Info

Security Weekly Podcast Network (Video)

This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
RSS Feed Subscribe in Apple Podcasts
Security Weekly Podcast Network (Video)
2024
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


2014
December
November
October
September
August
July
June
May
April
March
February
January


2013
December
November
October
September
August
July
June


Categories

All Episodes
Archives
Categories
Now displaying: Page 93
Aug 28, 2019

IT and data breaches are going up every year and a large portion of them involve vendors or other third parties with access to enterprise networks and systems. Mr. Howlett will review the current state, examine a couple of high profile vendor related breaches for lessons learned and talk about best practices to limit 3rd party risk.

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141 Visit https://www.securityweekly.com/bsw for all the latest episodes!

Aug 27, 2019

Pawan Shankar is the Senior Product Marketing Manager of Sysdig. Sysdig is very excited to announce the launch of Sysdig Secure 2.4! With this release, Sysdig adds runtime profiling to enhance anomaly detection and introduces brand new interfaces that improve runtime security policy creation and vulnerability reporting.

To learn more about Sysdig, visit: https://securityweekly.com/sysdig Full Show Notes: https://wiki.securityweekly.com/ASW_Episode74 Visit https://www.securityweekly.com/asw for all the latest episodes!

Aug 27, 2019

In the Leadership and Communications segment, The elements of a good company apology, 8 ways leaders delegate successfully, there's no shame in working on vacation and more!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141 Visit https://www.securityweekly.com/bsw for all the latest episodes!

Aug 25, 2019

We interview Roman Sannikov, the Director and Analyst on Demand at Recorded Future. We also interview Ray DeMeo, the Chief Operating Officer at Virsec.

\Full Show Notes: https://wiki.securityweekly.com/Episode617

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 24, 2019

In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 24, 2019

Waiting to deploy critical patches makes you a bigger target - Cybercriminals Have Seven-Day Advantage to Weaponize Vulnerabilities, According to New Research from Tenable- Cyber Criminals have seven day advantage to weaponize vulnerabilities according to new research from tenable.

To learn more about Automox, visit: https://securityweekly.com/automox

Full Show Notes: https://wiki.securityweekly.com/Episode617

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 23, 2019

Paul gives a technical segment on deobfuscating JavaScript to investigate phishing domains.

To learn more about DomainTools, visit: https://securityweekly.com/domaintools

Full Show Notes: https://wiki.securityweekly.com/Episode617

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 23, 2019

We interview Carsten Willems from VMRay and David Etue from BlueVoyant!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 22, 2019

We interview Steve Laubenstein from CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 21, 2019

CVE-2019-1162 showcases elevation of privilege in an ancient Windows component. HTTP/2 Denial of Service Advisory with seven vulns that affects the protocol implemented by several vendors, SSH certificate authentication for GitHub Enterprise Cloud works well with tools like Sharkey and BLESS. We talked more about ephemeral access and SSH in episode 71, Polaris Points the Way to Kubernetes Best Practices, and much more!

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode73 Visit https://www.securityweekly.com/asw for all the latest episodes!

Aug 21, 2019

Hacker Halted is EC-Council's premier IT Security Conference held in Atlanta annually. Hacker Halted gathers 1400+ Information Security Professionals in two days of Exhibiting, Breakout Sessions, Live Hacking Demos and Keynotes!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140

To register for Hacker Halted, visit: https://securityweekly.com/hackerhalted and use the discount code HH19SW to get $100 off!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Aug 20, 2019

In the Leadership and Communications segment, 3 Traits Of Successful Entrepreneurs, 4 Ways To Gain Power And Use It For Good, 5 Reasons to Never Compromise on Punctuality, and more!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140 Visit https://www.securityweekly.com/bsw for all the latest episodes!

Aug 20, 2019

At Black Hat 2019, we interviewed: Ameya Talwalker from Cequence, Mark Batchelor from PING Identity, and Michael Krueger from NowSecure!

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode73 Visit https://www.securityweekly.com/asw for all the latest episodes!

Aug 19, 2019

In this segment, we interview O'Shea Bowens from Null Hat Security and Tyler Robinson from Nisos, Inc., from the Blue Team Village. Then we interview Aaran Leyland in the Social Engineering Village.

 

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 18, 2019

The Huawei shenanigans get deeper and more broad. - This is why I have issues with supply chain, CapitalOne hacker may have stolen from 30 more companies, New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records, Malware lingers in SMBs for an average of 800 days before discovery, and more!

 

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 17, 2019

Tony Punturiero is the Community Manager at Offensive Security. Discussing about my adventure transferring from being on the blue side to becoming a pentester/red teamer full time. Created an infosec community to help each people in the infosec field come together to learn from one another.

 

Full Show Notes: https://wiki.securityweekly.com/Episode616

Visit https://www.securityweekly.com/psw for all the latest episodes!

Aug 16, 2019

We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019!

 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. It is important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Managing vulnerabilities the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover. They will cover usability, easy to use tool, fast deployment, quickly operational, intuitive UI and workflow, discovery, and accuracy.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 16, 2019

Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8!

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 15, 2019

In the Leadership and Communications segment, How our brains decide when to trust, Warren Buffet's "2 List strategy, Lack of IT leadership fuels IoT trial failures, and more!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode139 Visit https://www.securityweekly.com/bsw for all the latest episodes!

Aug 15, 2019

During this discussion, Joshua and Paul will speak about the threats facing organizations today and how they are evolving. Josh will also discuss how IT and security teams need to understand the threats their organizations face and how leveraging actionable threat intelligence can help them build the most effective and efficient defense strategy.

→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly
→Like us on Facebook: https://www.facebook.com/secweekly

Aug 15, 2019

Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode148

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 15, 2019

IT operations and security teams are very different, but at a high level they both work to create a highly available digital infrastructure that s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.

Full Show Notes: https://wiki.securityweekly.com/ES_Episode149

Visit https://www.securityweekly.com/esw for all the latest episodes!

Aug 14, 2019

From Equifax to Capital One: The problem with web application security, Upcoming Change to Chrome's Identity Indicators means the EV UI Moving to Page Info, Apple extends its bug bounty program to cover macOS with $1 million in rewards, Azure Security Lab: a new space for Azure research and collaboration, Awarding Google Cloud Vulnerability Research, and more!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode139 Visit https://www.securityweekly.com/asw for all the latest episodes!

1 « Previous 90 91 92 93 94 95 96 Next » 160