PodcastsNoticiasSecurity Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

Security Weekly Productions
Security Weekly Podcast Network (Video)
Último episodio

4805 episodios

  • Security Weekly Podcast Network (Video)

    Battling payment fraud with tokenization and executive interviews from RSAC 2026 - Brian Oh, Mickey Bresman, Ashish Jain, Thyaga Vasudevan, Jimmy White - ESW #453

    06/04/2026 | 1 h 45 min
    Interview with Brian Oh from FIS Global
    Merchant-Specific Tokenization: Making Embedded Finance More Fraud-Resistant
    Payment fraud has not gone away. It has evolved into a largely social engineering-driven problem that increasingly lands on security leaders' desks. In this episode, Brian Oh from FIS Global explains how merchant-specific tokenization and virtual cards work, why embedded finance raises the stakes, and how approaches like behavioral biometrics and tokenized payments can reduce fraud while keeping checkout experiences fast and seamless.
    Segment Resources:
    FIS Global - The Future of Embedded Finance
    PYMNTS Article - FDIC Support Clears a Path for Tokenized Deposits to Scale
    FIS Global Blog - How behavioral biometrics are leading the way in secure banking and fraud defense for Digital One™ Flex clients
    FIS Global Blog - Inside Flex's Advanced Fraud Defense: What Tech Leaders Need to Know
    Interviews with Mickey Bresman from Semperis and Ashish Jain from OneSpan
    The Making of Midnight in the War Room
    Semperis is producing Midnight in the War Room, a full length feature film on cyberwar and CISO heroism and their work defending their companies against the onslaught of cyberattacks. Midnight in the War Room puts a human face on the front lines of cyber defense and will reveal the weight carried by defenders every day and why resilience must be built not only into systems, but into people and institutions.
    This segment is sponsored by Semperis! Visit https://securityweekly.com/semperisrsac to learn more.
    Why Passkeys Are Ready for Prime Time in Modern Banking
    Authentication has long required an uneasy tradeoff between strong security and smooth user experience. This interview segment explores why passkeys are ready now for even the highest risk banking use cases, why banks should be moving quickly to adopt them, and how OneSpan delivers the most complete, secure, and enterprise ready passkey solution on the market.
    This segment is sponsored by OneSpan. Visit https://securityweekly.com/onespanrsac to learn more about them!
    Interviews with Jimmy White from F5 and Thyaga Vasudevan from SkyHigh Security
    Securing AI Agents: Managing Runtime Risk in Enterprise AI Systems
    As organizations deploy AI agents and automated workflows, security challenges are increasingly emerging once these systems interact with APIs, enterprise data, and business processes in production.
    For more information about F5, please visit https://securityweekly.com/f5rsac.
    AI's Security Inflection Point: Hybrid, Browser Security, and Data Compliance
    The rapid adoption of AI applications is reshaping enterprise security architectures. As organizations integrate AI copilots, agentic workflows, and cloud-native platforms, traditional network-centric security models are proving insufficient.
    This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighrsac to learn more about them!
    Show Notes: https://securityweekly.com/esw-453
  • Security Weekly Podcast Network (Video)

    DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet... - SWN #569

    03/04/2026 | 32 min
    DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, the back seat of a Buick Electra, Josh Marpet, and More on this episode of the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-569
  • Security Weekly Podcast Network (Video)

    What Is A Router? (And all things AI) - PSW #920

    02/04/2026 | 2 h 5 min
    In the Security News:
    Claude leaks source code and new models
    Two really smart people say AI is finding vulnerabilities better than ever
    Windows is using your internet to send updates to strangers
    BIG-IP APM vulnerability - all you need to know
    Linux KVM for the win
    The bus factor and open source
    Axios supply chain breach
    Trimming Grub
    Depotting and hacking e-Motorcycles
    Trivy and Cisco source code leaks
    The FCC ban and What is a router?
    Show Notes: https://securityweekly.com/psw-920
  • Security Weekly Podcast Network (Video)

    Executive Paralysis and Two Pre-Recorded RSAC 2026 Interviews from DigiCert and Okta - Ann Marie van den Hurk, Amit Sinha, Matt Immler - BSW #441

    01/04/2026 | 1 h 1 min
    Most organizations don't fail because of technology. They fail because decision authority is unclear in the first critical minutes. "Being careful" is often interpreted as waiting for certainty, but that delay creates exposure. How should executives make decisions under pressure?
    Ann Marie van den Hurk, Founder at Mind The Gap Advisory, joins Business Security Weekly to discuss how executive paralysis leads to business damage. Ann Marie will discuss:
    Where Paralysis Actually Comes From
    What "Being Careful" Looks Like in Practice
    Why the First 20 Minutes Matter
    How Paralysis Becomes Business Damage
    Why Existing Plans Don't Hold
    What Actually Fixes It
    Then, we rebroadcast two interviews from RSAC 2026.
    Autonomous Intelligence and the Future of Digital Trust AI agents are no longer experimental tools — they are becoming autonomous participants in enterprise infrastructure. Acting independently, making decisions at machine speed, and interacting directly with sensitive systems, these agents fundamentally reshape the trust model that underpins modern organizations. As AI becomes embedded across operations, security must evolve from perimeter defense to continuous, identity-driven trust. This conversation explores what it means to build a resilient trust architecture for autonomous systems — one that ensures verifiable identity, constrained authority, accountability, and governance at scale. We'll examine how enterprises can balance innovation with control, prevent misuse or spoofed agents, and prepare for a future defined by machine-to-machine interactions. At stake is not just cybersecurity, but the integrity of digital trust itself.
    This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!
    Know Your AI Agents Through Visibility, Control, and Accountability AI agents are rapidly embedding into core enterprise workflows with broad access to sensitive systems and the ability to act autonomously, creating new challenges for security leaders tasked with enabling innovation while maintaining control. In this interview, Matt Immler will discuss why organizations must know about every agent operating in their environment and how to bring those agents under governance.
    This segment is sponsored by Okta. Visit https://securityweekly.com/oktarsac to learn more about them!
    Show Notes: https://securityweekly.com/bsw-441
  • Security Weekly Podcast Network (Video)

    Beyond the Hype: Cyber Readiness, Zero Trust, and an Unscripted Conversation - Rob Allen, Gibb Witham - SWN #568

    31/03/2026 | 37 min
    In the AI era, cybersecurity is undergoing a fundamental shift as AI agents transform both the speed and scale of attacks. In this interview, Gibb Witham, President and Chief Financial Officer of Hack The Box, explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems. Drawing on real-world benchmarks, agentic AI testing, and hands-on training, Witham outlines how security teams can safely adopt AI by proving performance under pressure. The discussion highlights why the future of cybersecurity depends on training, testing, and reinforcing human and AI operators together before they are trusted in critical environments.
    This segment is sponsored by Hack The Box. Visit https://securityweekly.com/hacktheboxrsac to learn more about them!
    As credential-based attacks continue to dominate headlines, many organizations are realizing that identity alone is no longer a sufficient control. This conversation explores the shift toward device-based access enforcement and why tying access to both user and device is becoming critical. We'll discuss how this evolution is reshaping Zero Trust strategies across modern environments.
    This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them!
    Show Notes: https://securityweekly.com/swn-568

Más podcasts de Noticias

Acerca de Security Weekly Podcast Network (Video)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Sitio web del podcast

Escucha Security Weekly Podcast Network (Video), Aristegui Noticias Podcast y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Security Weekly Podcast Network (Video): Podcasts del grupo

Aplicaciones
Redes sociales
v8.8.6| © 2007-2026 radio.de GmbH
Generated: 4/6/2026 - 2:08:24 PM