Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading

1
Your Time Management Revolution - productivity tips from The Inefficiency Assassin, Helene Segura
Helene Segura, MA Ed, CPO
Time management consultant Helene Segura brings you a variety of recommendations on the mindset, strategies and tactics successful people implement for effective time management and productivity. Some episodes are solo musings, only 2-5 minutes in length. Other episodes are interviews that can last 30 minutes to an hour. Note to podcast aficionados: This is not a templated show, so there’s no set format. These are recordings of thoughts, recommendations and interviews – all designed to help ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
The Breakeven Brothers podcast explores how AI is transforming the landscape for professionals. Join brothers Bradley Bernard and Bennett Bernard, a software engineer and a Certified Public Accountant, as they offer a unique perspective on how automation and intelligent agents are transforming knowledge work. They explore the shift from manual tasks to strategic oversight, the growing importance of prompt engineering, and the critical skills you'll need to not just survive, but thrive in an ...
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading
The SAP Business Technology Platform Podcast
…
continue reading
Established in 2022, Coffee with the Council is an ongoing podcast series produced by the PCI Security Standards Council, a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments worldwide. The podcast series seeks to engage the payment card industry by communicating Council news and updates; sharing interviews, panel discussions or case studies from third-parties; offering coverage from Counci ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Covering security solutions, integrations, capabilities...but mostly how to simplify our sometimes complex and complicated world of cybersecurity. Remember - security is a process, not a product.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Securely HERS is a cybersecurity podcast dedicated to providing women with practical advice and guidance to protect their personal and professional lives from cyber threats. Hosted by cybersecurity expert Veronica Duff, each episode features discussions on the latest cybersecurity trends, tips on how to secure personal devices and accounts, and interviews with industry professionals on various topics related to cybersecurity. Whether you're a beginner or an experienced user, Securely HERS pr ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A look at issues affecting the bank and insurance securities community
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
Cleaning and sanitizing are critically important steps that save lives by eliminating foodborne pathogens and keeping us from infecting each other with viruses. This podcast is filled with entertaining and informative conversations about cleaning and sanitizing with sanitation experts and chemists hosted by Keller Media Solutions.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Welcome to EURACTIV's AgriFood Brief, your weekly update on all things Agriculture & Food in the EU from EURACTIV's Agrifood news team: Gerardo Fortuna and Natasha Foote
…
continue reading
Money Maestro represents you, the customers, not the banks. As independent brokers, we’re not tied to any single bank’s product guidelines. We have the ability and expertise to solicit the best solution tailored to your needs and situation.
…
continue reading
Every month, Charlie Linney and Lewis Brooks speak to a diverse group of practitioners, experts, and commentators from around the world to discuss the impacts of security policy on contemporary conflict. Join us to talk about the long-term implications of securitised interventions and policies, both for democratic controls over the use of force in Europe, the US and elsewhere and for the communities most impacted in places like the Middle East, the Sahel, the Horn of Africa, South America an ...
…
continue reading

1
Cyber Health Check: How to Assess Your Security Products Effectively
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55#cybersecurity #productanalysis #cyberhealth Is your cybersecurity stack protecting you—or leaving you exposed? In this episode, we break down the essentials of product assessment for cyber health. Learn how to evaluate tools, identify gaps, and ensure your defenses align with modern threats. Whether you’re a security leader or a technical pro, thi…
…
continue reading

1
Jacob Salassi - Developer Empathy: A Thoughtful Approach to Product Security
1:03:24
1:03:24
Play later
Play later
Lists
Like
Liked
1:03:24Jacob Salassi, former Director of Product Security at Snowflake, joined this episode of The Security Champions Podcast to share insights from his experience leading security transformation at scale. This episode explores the role of empathy in driving security engagement and how security teams can better align with engineering workflows. Jacob disc…
…
continue reading

1
EP233 Product Security Engineering at Google: Resilience and Security
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Guest: Cristina Vintila, Product Security Engineering Manager, Google Cloud Topic: Could you share insights into how Product Security Engineering approaches at Google have evolved, particularly in response to emerging threats (like Log4j in 2021)? You mentioned applying SRE best practices in detection and response, and overall in securing the Googl…
…
continue reading

1
Secure Your Future: Essential Legal Documents You Need NOW!
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47http://www.TimeManagementRevolution.com - Whether you're planning for the unexpected or simply getting your life organized, having the right legal documents in place is essential. In this video, Helene Segura, Time Management Fixer breaks down the must-have documents everyone should consider—no legal jargon, just clear explanations. Get your FREE P…
…
continue reading

1
300 - Episode Three Hundred, and some Microsoft security updates
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49This is episode 300! Massive thank you and gratitude to everyone for tuning in over the years. We reflect a bit on the past 6 years of the show, and then we dive deep into security-focused updates from Microsoft. (00:00) - Intro and catching up. (03:02) - Show content starts. Show links - What's new in Microsoft Defender for Cloud features | Micros…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
…
continue reading

1
Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more... - Rob Allen - SWN #496
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://ww…
…
continue reading

1
Episode 073 - Chief Persuasion Officer: The New CISO Mindset - Rick McElroy
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33Chief Persuasion Officer: The New CISO Mindset NetSPI Field CISO and host of Agent of Influence podcast Nabil Hannan sat down with Rick McElroy to talk about the role of the CISO, leveraging AI in the cybersecurity space, vendor collaboration, and career advice. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at n…
…
continue reading

1
Secure Your Dream Land in Dubai with a Plot Loan from Money Maestro
0:28
0:28
Play later
Play later
Lists
Like
Liked
0:28Looking to buy land in Dubai? A plot loan from Money Maestro makes it easy to finance your dream property. Whether you plan to build a home or invest in real estate, we help you secure competitive rates and flexible terms tailored to your needs. Dubai’s booming infrastructure and strategic location make land a smart investment. Apply for your plot …
…
continue reading

1
Become a 1Password productivity pro with Allie Dusome | KEYBOARD SHORTCUT CRASH COURSE
1:01:59
1:01:59
Play later
Play later
Lists
Like
Liked
1:01:59We're back with a brand-new season of Random but Memorable! ✨🎉 We’re kicking things off with our highly requested productivity special — an hour jam packed with tips, tricks, and time-saving strategies to help you get the most out of 1Password. 1Password’s Allie Dusome joins the show to share her favorite keyboard shortcuts and lesser-known feature…
…
continue reading

1
Women's menopause health - Productivity and Women's Hormones
3:51
3:51
Play later
Play later
Lists
Like
Liked
3:51http://www.TimeManagementRevolution.com - Have you ever noticed how conversations with women over 40 often turn into a shared list of mysterious symptoms? Brain fog, joint aches, inflammation, digestive issues, forgetfulness, mood swings, sleep struggles, fatigue… sound familiar? Time Management Fixer Helene Segura shares valuable resources and her…
…
continue reading

1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading

1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading

1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading

1
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
…
continue reading

1
EP235 The Autonomous Frontier: Governing AI Agents from Code to Courtroom
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06Guest: Anna Gressel, Partner at Paul, Weiss, one of the AI practice leads Episode co-host: Marina Kaganovich, Office of the CISO, Google Cloud Questions: Agentic AI and AI agents, with its promise of autonomous decision-making and learning capabilities, presents a unique set of risks across various domains. What are some of the key areas of concern…
…
continue reading

1
Coffee with the Council Podcast: Meet This Year’s Europe Community Meeting Keynote Speaker, Bernie Collins
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56Today, I am so excited to bring you a sneak peek interview with PCI SSC's Europe Community Meeting Keynote Speaker, Bernie Collins. Bernie Collins is a Formula One Strategy Analyst and former Race Strategist, who has worked at the highest levels of motorsport, including Aston Martin. She specializes in decoding the complex world of F1 strategy, fro…
…
continue reading

1
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
…
continue reading

1
86-Talking Cloud Podcast with Jimmy Mesta, Co-Founder and CTO at RAD Security
1:14:27
1:14:27
Play later
Play later
Lists
Like
Liked
1:14:27In this episode of Talking Cloud, I interview Jimmy Mesta, co-founder of RAD Security, discussing the evolution of cloud computing and cybersecurity. We explore Jimmy's journey in cybersecurity, the role of the NSA in education, the transformation of security tools, and the importance of AI in the industry. The conversation explores the challenges …
…
continue reading

1
Navigating the risks of security force assistance
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07Training and equipping police, military, and border forces is a common part of international security policy. But how can this kind of support affect communities in conflict-affected countries? In this episode, we speak to Hamsatu Allamin, a peacebuilder from northeast Nigeria, and Major George Ashton of the British Army’s Royal Military Police, ab…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading

1
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean Martin
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51⬥GUEST⬥ Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Websit…
…
continue reading

1
Explore the Latest Home Loan Interest Rates in Dubai
0:26
0:26
Play later
Play later
Lists
Like
Liked
0:26Looking for the best home loan interest rates in Dubai. Money Maestro helps you find competitive rates that match your budget and goals. Whether you're buying your first home or upgrading to a larger space, understanding the interest rate is crucial to making a smart financial decision. Our mortgage experts guide you through fixed and variable rate…
…
continue reading

1
How I broke Claude's "Unlimited" $200 plan
1:13:32
1:13:32
Play later
Play later
Lists
Like
Liked
1:13:32After a surprisingly affordable and delicious trip to Vancouver, we're back and diving headfirst into the AI world's latest obsession: the talent war. Meta is swinging for the fences, reportedly dropping $100 million offers to poach top researchers from OpenAI. This has sparked a war of words, with OpenAI framing it as "stealing" and pitting their …
…
continue reading

1
UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more...
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: htt…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
Part 1. Virtualization in Cybersecurity: Why It’s a Game-Changer
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43#virtualization #cybersecuritytools #CyberSitrep What role does virtualization play in modern cybersecurity? In this episode of Cyber Sitrep, Eric and Mike explore how virtualization can transform your security workflows. From testing environments to isolating threats, discover why this tool is critical for professionals aiming to stay ahead of att…
…
continue reading

1
299 - Lessons learned self-hosting small Docker-based services and utilities
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In this week's episode, it's time to share insights and lessons learned from self-hosting stuff at home! We'll talk about the why and the what, and also some stuff that didn't work at all. You'll also hear about how to best service workloads from home, and what sort of equipment is needed. (00:00) - Intro and catching up. (04:04) - Show content sta…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
We Regret to Inform You: Your Phishing Training Did Nothing with Ariana Mirian
46:52
46:52
Play later
Play later
Lists
Like
Liked
46:52You click on a link in an email—as one does. Suddenly you see a message from your organization, “You’ve been phished! Now you need some training!” What do you do next? If you’re like most busy humans, you skip it and move on. Researcher Ariana Mirian (and co-authors Grant Ho, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Ch…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading