Remembering childhood (aka nostalgia): Join best friends Chris Cox and Daniel Matthews as they reminisce about the cultural and personal figures, songs, movies, games, movements, etc...that shaped their upbringing. If you sometimes miss the 2000s then this podcast is for you... Combined Birthday Parties is part of The Donut which is a podcast collective from Rockwell Productions.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
Scott Robbins and the Traveling Show is a new musical with Book, Music, Lyrics by Tyler Tafolla. With additional Music and Lyrics by McKale Bingham and Jack DePuy. "On the Great Plains of America in the year 1935, a young con man named Scott Robbins passes himself off as a world famous magician to join a traveling circus and make a better life for himself. He will try not to get caught while finding love, family and something greater in himself."The show originated at AMDA College Conservato ...
…
continue reading
1
A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs. This segment is sponsored by Swimlane. Visit https:/…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 14, 2017. Doug and Russ talk about different types of backups, how they work and out-of-band strategies. Show Notes: https://securityweekly.com/vault-swn-14
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 14, 2017. Doug and Russ talk about different types of backups, how they work and out-of-band strategies. Show Notes: https://securityweekly.com/vault-swn-14
…
continue reading
1
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
…
continue reading
1
Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questi…
…
continue reading
Chris has been a video game fanatic since elementary school and now he gets to actually work in the video game industry...how cool! BUT, what exactly does he do and what does he want to do? Combined Birthday Parties is about childhood nostalgia: Join best friends Chris Cox and Daniel Matthews as they reminisce about the cultural and personal "thing…
…
continue reading
1
Hacker Heroes - Josh Corman - PSW Vault
1:10:35
1:10:35
Play later
Play later
Lists
Like
Liked
1:10:35
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the…
…
continue reading
1
Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
…
continue reading
1
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 8, 2017. Doug and Russ swim the warm waters of academia, college degrees, types of degrees, and whether or not you need one. Show Notes: https://securityweekly.com/vault-swn-13…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 8, 2017. Doug and Russ swim the warm waters of academia, college degrees, types of degrees, and whether or not you need one. Show Notes: https://securityweekly.com/vault-swn-13…
…
continue reading
1
Shifting Third Party Risk & What You Need to Know About PCI DSS 4.0 - Lynn Marks, Paul Valente - BSW Vault
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26
Explore how to transform your third party risk program from a business bottleneck to a business driver. Discover how evidence-based security documentation and AI can streamline risk assessments, completing them in days not months. This data-driven approach will reduce TPRM backlog and allow your security team to move faster, identify risk proactive…
…
continue reading
1
The VC Perspective: Embracing Uncertainty & Staying the Course - Alberto Yépez - BSW Vault
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on June 27, 2022. Forgepoint Capital’s Co-Founder and Managing Director, Alberto Yépez, explains what the current economic challenges mean for innovation and the future of the cybersecurity market. Hear his perspective on what …
…
continue reading
1
Secure Code From the Start, Security Validation & Platformization - Maxime Lamothe-Brassard, Volkan Ertürk, Chris Hatter - ESW #363
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26
Qwiet AI provides real time detection of security vulnerabilities in code along with the best AI generated fixes to aid developers in finding and fixing their code with the addition of AI AutoFix. This segment is sponsored by Qwiet AI. Visit https://securityweekly.com/qwietrsac to learn more about them! With scores of security tools implemented, co…
…
continue reading
1
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-389
…
continue reading
1
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-389
…
continue reading
1
Unified Identity Security, Identity is Under Attack & Identity is Security - Andre Durand, David Bradbury, Wendy Wu - ESW #363
47:40
47:40
Play later
Play later
Lists
Like
Liked
47:40
The next generation of identity security is not about the popular idea of convergence, but of unification. A single, AI-driven solution that integrates PAM with identity security and access management is the clear path forward to manage and secure all enterprise data through a unified control point. Segment Resources: • https://www.sailpoint.com/pr…
…
continue reading
1
This Week: short on funding, long on research and analysis - ESW #363
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in…
…
continue reading
1
Exploits Make You More Secure - PSW #830
1:56:13
1:56:13
Play later
Play later
Lists
Like
Liked
1:56:13
An exploit that makes you more secure, pardon the interruption, water heater company in hot water, IoT devices are vulnerable, Squeege and RDP scraping, free laundry for everyone!, Wifi routers and Apple Air tags, North Koreans fill US IT positions, taking out drones, the NVD backlog, IBM is no longer a security company?, and DNSBombs! Show Notes: …
…
continue reading
1
Pen Testing As A Service - Seemant Sehgal - PSW #830
56:16
56:16
Play later
Play later
Lists
Like
Liked
56:16
The Security Weekly crew and special guest Seemant Sehgal explore what PTaaS involves, how it differs from traditional penetration testing, and why it's becoming a crucial service for companies of all sizes to protect their digital assets. We'll discuss the how PTaaS is using the latest technologies (e.g machine learning), the benefits of having a …
…
continue reading
1
Unpacking XDR & Business Applications - Chris Thomas, Oliver Tavakoli - ASW #286
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29
The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker’s sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI imp…
…
continue reading
1
Big Tech, Fighting a Junta, Keylogger in Microsoft, APT Hackers, Free Laundry, Josh - SWN #388
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-388
…
continue reading
1
Big Tech, Fighting a Junta, Keylogger in Microsoft, APT Hackers, Free Laundry, Josh - SWN #388
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-388
…
continue reading
1
Node.js Secure Coding - Liran Tal - ASW #286
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to d…
…
continue reading
1
2024 Cyber Resilience Trends & Leveling the Cybersecurity Playing Field - Theresa Lanowitz, Jim Simpson - BSW #351
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41
In this segment, Theresa will unpack the complexities of cyber resilience, and dive into new research that examines dynamic computing. She’ll discuss how it merges IT and business operations, taps into data-driven decision-making, and redefines computing for the modern era. This segment is sponsored by LevelBlue. Visit https://www.Securityweekly.co…
…
continue reading
1
Security Money: Rubrick Saves The Index As It Continues To Climb - BSW #351
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Rubrick's IPO saves the index, as Cisco finishes the acquisition of Splunk. The index is now made up of the following 25 pure play cybersecurity public com…
…
continue reading