Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
…
continue reading
Base Layer will be providing insights from founders and investors in the base layer of cryptoassets. Simplifying complex projects and the technology being developed, from interoperability to relayers and more - who is building the future, why are they and how are they doing it.
…
continue reading
A web3 podcast focused on Monad, the new Layer 1 that has fundamentally optimized the EVM.
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
continue reading
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
…
continue reading
If you want to prevent these problems from happening in the first place, you can improve your car's windshield by applying a protective layer of security. At Portland Auto Glass, we install high-quality aftermarket glass products from Mopar and Guardian. We use these products because they're designed to be scratch-resistant, fog-resistant, and chip resistant. You're not just getting an effective repair; you're getting glass that will defend your vehicle against additional wear and tear for m ...
…
continue reading
Join Kostas and Nitay as they speak with amazingly smart people who are building the next generation of technology, from hardware to cloud compute. Tech on the Rocks is for people who are curious about the foundations of the tech industry. Recorded primarily from our offices and homes, but one day we hope to record in a bar somewhere. Cheers!
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
"Web 3.0 with Sam Kamani" is all about Web 3 and how it is going to change the world. If you are interested in learning more about the 4th Industrial revolution then this podcast is for you. Web 3.0 or Web 3 is often hailed as the technology that will usher in the 4th industrial revolution. This revolution is going to affect every industry, business, government and person on this planet. Web 3.0 is a collection of technologies that are going to change how we collaborate with each other and i ...
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Path | Passion | Purpose by DIONZ is a podcast that aims to inspire and empower its audience by interviewing conscious and impactful global leaders, nextgens, entrepreneurs, and creatives. Through candid conversations, guests share their path to discovering their passion - or the unique gifts that make them who they are - and, more importantly, how they transformed their passion into impactful endeavours that co-create a positive impact for us all. Instead of recording our podcast in a stati ...
…
continue reading
Do you feel there's more that we can do to keep our schools safe? Join Michele Gay, co-founder and Director of Safe and Sound Schools and a mother who lost her child tragically in the Sandy Hook School tragedy, as she discusses practical and inspiring ways school leaders, parents, and students can work together to ensure safer schools for all. Together, we can make a difference. Together, we can make our schools Safe and Sound.
…
continue reading
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
…
continue reading
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
…
continue reading
Youtube: https://www.youtube.com/@ProofOfPodcast
…
continue reading
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
…
continue reading
Podcast focused on Tech & Product topics within the Web3 space. Watch on YouTube: https://www.youtube.com/playlist?list=PLsZkl0r_l2kvaGllkk8PgzMUXK6zHkyU9 Website: https://wavect.io
…
continue reading
Going through a divorce is never easy. For women who put their own career or education on hold to support a spouse and raise their children, it adds an additional layer of difficulty, and it can become a poverty trap that is nearly impossible to climb out of. I offer a different option by teaching you how to build a small service business with little to no capital or experience. Entrepreneurship can be the solution to keeping you out of poverty, and divorce can be a great catalyst for change ...
…
continue reading
Welcome to the Data Science Conversations Podcast hosted by Damien Deighan and Dr Philipp Diesinger. We bring you interesting conversations with the world’s leading Academics working on cutting edge topics with potential for real world impact. We explore how their latest research in Data Science and AI could scale into broader industry applications, so you can expand your knowledge and grow your career. Every 4 or 5 episodes we will feature an industry trailblazer from a strong academic back ...
…
continue reading
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
…
continue reading
Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you. Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable re ...
…
continue reading

1
The MAESTRO Framework: Layering Up Against MAS Security Threats
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP Agentic Security Initiative's MAESTRO (Multi-Agent…
…
continue reading

1
Humans aren't the weakest link, they're a critical security layer
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Security awareness is a thing of the past. Rather, the term and what it stands for are things of the past. It just doesn't cover the actual challenge organizations need to address. We need to be talking about Human Risk. At least, that's what Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4, thinks we should do. We were happy to o…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Sudo watch, AI Dreams, Kickidler, Powershool, Old Man Router, PSMU, Aaran Leyland... - SWN #475
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-475
…
continue reading

1
Sudo watch, AI Dreams, Kickidler, Powershool, Old Man Router, PSMU, Aaran Leyland... - SWN #475
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
…
continue reading

1
Sudo watch, AI Dreams, Kickidler, Powershool, Old Man Router, PSMU, Aaran Leyland... - SWN #475
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
…
continue reading

1
2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
…
continue reading
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
…
continue reading

1
How to Keep Your House Safe When You’re Going on Vacation?
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54Going on vacation? Don’t let your trip turn into a home security disaster! In this episode, James Kerr, founder of Boss Security Screens, and MJ Johnston, retired police captain and security expert, break down what you must do to keep your house safe while you're on vacation. They share real stories, simple tips, and the most overlooked security ga…
…
continue reading

1
Craig Sheffield's Unconventional Journey Into Cybersecurity
1:01:54
1:01:54
Play later
Play later
Lists
Like
Liked
1:01:54Craig Sheffield shares his unconventional journey transitioning from teaching English in Taiwan to pursuing a cybersecurity career, highlighting how his background in music and audio engineering provided unexpected transferable skills. He also shares his candid experiences with the TryHackMe Security Analyst Level 1 certification. Episode Resources…
…
continue reading

1
Business Physics: How Brand, Pricing, and Product Design Define Success with Erik Swan
1:01:31
1:01:31
Play later
Play later
Lists
Like
Liked
1:01:31Summary In this episode, Erik reflects on his long and storied tech career—from the days of punch cards to founding multiple startups, including a stint at Splunk. At 61, he offers a unique perspective on how the industry has evolved and shares candid insights into what it takes to build a successful company. He discusses the evolution from buildin…
…
continue reading

1
Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, fro…
…
continue reading

1
Taiko: Scaling Ethereum in a Decentralised Manner - Joaquin Mendes
1:08:05
1:08:05
Play later
Play later
Lists
Like
Liked
1:08:05Taiko is a decentralized, Ethereum-equivalent (type I) rollup scaling solution which uses ZK technology. Taiko's goal is to scale Ethereum efficiently while maintaining security and decentralization. Being a type I zkEVM, Taiko retains full Ethereum equivalence, which creates a seamless DevEx, although this comes at the expense of UX as slower proo…
…
continue reading

1
Cyber resilience needs to move beyond 'not if, but when'
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54What if our fundamental approach to security needs rethinking? In this conversation with Tia Hopkins, Chief Cyber Resilience Officer at eSentire, we explore why resilience has become the industry's latest buzzword—and why it demands more than just lip service. One of the mantras Hopkins doesn't particularly care for when it comes to cyber resilienc…
…
continue reading

1
Building Cyber Warriors: The Evolving Cyber Professional
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confidentiality, and complying with relevant laws and regul…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweek…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
The Iceberg Impact: Unpacking the Hidden Costs of Cyber Attacks
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational loss to the complete failure of a business. Go be…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
👁️ Look Here: Why Every Great Deception Starts with Stolen Attention
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. In this week's episode: 🚨 Your attention is under attack! 🚨 From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive M…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episo…
…
continue reading

1
Beyond the Prompt: Navigating the Threats to AI Agents
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surfac…
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven i…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
Mastering Cybersecurity: Part 1 - Why learning how to "Build" is Essential
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we delve into the often-overlooked yet fundamental importance of learning how to "build" systems, networks, and applications for cybersecurity professionals. Coining the philosophy "Build, Secure, Hack," we explore why hands-on experience in building provides an essential foundation for effectively securing and ultimately understan…
…
continue reading

1
The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs)…
…
continue reading

1
Cisco wants to use AI to defend AI at machine scale
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to do with AI. We sat down with Cisco's Chief Product Officer Jeetu Patel to have a conversation about where he and Cisco thinks things are going. When we spoke to Patel last year, he was quite optimistic. The use of AI in security solutions w…
…
continue reading
Join Felicia King in this eye-opening episode of Breakfast Bytes as she unravels the concept of third-party information security risk management. Felicia highlights the growing debates around software as a service (SaaS) platforms and the complexities they entail, raising poignant questions about security, backups, and risk. Dive deep into the intr…
…
continue reading

1
GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading