The Stack Overflow Podcast - Life in the Fastlane: SDK tools built with developers in mind

 

Fastlane by PayPal is an accelerated guest checkout experience. Visit theFastlane Resource Center for Developers to get started.

You can find Sunny Patel on LinkedIn and on GitHub.

Find Kyle Prinsloo on and on LinkedIn.

Congrats to Lifeboat badge winner M.M who provided an answer to What does the "Expected '(' for function-style cast or type construction" error mean?

See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Code Story: Insights from Startup Tech Leaders - The Haunted House of APIs – Phantom Threats with Adam Arellano

The Haunted House of API's

Today, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API’s, sponsored by our friends at Traceable AI. In this series, we are building awareness around API’s, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.

Phantom Threats: The Ghosts Haunting Your API Security

Today’s episode is titled Phantom Threats: The Ghosts Haunting Your API Security, with Adam Arellano. API security threats often go unnoticed, hiding like ghosts in your infrastructure. Bots, sophisticated fraud attempts, account takeovers and attackers disguising themselves within legit traffic… these all pose risk to your organization, and can bypass traditional security measures, wreaking havoc without detection – until it’s too late. Adam is a tech advisor, Global CISO at Traceable, and will guide listeners through the world of phantom threats haunting API security.

  1. What are "phantom threats" in the context of API security, and how do they go undetected?
  2. Can you explain how advanced botnets and fraud attempts exploit APIs while blending into legitimate traffic?
  3. Do you have a real-world example of a phantom threat that caused significant damage to an organization?
  4. What makes detecting these phantom threats so challenging, and why do traditional security measures often fail?
  5. What are the best strategies or technologies organizations can adopt to detect and eliminate these hidden threats before they cause harm?

Sponsors

Links




Our Sponsors:
* Check out Vanta: https://vanta.com/CODESTORY


Support this podcast at — https://redcircle.com/code-story/donations

Advertising Inquiries: https://redcircle.com/brands

Privacy & Opt-Out: https://redcircle.com/privacy

The Stack Overflow Podcast - How can you get your kids into coding? We asked an 8-year-old app builder.

Watch Fay build a Harry Potter-themed chatbot with an assist from AI.

Cursor is the AI code editor Fay’s using. Get started with their docs.

Connect with Ricky on LinkedIn or X

Shoutout to Stack Overflow user Mahendra Kulkarni, who earned a Lifeboat badge by answering How do I get current rowindex of a table using JavaScript?

Code Story: Insights from Startup Tech Leaders - S10 E8: Shashwat Sehgal, P0 Security

Shashwat Sehgal has been in the tech industry broadly for 15 years. He started out as an engineer, but eventually, worked his way towards product and the business side. Outside of tech, he enjoys spending time with his family. He's into sports, loves to play tennis, but admits he hasn't played pickle ball yet because the courts are always booked. He also enjoys reading, in particular historical narratives or autobiographies.

In his prior years, Shashwat noticed that developers spend a large amount of time securing business assets in the cloud. He dreamt of a world where this was just an abstraction layer on top of the cloud, making it easier for developers to complete the task.

This is the creation story of P0 Security.

Sponsors

Links

 




Our Sponsors:
* Check out Vanta: https://vanta.com/CODESTORY


Support this podcast at — https://redcircle.com/code-story/donations

Advertising Inquiries: https://redcircle.com/brands

Privacy & Opt-Out: https://redcircle.com/privacy

Big Technology Podcast - AI Agents’ Shaky Debut, Musk and Putin, Perplexity vs. The Media

Ranjan Roy from Margins is back for our weekly discussion of the latest tech news. We cover 1) AI agents are here 2) Anthropic's Sonnet 3.5 model 3) Why we're underwhelmed with AI agents so far 4) The long-term bull case for agents 5) OpenAI's Orion model 6) Sam Altman's fake news tweet, and his cryptic preview of that news 7) Elon Musk and Putin speak regularly 8) China, Russia, Iran, North Korea vs. U.S. and Europe about to get weird 9) Tesla's blowout earnings 10) Waymo raises $5.6 billion 11) Teen takes life after falling in love with Character.ai bot 12) Perplexity vs. The Media 13) Big Technology and ElevenLabs make a deal.

---

Enjoying Big Technology Podcast? Please rate us five stars ⭐⭐⭐⭐⭐ in your podcast app of choice.

For weekly updates on the show, sign up for the pod newsletter on LinkedIn: https://www.linkedin.com/newsletters/6901970121829801984/

Want a discount for Big Technology on Substack? Here’s 40% off for the first year: https://tinyurl.com/bigtechnology

Questions? Feedback? Write to: bigtechnologypodcast@gmail.com

The Government Huddle with Brian Chidester - 159: The One about Government’s IDV Evolution (Part Two)

Linda Miller, the Former Deputy Director for Pandemic Response Accountability Committee and Founder and CEO of the Audient Group, and Amy Crawford, Director of Market Planning for Fraud and Identity Services at LexisNexis Risk Solutions join the show to discuss the real cost of security threats by uncovering the true impact to residents and government organizations. 

The Stack Overflow Podcast - Tragedy of the (data) commons

The Data Provenance Initiative is a collective of volunteer AI researchers from around the world. They conduct large-scale audits of the massive datasets that power state-of-the-art AI models with a goal of mapping the landscape of AI training data to improve transparency, documentation, and informed use of data. Their Explorer tool allows users to filter and analyze the training datasets typically used by large language models.

Shayne and Robert are the authors of a new study called Consent in Crisis: The Rapid Decline of the AI Data Commons: the first large-scale, longitudinal audit of the consent protocols for the web domains underlying AI training sets.

Connect with Shayne via his website.

Connect with Robert via his website or on LinkedIn

Stack Overflow user George Hawkins earned a Populist badge by explaining How to get base url in angular 5?.

Code Story: Insights from Startup Tech Leaders - The Haunted House of APIs – The Haunted Web of APIs with Richard Bird

The Haunted House of API's

Today, we are releasing another episode for Cybersecurity Awareness month, in our series entitled the Haunted House of API’s, sponsored by our friends at Traceable AI. In this series, we are building awareness around API’s, their security risks – and what you can do about it. Traceable AI is building One Platform to secure every API, so you can discover, protect, and test all your API's with contextual API security, enabling organizations to minimize risk and maximize the value API's bring to their customers.

The Haunted Web: Navigating API Sprawl and Creepy Crawlers

Today’s episode is titled The Haunted Web: Navigating API Sprawl and Creepy Crawlers, with Traceable’s Chief Security Officer, Richard Bird. As organizations scale and evolve, so does the complexity of their APIs. API sprawl, the uncontrolled expansion of APIs, creates a tangled web where vulnerabilities linger in the shadows. These unseen APIs become “creepy crawlers” of your digital infrastructure, creeping through your systems and posing security risks. Richard will discuss how unmanaged and undocumented APIs contribute to blind spots in security, the risks they create for organizations and the best strategies for securing a sprawling ecosystem.

Discussion questions:

  1. Can you explain what we mean by "unknown APIs" and the different types, like shadow, rogue, zombie, and undocumented?
  2. Why do these APIs often go unnoticed, and how do they become security risks?
  3. What makes these APIs such an attractive target for attackers, and can you share an example of how one has been exploited?
  4. How can organizations begin to uncover these hidden APIs, and what tools or strategies are effective in doing so?
  5. In your experience, what are some common mistakes organizations make that lead to these unknown APIs being created or overlooked?

Sponsors

Links



Our Sponsors:
* Check out Vanta: https://vanta.com/CODESTORY


Support this podcast at — https://redcircle.com/code-story/donations

Advertising Inquiries: https://redcircle.com/brands

Privacy & Opt-Out: https://redcircle.com/privacy