This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
…
continue reading
If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
…
continue reading
A weekly podcast from AlertsUSA, Inc expanding on SMS alerts sent as part of the National Threat and Incident Notification Service for Mobile Devices. Topics covered include terrorism, border security, nuclear and radiological emergencies, civil unrest, embassy warning messages, major public health threats such as epidemics and pandemics and more. Each weekly episode is a fast paced roundup of threats, developments and practical advice directly impacting your safety and security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you!
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
1
Homeland Security Weekly Update - May 18, 2024
7:00
7:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:00
In this week's update we look at new threats and calls for attack by the Islamic State, as well as a new Worldwide Caution issued by the US State Dept. You can subscribe to our weekly Threat Journal newsletter for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email.AlertsUSA Homepag…
…
continue reading
1
AI SOC Solutions, Revamp Your Cybersecurity, & Nightwing Introduction - Jon Check, Ricardo Villadiego, Jim McDonough - ESW #362
43:42
43:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:42
Artificial intelligence isn’t a magic wand… but could AI actually solve the alert triage problem every security operations center faces? In this interview with Jim McDonough from Intezer, we’ll talk about how 2023 was a tipping point for the maturity of AI tech, what these solutions actually bring to the table, how SOC teams in the real world are a…
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:04
32:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:04
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Vulnrichment, Hardware Hacking, VPNs - PSW #829
2:00:52
2:00:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:00:52
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829…
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362
2:27:32
2:27:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:27:32
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
3:12:50
3:12:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:12:50
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
…
continue reading
Now in its fourth year we'll be starting this year's series at a heightened time of risk and significant activity across the security domain - the opening episodes will be discussing how these events impact private security and emergency services and what may be the broader requirements and implications. To open the series, which will run regular e…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Ray Zadjmool - BSW #350
27:03
27:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:03
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285
29:24
29:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:24
How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting. Segment Resources: https://www.island.io/resources https://www.isla…
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
37:01
37:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:01
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-386
…
continue reading
1
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn, Mike Fey, Josh Lemos - ASW #285
1:06:40
1:06:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:06:40
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Hed Kovetz, Ray Zadjmool, Jeff Margolies - BSW #350
1:01:22
1:01:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:01:22
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
Homeland Security Weekly Update - May 18, 2024
7:01
7:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:01
In this week's update we look at new threats and calls for attack by the Islamic State, as well as a new Worldwide Caution issued by the US State Dept. You can subscribe to our weekly Threat Journal newsletter for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepa…
…
continue reading
1
AI SOC Solutions, Revamp Your Cybersecurity, & Nightwing Introduction - Jon Check, Ricardo Villadiego, Jim McDonough - ESW #362
43:42
43:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:42
Artificial intelligence isn’t a magic wand… but could AI actually solve the alert triage problem every security operations center faces? In this interview with Jim McDonough from Intezer, we’ll talk about how 2023 was a tipping point for the maturity of AI tech, what these solutions actually bring to the table, how SOC teams in the real world are a…
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:04
32:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:04
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:00
32:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:00
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:00
32:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:00
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Vulnrichment, Hardware Hacking, VPNs - PSW #829
2:00:52
2:00:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:00:52
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829…
…
continue reading
1
Flexxon Server Defender, Unforeseen Innovation Outcomes, & Security through Data - Jeetu Patel, Amit Sinha, Camellia Chan - ESW #362
47:11
47:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:11
The danger of post-breach disruption and downtime is extremely real. And while we should work to prevent these breaches in the first place, we must also be practical and pre-empt any potential incidents. Organisations armed with the most extensive software-based cybersecurity protection today continue to fall prey to hackers, have their operations …
…
continue reading
1
Flexxon Server Defender, Unforeseen Innovation Outcomes, & Security through Data - Jeetu Patel, Amit Sinha, Camellia Chan - ESW #362
47:11
47:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:11
The danger of post-breach disruption and downtime is extremely real. And while we should work to prevent these breaches in the first place, we must also be practical and pre-empt any potential incidents. Organisations armed with the most extensive software-based cybersecurity protection today continue to fall prey to hackers, have their operations …
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
1:12:14
1:12:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:12:14
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Show Notes: https://securityweekly.com/psw-829
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
1:12:14
1:12:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:12:14
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Show Notes: https://securityweekly.com/psw-829
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! - ESW #362
57:29
57:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
57:29
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! - ESW #362
57:29
57:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
57:29
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362
2:27:32
2:27:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:27:32
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
3:12:50
3:12:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:12:50
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
…
continue reading
1
The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285
29:24
29:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:24
How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting. Segment Resources: https://www.island.io/resources https://www.isla…
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
37:01
37:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:01
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-386
…
continue reading