Two men who argue and debate about construction.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The Talk of the Apple Community
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denia…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24202: TV+ Talk - Hollywood Movies and And Ads?
28:49
28:49
Play later
Play later
Lists
Like
Liked
28:49
Co-hosts Charlotte Henry and Chuck Joiner discuss Apple TV+ negotiating more Hollywood film licenses, debating the balance between original content and variety. They explore the potential introduction of ads to enhance revenue and consider incorporating non-Apple content on the platform. Show Notes: Chapters: 00:12 Summer TV Preview 00:51 Apple's H…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
10 Security Researcher Qualities Marketers Should Adopt - Dani Woolf - ESW #370
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01
There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity's Love Affair with Distractions - Fred Wilmot, Dani Woolf - ESW #370
2:18:08
2:18:08
Play later
Play later
Lists
Like
Liked
2:18:08
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, I try to be more succinct, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-403
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, I try to be more succinct, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-403
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity's Love Affair with Distractions - Fred Wilmot - ESW #370
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24201: Live! - AT&T's Data Breach, Net Neutrality, Chip Stockpiling
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24
In this episode of MacVoices, Chuck Joiner, Brian Flanigan-Arthurs, David Ginsburg, Mike Potter, Marty Jencius, Jim Rea, and Web Bixby cover a data breach involving AT&T's call logs, discussing the implications for privacy and security, including the ethics of ransomware payments and highlighting the importance of data protection and backups. The p…
…
continue reading
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PK Fail - John Loucaides - PSW #837
1:12:22
1:12:22
Play later
Play later
Lists
Like
Liked
1:12:22
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PK Fail - John Loucaides - PSW #837
3:22:11
3:22:11
Play later
Play later
Lists
Like
Liked
3:22:11
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24200: Vision Pro Focus - Getting Social With Apple Vision Pro
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10
Vision Pro Focus is a new series produced as a partnership between MacVoices and the Vision ProFiles Podcast. In the first episode, co-hosts Chuck Joiner, Marty Jencius, and Eric Bolden discuss the surprising topic of social interaction using the Apple Vision Pro. Mary and Eric discuss the environment created by inSpaze, how it functions, and the s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-402
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-402
…
continue reading
The MacVoices Update for 2024-07 covers the doubling up of new content and the “Road to Macstock” series and why you should care about Macstock even if you didn’t attend. A couple new items for MacVoices are teased, some updates on scheduling, and the month’s Support Report conclude the update. Show Notes: Support: Become a MacVoices Patron on Patr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A CISO's Perspective on AI, Appsec, and Changing Behaviors - Paul Davis - ASW #293
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A CISO's Perspective on AI, Appsec, and Changing Behaviors - ASW #293
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Evolving Role of the CISO - Allan Alford - BSW #358
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Security Posture Management - Dor Fledel - BSW #358
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Security Posture Management - Allan Alford, Dor Fledel - BSW #358
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24198: Live - Amazon Prime Purchases; Implications of an iOS PC Emulator
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25
After Amazon Prime Day, Chuck Joiner, Brian Flanigan-Arthurs, David Ginsburg, Mike Potter, Marty Jencius, Jim Rea, Web Bixby share some of the items that tempted them, and those they purchased. A PC emulator for iOS has been approved on the App Store, and the panel debates its significance for running old software and vintage games on iOS devices. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 171 - FBI's Phone Open Sesame Update, iPhones Immune to FBI, Crowd Strike-Out
49:38
49:38
Play later
Play later
Lists
Like
Liked
49:38
Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast FBI worked with Cellebrite to get into Trump shooter's phone https://9to5mac.com/2024/07/18/trump-shooter-androi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24197: Biden Steps Down On X, Current iOS Still Beats Cellabrite
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26
President Biden's withdrawal from the presidential race sparked discussions on the state of social media, particularly X (formerly Twitter). The panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Eric Bolden, and Jim Rea look at use of social media to deliver messages directly, bypassing traditional media filters. The con…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can the latest wave of AI innovation deliver for security operations teams? - ESW #369
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch, Edward Wu - ESW #369
1:58:49
1:58:49
Play later
Play later
Lists
Like
Liked
1:58:49
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch - ESW #369
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crowdstrike: The Aftermath - PSW #836
1:59:49
1:59:49
Play later
Play later
Lists
Like
Liked
1:59:49
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
…
continue reading