PodcastsNoticiasSecurity Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

Security Weekly Productions
Security Weekly Podcast Network (Video)
Último episodio

4811 episodios

  • Security Weekly Podcast Network (Video)

    We catch up on the news, including AI vuln hunting; also more RSAC interviews! - Mark Lambert, Samuel Hassine, John Wilson, Georges Bossert - ESW #454

    13/04/2026 | 1 h 37 min
    Segment 1: We cover the weekly enterprise news!
    Segment 2: RSAC interviews from ArmorCode and Filigran
    ArmorCode: AI Exposure Management and Governing Shadow AI
    AI is moving faster than most governance models can keep up. As organizations race to adopt new AI tools, developer workflows, agents and MCP servers, security leaders must enable innovation without losing control over risk, accountability and oversight. In this segment, ArmorCode will discuss its new AI Exposure Management (AIEM) solution, as part of the ArmorCode Agentic AI Platform. ArmorCode will highlight how AIEM gives enterprises clearer visibility into where AI is being used, who owns it and the potential risks it introduces across heterogeneous environments. By turning AI usage and signals from existing security and IT systems into governed, auditable outcomes, AIEM helps organizations reduce shadow AI risk, assign accountability and accelerate AI adoption with stronger control and board-ready governance. ArmorCode will also share findings from its new 2026 State of AI Risk Management report, developed in partnership with The Purple Book Community and based on responses from more than 650 enterprise security leaders. The discussion will connect ArmorCode's latest product innovation to the broader industry need for scalable, enterprise-ready AI risk governance.
    ArmorCode AI Exposure Management is available now as a solution deployed on the ArmorCode Agentic AI Platform. To learn more, visit https://securityweekly.com/armorcodersac.
    Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence
    In a time where the ability to turn intelligence into decisive action is a true competitive advantage, organizations must move beyond reactive alert triage to a proactive, threat-informed defense. This segment explores how unifying threat intelligence with adversarial attack simulation enables a Continuous Threat Exposure Management (CTEM) framework that replaces hype with measurable outcomes. We will discuss why these are no longer just technical security conversations, but critical business strategies that provide the board and C-suite with the clarity and confidence to reduce risk and focus resources where they matter most.
    This segment is sponsored by Filigran. Visit https://securityweekly.com/filigranrsac to learn more about them!
    Segment 3: RSAC interviews with Sekioa and Fortra
    Agentic AI: Don't Make Your SOC Faster at Being Wrong
    Adding AI agents to an unprepared SOC doesn't make it smarter; it just makes it "faster at being wrong." Georges Bossert challenges the industry hype to explain why true autonomy relies on reliable context and structured runbooks, not just prompts. He will discuss how to build the necessary foundations to automate rapidly without losing control.
    This segment is sponsored by Sekoia.io. Visit https://securityweekly.com/sekoiarsac to discover their AI SOC Platform!
    Scripted Sparrow: A Prolific BEC Group
    In December, Fortra Intelligence and Research Experts (FIRE) released a major report exposing Scripted Sparrow, one of the most active Business Email Compromise (BEC) collectives operating today. The group sends an estimated 6 million highly targeted scam emails each month, impersonating executive coaching firms and leveraging spoofed reply chains, missing attachment lures, and evolving multilingual campaigns. FIRE's investigation links the collective to 119 domains, 245 webmail accounts, and 256 bank accounts, with members operating across three continents and continually refining their fraud techniques at scale.
    This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them!
    Show Notes: https://securityweekly.com/esw-454
  • Security Weekly Podcast Network (Video)

    Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet. - SWN #571

    10/04/2026 | 30 min
    Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet, and More on this episode of the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-571
  • Security Weekly Podcast Network (Video)

    AI Makes All Bug Shallow? - PSW #921

    09/04/2026 | 2 h 5 min
    This week:
    Rage dropping 0-Day
    Claude Mythos, things are different now
    From UART to root, on a device made in China, where's the FCC?
    More CUPS vulnerabilities
    Russians are hacking routers, FCC ban doesn't stop them
    Mongoose vulnerabilities, and FCC still does nothing
    Renting virtual phones
    Iran's cyber attacks
    SHA-256 almost broken?
    Catching Axios
    New Rowhammer, dubbed GPUBreach, gives you root
    Windows 11 has sudo! (And SSH...)
    And Inside a Kubernetes Scanning Fleet
    Show Notes: https://securityweekly.com/psw-921
  • Security Weekly Podcast Network (Video)

    Zero Trust Readiness and Two RSAC 2026 Interviews from Fenix24 and Absolute Security - John Bruggeman, John Anthony Smith, Christy Wyatt - BSW #442

    08/04/2026 | 1 h 7 min
    Autonomous AI agents are creating a new attack surface for enterprise security teams, particularly as organizations deploy agents for operational tasks such as customer support automation, data analysis, and incident response. How can we align our Zero Trust initiatives to also address the emerging Agentic AI risks?
    John Bruggeman, Consulting CISO at CBTS, joins Business Security Weekly to discuss how your Zero Trust readiness can also prepare you for Agentic AI deployments. Organizations are granting agents access to sensitive systems without the security controls typically required for other Zero Trust initiatives. John will help educate CISOs on what they should be doing now to get ahead of the risk, including:
    Agent inventory
    Data security controls, including data model poisoning
    Agent identity controls, including authorization and access levels
    Infrastructure security controls, including MCP servers
    Why More Technology Hasn't Made Us More Secure Despite massive investment in cybersecurity tools, organizations remain vulnerable because their existing technologies are often misconfigured, poorly integrated, and disconnected from real operational risk. This keynote argues that complexity, human decision‑making, and gaps in execution—not a lack of products—are what truly empower attackers, especially as modern environments like cloud and SaaS expand the attack surface. Real security comes from simplifying, aligning, and expertly orchestrating what organizations already own, shifting the focus from buying tools to achieving disciplined, resilient outcomes grounded in breach reality.
    This segment is sponsored by Fenix24. Visit https://securityweekly.com/fenix24rsac to learn more about them!
    Downtime: The New Economic Threat Downtime is costing global enterprises hundreds of billions of dollars in losses annually. Caused by cyber incidents and software failures, enterprise CISOs are searching for strategies and solutions that will accelerate recovery and restoration of business operations after cyber disruptions render systems inoperable.
    This segment is sponsored by Absolute Security. Visit https://securityweekly.com/absolutersac to join The Resilient CISO Inner Circle!
    Show Notes: https://securityweekly.com/bsw-442
  • Security Weekly Podcast Network (Video)

    Cthullu, BlueHammer, NK, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland - SWN #570

    07/04/2026 | 32 min
    Radioactive Twinkies, Cthullu, BlueHammer, North Korea, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland, and More on the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-570

Más podcasts de Noticias

Acerca de Security Weekly Podcast Network (Video)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Sitio web del podcast

Escucha Security Weekly Podcast Network (Video), René Franco presenta La Taquilla y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Security Weekly Podcast Network (Video): Podcasts del grupo

Aplicaciones
Redes sociales
v8.8.9| © 2007-2026 radio.de GmbH
Generated: 4/13/2026 - 12:42:57 PM