
Free Daily Podcast Summary
by Sublimetechie
Get key takeaways, quotes, and insights from Tech Unplugged in a 5-minute read. Delivered straight to your inbox.
The most recent episodes — sign up to get AI-powered summaries of each one.
This podcast from OWASP serves as a guide for secure code review, aiming to help organizations build self-defending applications. It outlines the importance of manual code review in identifying security and logical flaws, often surpassing automated tools and penetration testing alone. The guide covers various aspects of code review, including integrating it into the software development lifecycle, establishing risk assessment, understanding application architecture, utilizing static analysis, and addressing common vulnerabilities categorized under the OWASP Top Ten. Furthermore, it provides specific guidance and code examples for reviewing security controls related to authentication, session management, cross-site scripting, insecure direct object references, and more, across different programming languages and platforms, emphasizing proactive security practices and risk mitigation. OWASP serves as a guide for secure code review, aiming to help organizations build self-defending applications. It outlines the importance of manual code review in identifying security and logical flaws, often surpassing automated tools and penetration testing alone. The guide covers various aspects of code review, including integrating it into the software development lifecycle, establishing risk assessment, understanding application architecture, utilizing static analysis, and addressing common vulnerabilities categorized under the OWASP Top Ten. Furthermore, it provides specific guidance and code examples for reviewing security controls related to authentication, session management, cross-site scripting, insecure direct object references, and more, across different programming languages and platforms, emphasizing proactive security practices and risk mitigation.
This podcast presents a comprehensive AI Audit Checklist designed for certified trainers and consultants. It outlines key audit areas spanning AI governance, regulatory compliance, bias detection, security, explainability, performance monitoring, deployment, ethics, and continuous monitoring. The checklist provides specific audit questions and methods to check compliance status, including references to standards like GDPR, ISO 42001, and NIST AI RMF. Furthermore, it details best practices for AI audit report writing and post-audit follow-up, emphasizing thorough documentation and continuous improvement in AI governance and risk management.
This podcast on "Configure Secured-core server for Windows Server" provides instructions on how to enable and verify Microsoft's Secured-core security features. It outlines necessary prerequisites like Secure Boot and TPM 2.0, and details configuration steps using the Windows Security app, Windows Admin Center, and Group Policy. The guide also explains how to confirm that Secured-core is successfully configured through system information and the Windows Admin Center interface. Ultimately, this resource serves as a how-to guide for administrators seeking to enhance the security posture of their Windows Servers.
This podcast offer a comprehensive overview of modern software testing practices. The text explores a wide array of testing methodologies, including functional, non-functional, and specialized techniques, emphasizing their application across the software development lifecycle. It discusses crucial aspects like test planning, environment setup, automation, performance optimization, and security concerns. Furthermore, the source examines advanced topics such as risk-based testing, data-driven analysis, the integration of AI and machine learning, and strategies for continuous improvement in testing processes. The document also addresses the significance of collaboration, effective communication, and legal compliance within the realm of software testing
This podcast explore Microsoft Graph API permissions and their use in accessing and managing Microsoft 365 services like SharePoint, Teams, and Entra ID (Azure AD). They cover topics such as permission types (delegated and application), best practices for applying the principle of least privilege, and the process of granting and managing these permissions through the Azure portal and Microsoft Graph PowerShell SDK. Furthermore, they discuss the security implications of different permissions, highlighting potentially risky ones and offering guidance on securing Graph tokens and restricting API access to specific resources like mailboxes. Some articles also touch on automating administrative tasks using Graph API and the nuances of specific permissions, clarifying their actual capabilities and limitations.
These YouTube transcripts feature Sean Metcalf from Trimarc Security discussing critical aspects of Active Directory (AD) security. The first source, a DerbyCon talk, outlines common AD security issues, methods for detecting reconnaissance, and techniques for hardening AD components. The second source is a Trimarc webcast focused on performing self-assessments of AD security, highlighting common vulnerabilities and providing PowerShell scripts to identify them. Both emphasize proactive security measures, proper configurations, and the importance of mitigating risks associated with AD. I put these into one podcast where you can listen to Securing your enterprise environment
This document offers a comprehensive overview of AI-driven Managed Detection and Response (MDR), explaining its fundamental concepts and evolution within cybersecurity. It details how artificial intelligence enhances traditional MDR by automating threat detection and response, leading to greater efficiency and accuracy. The text highlights key differences between traditional and AI-driven MDR, emphasizing the advantages of automation, threat detection capabilities, and cost-effectiveness. It also identifies prominent cybersecurity vendors offering AI-powered MDR solutions and discusses the current challenges and limitations associated with this integration. Ultimately, the source positions AI-driven MDR as a significant advancement in cybersecurity with substantial potential for the future.
The provided text introduces PASETO (Platform-Agnostic Security Tokens) as a modern and more secure alternative to JSON Web Tokens (JWTs), focusing on its design principles for creating secure, stateless tokens for web applications. The author explains the structure of PASETOs, detailing their version, purpose (local or public), payload, and optional footer. It clarifies how local (symmetric) and public (asymmetric) PASETOs function, including encryption and digital signatures, and their respective use cases. The text also covers PASETO claims and highlights the security advantages of PASETO over JWT, emphasizing its developer-first approach and clearer guidelines to prevent common security missteps.
Free AI-powered daily recaps. Key takeaways, quotes, and mentions — in a 5-minute read.
Get Free Summaries →Free forever for up to 3 podcasts. No credit card required.
Listeners also like.
Tech Unplugged is your go-to podcast for breaking down the latest trends, innovations, and challenges in the world of technology. Whether you're a tech enthusiast, developer, or industry professional, we bring you insightful discussions on AI, cybersecurity, cloud computing, software development, and more—without the jargon. Tune in for expert interviews, deep dives into emerging technologies, and real-world applications that shape our digital future. Stay informed, stay ahead—welcome to Tech Unplugged!
AI-powered recaps with compact key takeaways, quotes, and insights.
Get key takeaways from Tech Unplugged in a 5-minute read.
Stay current on your favorite podcasts without falling behind.
It's a free AI-powered email that summarizes new episodes of Tech Unplugged as soon as they're published. You get the key takeaways, notable quotes, and links & mentions — all in a quick read.
When a new episode drops, our AI transcribes and analyzes it, then generates a personalized summary tailored to your interests and profession. It's delivered to your inbox every morning.
No. Podzilla is an independent service that summarizes publicly available podcast content. We're not affiliated with or endorsed by Sublimetechie.
Absolutely! The free plan covers up to 3 podcasts. Upgrade to Pro for 15, or Premium for 50. Browse our full catalog at /podcasts.
Tech Unplugged publishes daily. Our AI generates a summary within hours of each new episode.
Tech Unplugged covers topics including Technology. Our AI identifies the specific themes in each episode and highlights what matters most to you.
Free forever for up to 3 podcasts. No credit card required.
Free forever for up to 3 podcasts. No credit card required.