Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
A interview series where information security marketing executives share their stories, insights, best practices. For more information, check out: https://cybersecuritysalesinsider.substack.com and https://aphinia.com/
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Video on Spotify and YouTube; audio on all other podcasting platforms. Reach us at feedback@securitycocktailhour.com or @SecCockt ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
Redefining Society Podcast | Musing On Society & Technology | Hosted by Marco Ciappelli Let's face it: the future is now. We live in a Hybrid Analog Digital Society, and we must stop ignoring it or pretending that technology is not affecting us. The line between the physical and virtual worlds has become a figment of our imagination. On it, we are continually performing a dangerous balancing act juggling convenience, privacy, freedom, security, technology, society, culture, and even the futu ...
…
continue reading
1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
1
Ep. 36: InfoSec Job Market: Living in the Chaotic Age
59:57
59:57
Play later
Play later
Lists
Like
Liked
59:57
The information security job market sure ain't what it used to be. Recruiter Alexandra Nickoli shares her advice for landing a job in today's competitive landscape. She also gives us her insights on how today compares to the dark days of 2009, when she thinks we'll pull out of this tailspin and whether AI will prove a benefit or a challenge for job…
…
continue reading
1
Navigating the Path to Maturity & AI is helping combat cyber threats - Shimon Modi, Boaz Barzel - ASW #296
39:21
39:21
Play later
Play later
Lists
Like
Liked
39:21
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
…
continue reading
1
Dangerous books, Microsoft plus, NPD, Solar Winds, Jenkins, and more... - SWN #408
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57
Dangerous books, Microsoft Plus, NPD, Solar Winds, Jenkins, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-408
…
continue reading
1
The Fallout and Lessons Learned from the CrowdStrike Fiasco - Allie Mellen, Jeff Pollard - ASW #296
42:38
42:38
Play later
Play later
Lists
Like
Liked
42:38
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
…
continue reading
1
Recapping Black Hat 2024 and What’s Next | On Location Coverage with Sean Martin and Marco Ciappelli
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podca…
…
continue reading
1
I Said I Was Technically a CISO, Not a Technical CISO
42:14
42:14
Play later
Play later
Lists
Like
Liked
42:14
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is Fredrick Lee (Flee), CISO, Reddit. In this episode: The case for the technical CISO Making Recall safe for business The aches …
…
continue reading
1
Navigating Innovation and Risk & Any Browser Can Be A Secure Enterprise Browser - Theresa Lanowitz, Andrew Harding - BSW #361
33:23
33:23
Play later
Play later
Lists
Like
Liked
33:23
While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level. The Accelerator found that 73% of CISOs expressed concern over cybersecurity becoming unwieldy, requiring risk-laden tradeoffs, compared to only 58% of both CIOs and CTOs. Understanding the C-suite’s business priorities …
…
continue reading
1
Why Cyber Resilience Matters - Theresa Lanowitz - BSW #361
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
…
continue reading
1
Operational Resilience in Healthcare & Zscaler Uncovers Record-Breaking Ransom - Marty Momdjian, Brett Stone-Gross - ESW #372
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
…
continue reading
1
Devo Launches New Capabilities & Revolutionizing Cyber Resilience - Rakesh Nair, Rekha Shenoy - ESW #372
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
…
continue reading
1
Quantum AI Drones, Ransomhub, Pixel, Mad Liberator, the return of Russ Beauchemin... - SWN #407
40:01
40:01
Play later
Play later
Lists
Like
Liked
40:01
Quantum AI Drones, Ransomhub, Pixel, Mad Liberator, the return of Russ Beauchemin, and More on the Security Weekly News Show Notes: https://securityweekly.com/swn-407
…
continue reading
1
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - ESW #372
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
…
continue reading
This week: Option ROMS are a novel way to compromise a system at the lowest level, Sinkclose opens AMD processors up to attacks, at home in your firmware exploiting SMM complete with examples, Sonos speakers get hacked and enable attackers to listen in on your conversations, DEF CON badges use new chips and are not without controversy, lasers that …
…
continue reading
1
Cybersecurity Myths - Eugene Spafford - PSW #839
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
…
continue reading
1
My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:
The State of Cybersecurity and Its Societal Impact | A Musing On Society & Technology with Marco Ciappelli and TAPE3 | Read by TAPE3
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41
My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage: The State of Cybersecurity and Its Societal Impact Prologue Each year, Black Hat serves as a critical touchpoint for the cybersecurity industry—a gathering that offers unparalleled insights into the latest threats, technologies, and strategies that define our collective defense efforts…
…
continue reading
1
Reducing Supply Chain Risk & What’s lurking in your phone? - Danny Jenkins, Nikos Kiourtis - ASW #295
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30
In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment…
…
continue reading
1
DEFCON Hijinx, AMD, Ukraine, FreeBSD, OpenVPN, the Pwnie Awards, Josh Marpet... - SWN #406
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13
DEFCON Hijinx, AMD, Ukraine, FreeBSD, OpenVPN, the Pwnie Awards, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-406
…
continue reading
1
When Appsec Needs to Start Small - Kalyani Pawar - ASW #295
34:22
34:22
Play later
Play later
Lists
Like
Liked
34:22
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. Show Notes: https://securityweekly.com/asw-295…
…
continue reading
1
Why Are Fortune 500 Companies Swiping Right on 3-Person Startups?
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is Justin Somaini, partner, YL Ventures. In this episode: The startup balancing act Giving back is its own reward When to pen tes…
…
continue reading
1
Cybersecurity Leadership Crisis, Is It Time to Pivot Your Strategy? - BSW #360
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34
In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America’s Companies, Judge Rejects SEC’s Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360
…
continue reading
1
Security Money: Crowdstrike Crashes the Index - BSW #360
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Crowdstrike crashes the index, as Thoma Bravo acquires another index company. The index is currently made up of the following 25 pure play cybersecurity pu…
…
continue reading
1
More AI funding, Crowdstrike ripples continue, GPT yourself - ESW #371
1:02:40
1:02:40
Play later
Play later
Lists
Like
Liked
1:02:40
, in the enterprise security news, AI is still getting a ton of funding! Netwrix acquires PingCastle Tenable looks for a buyer SentinelOne hires Alex Stamos as their new CISO Crowdstrike doesn’t appreciate satire when it’s at their expense Intel begins one of the biggest layoffs we’ve ever seen in tech Windows Downdate RAG poisoning GPT yourself Th…
…
continue reading
1
Interviewing Black Hat Startup Spotlight Winner, Knostic - Sounil Yu - ESW #371
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
We chat with Sounil Yu, co-founder of LLM access control startup, Knostic. We discuss both the experience of participating in Black Hat's startup competition, and what his company, Knostic, is all about. Knostic was one of four finalists for Black Hat's Startup Spotlight competition and was announced as the winner on August 6th. References DarkRead…
…
continue reading
1
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More... - SWN #405
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-405
…
continue reading
1
AI Red Teaming and AI Safety - Amanda Minnich - ESW #371
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
…
continue reading
1
Introducing Substrate—An Open-source Framework for Human Understanding, Meaning, and Progress
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37
This video introduces Substrate—An Open-source Framework for Human Understanding, Meaning, and Progress. Substrate is a crowdsourced project designed to enhance understanding, communication, and action in order to move humanity forward. Read the Article: 📃 https://danielmiessler.com/p/introducing-substrate TOPICS: Introduction to Substrate (00:00:0…
…
continue reading
1
UL NO. 444: Pizza Meter Intelligence, China Bypasses Bans, Securing AWS Secrets…
24:47
24:47
Play later
Play later
Lists
Like
Liked
24:47
What to expect at Blackhat/DEFCON, Identifying Explosives, OpenAI's new models, Llama 4 Timeline, and more… ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Foll…
…
continue reading
1
Things Not to Miss at BH/DC/Bsides - PSW #838
1:03:32
1:03:32
Play later
Play later
Lists
Like
Liked
1:03:32
Learn what is most interesting at hacker summer camp this year! Show Notes: https://securityweekly.com/psw-838
…
continue reading