What happens when hosts from Detroit, Chicago, Philly in Atlanta come together. Dope hosts: Veronica Harrell, K. Press, Big Mike, Stephanie Dawn, and celebrity guests. We talk about entertainment, social issues, and introduce new artists. It's therapeutic for your mentality. Ready to book an appointment?
…
continue reading
Join host Chris Rose as he looks back at every episode of the classic police drama, New York Undercover. From the brotherhood between the detectives to the gripping storylines and, of course, the music, the show lives on to this day. NEW YORK UNDERCOVER REWIND will feature fun recaps, trivia and maybe even a few guests. Make sure you subscribe to NEW YORK UNDERCOVER REWIND...wherever you listen.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
We’ve waited nearly 70 years for football to return to Erskine, now we finally have a team. On the Flying Fleet Gridiron Revival, we’ll prepare for the return of the team with in-depth and fascinating conversations, getting to know the people who are helping bring football back.
…
continue reading
Now more than ever independent artists thirst for an opportunity to be heard. Indie Review Radio is the catalyst to do just that. Each week the show will feature the best and greatest in the world of independent musicians artists and seasoned industry professionals. The show will include new music by indies, the latest in industry trends by seasoned industry professionals and a wealth of information for independent artists that are looking for what's next in their careers.
…
continue reading
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
1
Unlocking Business Value, Beyond Outages, & Combat Account and Platform Fraud - Ajay Gupta, Gerry Gebel, Mark Batchelor - ESW #365
46:14
46:14
Play later
Play later
Lists
Like
Liked
46:14
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
…
continue reading
1
Increasing KYB Coverage, Is your SSO on point, & The Future of Identity Management - Vibhuti Sinha, Tarvinder Sembhi, Chris Simmons - ESW #365
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
…
continue reading
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-393
…
continue reading
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - ESW #365
1:11:23
1:11:23
Play later
Play later
Lists
Like
Liked
1:11:23
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
1
Bricking PCs and IoT Hacking - PSW #832
1:48:43
1:48:43
Play later
Play later
Lists
Like
Liked
1:48:43
Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headphones, decrypting firmware, and VPNs are still being hacked! Show Notes: https://securityweekly.com/psw-832…
…
continue reading
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
1:03:50
1:03:50
Play later
Play later
Lists
Like
Liked
1:03:50
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Show Notes: https://securityweekly.com/psw-832
…
continue reading
1
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Josh Marpet... - SWN #392
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24
Buzz Aldrin punches me in the face, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-392
…
continue reading
1
Microsoft Recall's Security & Privacy, Hacking Web APIs, Secure Design Pledge - ASW #288
38:37
38:37
Play later
Play later
Lists
Like
Liked
38:37
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Show Notes: https://securityweekly.com/asw-288
…
continue reading
1
Deep Learning to Combat AI Threats & Disrupting the Browser Security Market - Carl Froggett, Vivek Ramachandran - BSW #353
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15
The recent rise in adversarial AI has made it clear: organizations must fight AI with better AI. Gone are the days of relying on legacy, antiquated endpoint detection and response offerings, or cybersecurity tools that are based on ineffective machine learning models. In this interview, Deep Instinct CIO Carl Froggett will explain why Deep Learning…
…
continue reading
1
The State of the Cybersecurity Market, At Least According to Gartner - Padraic O'Reilly - BSW #353
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
…
continue reading
1
Securing Health, Creating Phishing-Resistant Users & Rising Ransomware Stakes - Jim Broome, John Shier, Christopher Harrell - ESW #364
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00
The interview will delve into the healthcare industry's tumultuous year in 2023, marked by 124 million breached health records across 725 hacking incidents (according to The HIPAA Journal). This interview will explore the critical role that MSSPs play in safeguarding health data and systems against potential security incidents, such as ransomware a…
…
continue reading
1
AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland... - SWN #391
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30
Burning AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-391
…
continue reading
1
The Cybersecurity Market Gets Some New Quirks and Features - ESW #364
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15
We start off discussing the latest round of fundings, centered largely around data security and securing LLM use. This dovetails into a discussion about marketing language and how difficult it can be for buyers to work out what the latest round of early stage startups are doing. Next, we discuss Cloudflare and Bugcrowd's acquisitions, as well as Sy…
…
continue reading
1
Routers, Breaches, and Vulnerabilities - PSW #831
1:36:11
1:36:11
Play later
Play later
Lists
Like
Liked
1:36:11
This week: Take on the upstream, how hard is it to patch end-of-life software, hack millions of routers, take over millions of routers, 0-days, and no responses, hack Taylor Swift wristbands, can you detect that covert channel?, and breach reports from Ticketmaster, Snowflake, Santander, and TikTok, and top it all of with C-level DNS servers droppi…
…
continue reading
1
Interest in Identity Security is Spiking - Will Lin - ESW #364
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
Bots are Taking Over the Internet & Defining ASPM - Idan Plotnik, Erez Hasson - ASW #287
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12
Application security posture management has quickly become a hot commodity in the world of AppSec, but questions remain around what is defined by ASPM. Vendors have cropped up from different corners of the AppSec space to help security teams make their programs more effective, improve their security postures, and connect the dots between developers…
…
continue reading
1
BCNF, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet... - SWN #390
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04
Boyce Codd Normal Form, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet and more, are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-390
…
continue reading
1
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Luis Villa - ASW #287
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
…
continue reading
1
Harnessing the Power of Data and AI & The Evolving Role of the CISO - James Doggett, Sivan Tehila - BSW #352
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38
Semperis CISO Jim Doggett shares insights into the evolving role of the CISO. The daily onslaught of cyberattacks not only increases business risk, but also puts a company’s most important data at risk – data on the company, its employees, customers, and partners. Now, more than ever, the CISO is being asked to understand the business of cyber with…
…
continue reading
1
Emotional Intelligence for Cyber Leaders - Jessica Hoffman - BSW #352
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31
Since the 1995 publication of Daniel Goleman’s international bestseller Emotional Intelligence, Why It Can Matter More Than IQ, a global movement has developed to bring “EQ” into practice in businesses, schools, and communities around the globe. But what is its impact on Cybersecurity? In this interview, we welcome Jessica Hoffman, Deputy CISO for …
…
continue reading
1
A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs. This segment is sponsored by Swimlane. Visit https:/…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 14, 2017. Doug and Russ talk about different types of backups, how they work and out-of-band strategies. Show Notes: https://securityweekly.com/vault-swn-14
…
continue reading
1
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
…
continue reading
1
Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questi…
…
continue reading