Big announcements, conferences, the hallway track. We’re in the trenches having awesome conversations with real people from the community. This show features conversations from technology and software development events such as O’Reilly’s OSCON, All Things Open, Node Interactive (covering the Future of Node.js and JavaScript), and more. Hosts Adam Stacoviak and Jerod Santo talk to software engineers, keynote speakers, industry experts, and passionate attendees about open source, software ind ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
…
continue reading
The Truth About Real Estate Investing... for Canadians is by Canadians for Canadians eh? The show is exactly that, we speaks truths, no get rich quick schemes, investing is a marathon, if you're looking to get rich quick this is not the place for you. Instead, we invest based on economic fundamentals using tried and true best practices that generate wealth for the long term. The Show is hosted by Erwin Szeto aka Mr. Hamilton. Erwin is a professional real estate investor, Realtor at Rock Star ...
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
1
Threat Modeling and Understanding Inherent Threats - Adam Shostack - ESW #359
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
…
continue reading
1
Threat Modeling and Understanding Inherent Threats - Adam Shostack - ESW #359
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
34:25
34:25
Play later
Play later
Lists
Like
Liked
34:25
In this episode we dive deep into the world of authorization with Emre Baran, CEO and co-founder of Cerbos. As a seasoned entrepreneur and software expert, Emre brings over 20 years of experience to the table, discussing the subtle yet significant distinctions between authorization and authentication, and why these concepts are pivotal in today's c…
…
continue reading
1
How GenAI Can Improve SecOps - Ely Kahn - ESW #359
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
…
continue reading
1
How GenAI Can Improve SecOps - Ely Kahn - ESW #359
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
…
continue reading
This week the crew discusses: When TVs scan your network, bad things can happen, PuTTY is vulnerable, Crush FTP, vulnerabilities that will never be fixed, CVEs are for vulnerabilities silly, you can test for easily guessable passwords too, FlipperZero can steal all your passwords, more XZ style attacks, more reasons why you shouldn't use a smart lo…
…
continue reading
1
Autonomous - I don't think that word means what you think it means - ESW #359
43:35
43:35
Play later
Play later
Lists
Like
Liked
43:35
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
…
continue reading
1
Autonomous - I don't think that word means what you think it means - ESW #359
43:35
43:35
Play later
Play later
Lists
Like
Liked
43:35
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
…
continue reading
1
Advising The President On Cyber-Physical Resilience - Philip Venables - PSW #826
1:00:46
1:00:46
Play later
Play later
Lists
Like
Liked
1:00:46
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
…
continue reading
1
XZ & Open Source, PuTTY's Private Keys, LeakyCLI, LLMs Writing Exploits - ASW #282
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28
CISA chimes in on the XZ Utils backdoor, PuTTY's private keys and maintaining a secure design, LeakyCLI and maintaining secure secrets in CSPs, LLMs and exploit generation, and more! Show Notes: https://securityweekly.com/asw-282
…
continue reading
1
Robofly, CRUSHFTP, Github, Palo Alto, MITRE, Fancy Bear, Deepfakes, Aaran Leyland... - SWN #380
37:02
37:02
Play later
Play later
Lists
Like
Liked
37:02
Robofly, CRUSHFTP, Github, Palo Alto, MITRE, Fancy Bear, Deepfakes, Aaran Leyland, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-380
…
continue reading
1
Sustainable Funding of Open Source Tools - Simon Bennetts, Mark Curphey - ASW #282
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
…
continue reading
1
Unraveling the "Materiality" Mystery: A CISO's Guide to SEC Compliance - Mike Lyborg - BSW #347
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45
The new SEC Cyber Security Rules require organizations to be ready to report cyber incidents. But what do you actually need to do? Mike Lyborg, Chief Information Security Officer at Swimlane, joins Business Security Weekly to discuss how to prepare. In this interview he'll discuss the key element of your preparation, including: Quantification Mater…
…
continue reading
1
What does DoD’s CMMC Requirement Mean for American Businesses - Edward Tuorinsky - BSW #347
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
…
continue reading
1
Side Hustle 14 Houses in Georgia USA. Giving Back To Entrepreneurs With Shawn Bedard
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37
My friend Shawn Bedard who I first met at REIN over ten years ago and our real estate investing paths were quite different. Back in 2010, Shawn couldn’t find deals that make sense in Ontario so he went to landlord friendly USA and bought 4 houses in Atlanta and 10 in Memphis, Georgia. His experience and investment went…. I’ll let him SHARE. Other t…
…
continue reading
1
Win 95, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland... - SWN #379
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47
Win 95, Cheat Lab, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-379
…
continue reading
1
Crazy money and crazy outcomes - cybersecurity acquisitions in all shapes and sizes - ESW #358
1:06:27
1:06:27
Play later
Play later
Lists
Like
Liked
1:06:27
This week, Adrian and Tyler discuss some crazy rumors - is it really possible that a cloud security startup valued at over $8 billion in November 2021 just got bought for $200 million??? Some healthy funding for Cyera and Cohesity ($300m and $150m, respectively) Onum, Alethea, Sprinto, Andesite AI, StrikeReady, YL-Backed Miggo, Nymiz, Salvador Tech…
…
continue reading
1
Crazy money and crazy outcomes - cybersecurity acquisitions in all shapes and sizes - ESW #358
1:06:27
1:06:27
Play later
Play later
Lists
Like
Liked
1:06:27
This week, Adrian and Tyler discuss some crazy rumors - is it really possible that a cloud security startup valued at over $8 billion in November 2021 just got bought for $200 million??? Some healthy funding for Cyera and Cohesity ($300m and $150m, respectively) Onum, Alethea, Sprinto, Andesite AI, StrikeReady, YL-Backed Miggo, Nymiz, Salvador Tech…
…
continue reading
1
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358
41:09
41:09
Play later
Play later
Lists
Like
Liked
41:09
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
…
continue reading
1
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358
41:09
41:09
Play later
Play later
Lists
Like
Liked
41:09
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
…
continue reading
1
Hacker Heroes - Winn Schwartau - PSW #825
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47
Pioneering the Cyber Battlefield: A Deep Dive with Winn Schwartau, Cybersecurity Luminary Get ready for an extraordinary episode as we sit down with Winn Schwartau, a true pioneer and luminary in the world of cybersecurity. Winn's impact on the field is nothing short of legendary, and in this podcast interview, we uncover the profound insights and …
…
continue reading
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) puts greater emphasis on application security than did previous versions of the standard. It also adds a new “customized approach” option that allows merchants and other entities to come up with their own ways to comply with requirements, and which also has implications for a…
…
continue reading
1
Annual Intensity Global Group Conference 2024 part 3: The cyber defender view
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15
הכנס השנתי 2024 של קבוצת אינטנסיטי גלובל חלק חלק שלישי: ראיית המגן למרות האיומים האירנים לאנשי הסייבר זו מאין שגרה. דריכות המתנה ושיוף היכולות עוד ועוד מנחה: נחשון פינקו - אוונגליסט סייבר סמנכ"ל בכיר ליעוץ ושרותי מומחים בניאטק סייבר סקיורטי בע"מ. משתתפים: אביבית קוטלר: סיסו ודי.פי.או - בשרותי בריאות כללית יערה לבון: סיסו – אילון חברה לביטוח אמיר אר…
…
continue reading
1
Unfiltered: The Real Challenges and Triumphs of a Full-Time Investor with Adam Kitchener
1:20:27
1:20:27
Play later
Play later
Lists
Like
Liked
1:20:27
We have my friend Adam Kitchener back on the show as we get along because he keeps it so real. No pictures of him on a private plane, or luxury vehicle or luxury watches. Well he does actually but they’re obviously photoshopped as he’s poking fun at the phonies out there. Don’t get me wrong, luxury stuffs great. I personally luv it when folks celeb…
…
continue reading
1
SaaS Exposed: Unmasking Cyber Risks in Cloud Integrations
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16
Luke Jennings, VP of Research & Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastruc…
…
continue reading
1
Arg Parsing in Rust, End of Life Hardware, CSRB & MS, Chrome’s V8 Sandbox - ASW #281
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12
A Rust advisory highlights the perils of parsing and problems of inconsistent approaches, D-Link (sort of) deals with end of life hardware, CSRB recommends practices and processes for Microsoft, Chrome’s V8 Sandbox increases defense, and more! Show Notes: https://securityweekly.com/asw-281
…
continue reading