All InfoSec / Cybersecurity Podcasts
Source: www.sei.cmu.edu / Software Engineering Institute (SEI) Podcast Series
https://www.sei.cmu.edu/publications/podcasts/index.cfm
Atypical Applications of Agile and DevSecOps Principles
1 month, 2 weeks ago |
www.sei.cmu.edu
User-Centric Metrics for Agile
4 months, 1 week ago |
www.sei.cmu.edu
The Product Manager’s Evolving Role in Software and Systems Development
4 months, 2 weeks ago |
www.sei.cmu.edu
Measuring the Trustworthiness of AI Systems
5 months, 2 weeks ago |
www.sei.cmu.edu
Actionable Data in the DevSecOps Pipeline
6 months, 2 weeks ago |
www.sei.cmu.edu
An Agile Approach to Independent Verification and Validation
7 months, 2 weeks ago |
www.sei.cmu.edu
Automating Infrastructure as Code with Ansible and Molecule
8 months, 2 weeks ago |
www.sei.cmu.edu
Identifying and Preventing the Next SolarWinds
9 months, 1 week ago |
www.sei.cmu.edu
Identifying and Preventing the Next SolarWinds
9 months, 1 week ago |
www.sei.cmu.edu
A Penetration Testing Findings Repository
9 months, 2 weeks ago |
www.sei.cmu.edu
A Penetration Testing Findings Repository
9 months, 2 weeks ago |
www.sei.cmu.edu
Understanding Vulnerabilities in the Rust Programming Language
9 months, 2 weeks ago |
www.sei.cmu.edu
Rust Vulnerability Analysis and Maturity Challenges
9 months, 2 weeks ago |
www.sei.cmu.edu
We Live in Software: Engineering Societal-Scale Systems
10 months, 1 week ago |
www.sei.cmu.edu
We Live in Software: Engineering Societal-Scale Systems
10 months, 1 week ago |
www.sei.cmu.edu
Secure by Design, Secure by Default
10 months, 2 weeks ago |
www.sei.cmu.edu
Secure by Design, Secure by Default
10 months, 2 weeks ago |
www.sei.cmu.edu
Key Steps to Integrate Secure by Design into Acquisition and Development
10 months, 3 weeks ago |
www.sei.cmu.edu
Key Steps to Integrate Secure by Design into Acquisition and Development
10 months, 3 weeks ago |
www.sei.cmu.edu
An Exploration of Enterprise Technical Debt
11 months, 1 week ago |
www.sei.cmu.edu
An Exploration of Enterprise Technical Debt
11 months, 1 week ago |
www.sei.cmu.edu
The Messy Middle of Large Language Models
11 months, 4 weeks ago |
www.sei.cmu.edu
The Messy Middle of Large Language Models
11 months, 4 weeks ago |
www.sei.cmu.edu
Managing Developer Velocity and System Security with DevSecOps
1 year, 3 months ago |
www.sei.cmu.edu
A Method for Assessing Cloud Adoption Risks
1 year, 4 months ago |
www.sei.cmu.edu
A Method for Assessing Cloud Adoption Risks
1 year, 4 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Deployability
1 year, 4 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Deployability
1 year, 4 months ago |
www.sei.cmu.edu
ML-Driven Decision Making in Realistic Cyber Exercises
1 year, 5 months ago |
www.sei.cmu.edu
A Roadmap for Creating and Using Virtual Prototyping Software
1 year, 5 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Robustness
1 year, 6 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Robustness
1 year, 6 months ago |
www.sei.cmu.edu
A Platform-Independent Model for DevSecOps
1 year, 6 months ago |
www.sei.cmu.edu
Nothing found.
Items published with this topic over the last 90 days.
Latest
Atypical Applications of Agile and DevSecOps Principles
1 month, 2 weeks ago |
www.sei.cmu.edu
User-Centric Metrics for Agile
4 months, 1 week ago |
www.sei.cmu.edu
The Product Manager’s Evolving Role in Software and Systems Development
4 months, 2 weeks ago |
www.sei.cmu.edu
Measuring the Trustworthiness of AI Systems
5 months, 2 weeks ago |
www.sei.cmu.edu
Actionable Data in the DevSecOps Pipeline
6 months, 2 weeks ago |
www.sei.cmu.edu
An Agile Approach to Independent Verification and Validation
7 months, 2 weeks ago |
www.sei.cmu.edu
Automating Infrastructure as Code with Ansible and Molecule
8 months, 2 weeks ago |
www.sei.cmu.edu
Identifying and Preventing the Next SolarWinds
9 months, 1 week ago |
www.sei.cmu.edu
Identifying and Preventing the Next SolarWinds
9 months, 1 week ago |
www.sei.cmu.edu
A Penetration Testing Findings Repository
9 months, 2 weeks ago |
www.sei.cmu.edu
A Penetration Testing Findings Repository
9 months, 2 weeks ago |
www.sei.cmu.edu
Understanding Vulnerabilities in the Rust Programming Language
9 months, 2 weeks ago |
www.sei.cmu.edu
Rust Vulnerability Analysis and Maturity Challenges
9 months, 2 weeks ago |
www.sei.cmu.edu
We Live in Software: Engineering Societal-Scale Systems
10 months, 1 week ago |
www.sei.cmu.edu
We Live in Software: Engineering Societal-Scale Systems
10 months, 1 week ago |
www.sei.cmu.edu
Secure by Design, Secure by Default
10 months, 2 weeks ago |
www.sei.cmu.edu
Secure by Design, Secure by Default
10 months, 2 weeks ago |
www.sei.cmu.edu
Key Steps to Integrate Secure by Design into Acquisition and Development
10 months, 3 weeks ago |
www.sei.cmu.edu
Key Steps to Integrate Secure by Design into Acquisition and Development
10 months, 3 weeks ago |
www.sei.cmu.edu
An Exploration of Enterprise Technical Debt
11 months, 1 week ago |
www.sei.cmu.edu
An Exploration of Enterprise Technical Debt
11 months, 1 week ago |
www.sei.cmu.edu
The Messy Middle of Large Language Models
11 months, 4 weeks ago |
www.sei.cmu.edu
The Messy Middle of Large Language Models
11 months, 4 weeks ago |
www.sei.cmu.edu
Managing Developer Velocity and System Security with DevSecOps
1 year, 3 months ago |
www.sei.cmu.edu
A Method for Assessing Cloud Adoption Risks
1 year, 4 months ago |
www.sei.cmu.edu
A Method for Assessing Cloud Adoption Risks
1 year, 4 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Deployability
1 year, 4 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Deployability
1 year, 4 months ago |
www.sei.cmu.edu
ML-Driven Decision Making in Realistic Cyber Exercises
1 year, 5 months ago |
www.sei.cmu.edu
A Roadmap for Creating and Using Virtual Prototyping Software
1 year, 5 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Robustness
1 year, 6 months ago |
www.sei.cmu.edu
Software Architecture Patterns for Robustness
1 year, 6 months ago |
www.sei.cmu.edu
A Platform-Independent Model for DevSecOps
1 year, 6 months ago |
www.sei.cmu.edu
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Lead Product Security Engineer
@ Baker Hughes | IN-KA-BANGALORE-NEON BUILDING WEST TOWER
Penetration Tester
@ BT Group | Hemel Hempstead: Riverside (R6, Hemel Hempstead, United Kingdom
Cloud and Infrastructure Security Engineer II
@ StubHub | Los Angeles, CA