PodcastsNoticiasSecurity Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

Security Weekly Productions
Security Weekly Podcast Network (Video)
Último episodio

4822 episodios

  • Security Weekly Podcast Network (Video)

    Scylla &Charybdis, Kyber, Trigonia, Namastex, GitHub, Crypto, Cables, Aaran Leyland - SWN #575

    24/04/2026 | 32 min
    SScylla and Charybdis, Latin Phrasebook, Kyber, Trigonia, Namastex, GitHub, Crypto, Cables, Aaran Leyland, and More on this episode of the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-575
  • Security Weekly Podcast Network (Video)

    Back to (or Start) Fundamentals? - Rajesh Khazanchi - PSW #923

    23/04/2026 | 2 h 3 min
    This week:
    Larry's in the host seat and chaos ensues. We dig into:
    A very questionable story about tracking a warship with a $5 Bluetooth tracker
    Serial-to-IP devices quietly sitting in critical infrastructure… and full of holes
    New York regulators mandating MFA and asset inventory—aka CIS Control #1 is now breaking news
    A ransomware negotiator who decided to double-dip (and landed in prison)
    "Brand new" hard drives that come preloaded… with someone else's data
    The Vercel breach: no zero-day, just shadow IT, stolen tokens, and bad decisions
    AI-driven vulnerability discovery and the looming "vulnpocalypse"
    Quantum crypto debates: real threat or just another security boogeyman?
    Mirai is STILL alive—because apparently we still don't patch routers
    And yes… Flipper Zero makes an appearance (no, you're not hacking airplanes… calm down)
    Then, we rebroadcast an interview from RSAC.
    Breach Readiness for Measurable Risk Reduction in the Age of AI Cyber leaders no longer debate whether a breach will occur. What has changed is the speed and scale at which AI now enables those breaches. The real question is how far an attacker can move once inside. In this conversation, Rajesh Khazanchi explores why breach readiness, including AI-assisted containment, measurable blast radius reduction, and pervasive microsegmentation, has become mission-critical for business continuity in 2026.
    This segment is sponsored by ColorTokens. Visit https://securityweekly.com/colortokensrsac to learn more about them!
    Show Notes: https://securityweekly.com/psw-923
  • Security Weekly Podcast Network (Video)

    From Shame to Fame: Changing Behaviors and RSAC Interviews from Tanium and Illumio - Craig Taylor, Tim Morris, Andrew Rubin - BSW #444

    22/04/2026 | 1 h 8 min
    Why have security awareness training programs failed? Maybe we need to understand human psychology. Humans don't like tricks, or to be shamed, or negative emotions. Humans want to be rewarded, but yet our training and phishing programs are not built for reward. Maybe it's time to rethink cyber literacy.
    Craig Taylor, CEO and Co-founder at CyberHoot, joins Business Security Weekly to discuss why we need to shift our Cyber Literacy industry from shame and punishment towards gamification, positive reinforcement, and small rewards. If we truly aspire to change behaviors, then we need a different approach. Craig will discuss how a multi-disciplinary approach rooted in science is the future of training and phishing programs.
    Segment Resources:
    Individual Registration (Free Personal Training for Life): https://cyberhoot.com/individuals/ Newsletter Registration: https://cyberhoot.com/newsletters/ Blog Articles: https://cyberhoot.com/blog/ Cybrary (Library of 1000+ Cybersecurity Terms in non-technical language): https://cyberhoot.com/cybrary/ Special Podcast Offer: 20% off CyberHoot for 1 year using the podcast's unique coupon code: "Business Security Weekly"
    From Reactive to Autonomous: Real-Time Endpoint Intelligence in the Age of AI As organizations experiment with agentic AI and autonomous security operations, many are discovering a difficult reality: AI is only as effective as the data and visibility behind it. Yet most enterprises still struggle to answer basic questions about their endpoints in real time.
    In this conversation, we'll explore how IT and security teams are evolving from reactive operations toward proactive, preventative, and ultimately autonomous models. The journey begins with real-time endpoint intelligence—the ability to see, understand, and act across every endpoint in seconds.
    This segment is sponsored by Tanium. Visit https://securityweekly.com/taniumrsac to learn more about them!
    Hard Truths: The Lies We Keep Buying in Cybersecurity Cybersecurity isn't broken because of a lack of technology—it's broken because the industry avoids hard truths. Fear still drives budgets. AI is oversold as a cure‑all while foundations remain weak, and CISOs are held accountable without the authority to change outcomes. In this conversation, Illumio CEO and founder Andrew Rubin breaks down what must change to build real resilience—because the next breach won't just impact the business, it could end a career.
    For more information about Illumio, please visit: https://securityweekly.com/illumiorsac
    Show Notes: https://securityweekly.com/bsw-444
  • Security Weekly Podcast Network (Video)

    Robosawmill, Gentleman, Vercel, GitHub, Claude, RS232, Josh Marpet, and More... - SWN #574

    21/04/2026 | 32 min
    Robosawmill, Gentleman, Vercel, GitHub, Claude, RS232, Josh Marpet, and More on the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-574
  • Security Weekly Podcast Network (Video)

    The Human Aspect of Red Teams - Brian Fox, Tom Tovar, T. Gwyddon 'Data' Owen - ASW #379

    21/04/2026 | 1 h 13 min
    Red team exercises set goals to see if a particular outcome can be accomplished through a simulated attack, but the ultimate outcome should be educating the org about how to improve tools and processes that make attacks more difficult to succeed. Gwyddon "Data" Owen shares his experience building a red team, creating an exercise, and leveraging the results to improve security. And while the adoption of LLMs will accelerate a red team's activities, there are still plenty of foundational security controls that orgs can establish that would require a red team to be more than just fast, but fast and very careful.
    Coding Agents Are Getting More Cautious, But Not Safer
    A new study finds that while frontier AI coding models are hallucinating less than they did a year ago, they still preserve a significant amount of avoidable software risk when left ungrounded. Sonatype's research shows that connecting these models to real-time software intelligence dramatically improves remediation quality and reduces critical and high-severity vulnerability exposure by 60–70%. The takeaway is clear: safer AI-assisted development will depend not just on better models, but on grounding them in accurate, current dependency and vulnerability data.
    This segment is sponsored by Sonatype. Read the study: https://securityweekly.com/sonatypersac
    How We Achieve Agentic Outcomes in CyberSecurity: The "Do-It-For-Me" Mobile Defense
    If you look at deepfakes, synthetic identity, social engineering, and new malware variants coming to market, it seems like attackers have a first-mover advantage in using AI. The volume and variety of threats are growing faster than the current cyber stack can address. Against this backdrop, organizations are moving away from "do-it-yourself" delivery models (more tools, more alerts, more headcount) to "do-it-for-me" agentic AI delivery models (using platforms that unify data, execute policy, and automate outcomes). The emphasis outside of cyber is on empowering the expert human-in-the-loop — so teams spend less time in the noise and more time delivering business outcomes. This segment explores how cybersecurity leaders can make the most of the AI Age, leveraging it for good while staying relevant amid the explosive AI adoption curve.
    This segment is sponsored by Appdome. Visit https://securityweekly.com/appdomersac to learn more about them!
    Show Notes: https://securityweekly.com/asw-379

Más podcasts de Noticias

Acerca de Security Weekly Podcast Network (Video)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Sitio web del podcast

Escucha Security Weekly Podcast Network (Video), The Daily y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Security Weekly Podcast Network (Video): Podcasts del grupo

Aplicaciones
Redes sociales
v8.8.12| © 2007-2026 radio.de GmbH
Generated: 4/25/2026 - 2:18:51 PM