show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork

1
The SAFE CAST

The Safe Cast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
  continue reading
 
Artwork

1
Base Layer

David Nage | BlockWorks Group

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Base Layer will be providing insights from founders and investors in the base layer of cryptoassets. Simplifying complex projects and the technology being developed, from interoperability to relayers and more - who is building the future, why are they and how are they doing it.
  continue reading
 
Artwork
 
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
  continue reading
 
Artwork
 
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
  continue reading
 
Artwork

1
Portland Auto Glass

Portland Auto Glass

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
If you want to prevent these problems from happening in the first place, you can improve your car's windshield by applying a protective layer of security. At Portland Auto Glass, we install high-quality aftermarket glass products from Mopar and Guardian. We use these products because they're designed to be scratch-resistant, fog-resistant, and chip resistant. You're not just getting an effective repair; you're getting glass that will defend your vehicle against additional wear and tear for m ...
  continue reading
 
Artwork

1
Tech on the Rocks

Kostas, Nitay

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join Kostas and Nitay as they speak with amazingly smart people who are building the next generation of technology, from hardware to cloud compute. Tech on the Rocks is for people who are curious about the foundations of the tech industry. Recorded primarily from our offices and homes, but one day we hope to record in a bar somewhere. Cheers!
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
"Web 3.0 with Sam Kamani" is all about Web 3 and how it is going to change the world. If you are interested in learning more about the 4th Industrial revolution then this podcast is for you. Web 3.0 or Web 3 is often hailed as the technology that will usher in the 4th industrial revolution. This revolution is going to affect every industry, business, government and person on this planet. Web 3.0 is a collection of technologies that are going to change how we collaborate with each other and i ...
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Path | Passion | Purpose by DIONZ is a podcast that aims to inspire and empower its audience by interviewing conscious and impactful global leaders, nextgens, entrepreneurs, and creatives. Through candid conversations, guests share their path to discovering their passion - or the unique gifts that make them who they are - and, more importantly, how they transformed their passion into impactful endeavours that co-create a positive impact for us all. Instead of recording our podcast in a stati ...
  continue reading
 
Artwork

1
The Sound Off On School Safety

Safe and Sound Schools

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Do you feel there's more that we can do to keep our schools safe? Join Michele Gay, co-founder and Director of Safe and Sound Schools and a mother who lost her child tragically in the Sandy Hook School tragedy, as she discusses practical and inspiring ways school leaders, parents, and students can work together to ensure safer schools for all. Together, we can make a difference. Together, we can make our schools Safe and Sound.
  continue reading
 
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
  continue reading
 
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
  continue reading
 
Artwork
 
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
  continue reading
 
Artwork

1
Refined By Divorce

Traci Simkins

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Going through a divorce is never easy. For women who put their own career or education on hold to support a spouse and raise their children, it adds an additional layer of difficulty, and it can become a poverty trap that is nearly impossible to climb out of. I offer a different option by teaching you how to build a small service business with little to no capital or experience. Entrepreneurship can be the solution to keeping you out of poverty, and divorce can be a great catalyst for change ...
  continue reading
 
Artwork

1
Data Science Conversations

Damien Deighan and Philipp Diesinger

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Data Science Conversations Podcast hosted by Damien Deighan and Dr Philipp Diesinger. We bring you interesting conversations with the world’s leading Academics working on cutting edge topics with potential for real world impact. We explore how their latest research in Data Science and AI could scale into broader industry applications, so you can expand your knowledge and grow your career. Every 4 or 5 episodes we will feature an industry trailblazer from a strong academic back ...
  continue reading
 
Artwork
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
Artwork
 
Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you. Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable re ...
  continue reading
 
Loading …
show series
 
Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP Agentic Security Initiative's MAESTRO (Multi-Agent…
  continue reading
 
Security awareness is a thing of the past. Rather, the term and what it stands for are things of the past. It just doesn't cover the actual challenge organizations need to address. We need to be talking about Human Risk. At least, that's what Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4, thinks we should do. We were happy to o…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
  continue reading
 
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
  continue reading
 
Going on vacation? Don’t let your trip turn into a home security disaster! In this episode, James Kerr, founder of Boss Security Screens, and MJ Johnston, retired police captain and security expert, break down what you must do to keep your house safe while you're on vacation. They share real stories, simple tips, and the most overlooked security ga…
  continue reading
 
Craig Sheffield shares his unconventional journey transitioning from teaching English in Taiwan to pursuing a cybersecurity career, highlighting how his background in music and audio engineering provided unexpected transferable skills. He also shares his candid experiences with the TryHackMe Security Analyst Level 1 certification. Episode Resources…
  continue reading
 
Summary In this episode, Erik reflects on his long and storied tech career—from the days of punch cards to founding multiple startups, including a stint at Splunk. At 61, he offers a unique perspective on how the industry has evolved and shares candid insights into what it takes to build a successful company. He discusses the evolution from buildin…
  continue reading
 
In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, fro…
  continue reading
 
Taiko is a decentralized, Ethereum-equivalent (type I) rollup scaling solution which uses ZK technology. Taiko's goal is to scale Ethereum efficiently while maintaining security and decentralization. Being a type I zkEVM, Taiko retains full Ethereum equivalence, which creates a seamless DevEx, although this comes at the expense of UX as slower proo…
  continue reading
 
What if our fundamental approach to security needs rethinking? In this conversation with Tia Hopkins, Chief Cyber Resilience Officer at eSentire, we explore why resilience has become the industry's latest buzzword—and why it demands more than just lip service. One of the mantras Hopkins doesn't particularly care for when it comes to cyber resilienc…
  continue reading
 
In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confidentiality, and complying with relevant laws and regul…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweek…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
  continue reading
 
Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational loss to the complete failure of a business. Go be…
  continue reading
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. In this week's episode: 🚨 Your attention is under attack! 🚨 From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive M…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episo…
  continue reading
 
AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surfac…
  continue reading
 
Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven i…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
In this episode, we delve into the often-overlooked yet fundamental importance of learning how to "build" systems, networks, and applications for cybersecurity professionals. Coining the philosophy "Build, Secure, Hack," we explore why hands-on experience in building provides an essential foundation for effectively securing and ultimately understan…
  continue reading
 
This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs)…
  continue reading
 
Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to do with AI. We sat down with Cisco's Chief Product Officer Jeetu Patel to have a conversation about where he and Cisco thinks things are going. When we spoke to Patel last year, he was quite optimistic. The use of AI in security solutions w…
  continue reading
 
Join Felicia King in this eye-opening episode of Breakfast Bytes as she unravels the concept of third-party information security risk management. Felicia highlights the growing debates around software as a service (SaaS) platforms and the complexities they entail, raising poignant questions about security, backups, and risk. Dive deep into the intr…
  continue reading
 
Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the…
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play