreichen Shop zu erstel…
  continue reading
 
Mit dem stetigen Voranschreiten der digitalen Transformation in den letzten Jahren wurden Unternehmen zunehmend abhängig von zahlreichen Partnern und Lieferanten. Diese Verschiebung hat zu einer komplexeren IT-Infrastruktur geführt und signifikant die Angriffsfläche vergrößert, die Cyberkriminelle ausnutzen können. Sie haben es auf das schwächste G…
  continue reading
 
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Aaluxx Myth, co-founder of Maya Protocol, a decentralized liquidity solution enabling native L1-to-L1 token swaps. What you’ll learn: How Maya Protocol's approach to cross-chain liquidity differs from THORChain The real-world impact of crypto in Latin America How Prop 6…
  continue reading
 
Künstliche Intelligenz (KI) entwickelt sich rasant weiter und übernimmt in vielen Bereichen bereits Aufgaben, die für den Menschen herausfordernd oder zeitaufwendig sind. Einige Systeme sind uns in bestimmten Aspekten sogar voraus – etwa bei der Datenanalyse oder Mustererkennung. Dennoch unterscheidet sich KI grundlegend vom menschlichen Gehirn, in…
  continue reading
 
Dag Flachet joins us to discuss the concept of Kaizen and its application in improving application security. Dag shares his journey into the world of security, emphasizing the importance of iterative, small-step improvements. The conversation delves into how organizations can effectively implement maturity models to enhance their security programs,…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Loading …

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити