show episodes
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
The events of the last year have propelled Security into the Fast Lane. Our lives transitioned, practically overnight, to a digital world and entire workforces were suddenly remote. All of this put security under the microscope, and we have been forced to ask ourselves, “Are we doing enough to secure our businesses? Can my security stack withstand an attack? Is our sensitive data protected and safe?” Join us each month as we chat with a prominent industry guest on the hot security topics tha ...
 
Chris and Robert deconstruct world-class Application Security experts, digging deep to find the tools, tactics, projects, and tricks that make them successful. Each episode begins with the guest's security origin story or how they got started in Application Security. Topics range from DevOps+security, secure coding, OWASP, threat modeling, security culture, and anything else they can think of regarding application security. Chris Romeo (@edgeroute) is the CEO of Security Journey, and Robert ...
 
Contrast Security provides the industry’s only DevOps-Native AppSec Platform using instrumentation to continuously analyze and protect software from within the application. This enables businesses to see more of the risks in their software and less development delays and AppSec complexity. The Contrast platform integrates seamlessly into development pipelines, enabling easier security bug and vulnerability fixes that significantly speed release cycles. The Contrast Inside AppSec Podcast feat ...
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
A
Application Security Weekly (Audio)

1
Application Security Weekly (Audio)

Mike Shema, John Kinsella, Matt Alderman - Security Weekly

Unsubscribe
Unsubscribe
Monthly+
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
A
AWS Podcast

1
AWS Podcast

Amazon Web Services

Unsubscribe
Unsubscribe
Weekly+
 
The AWS Podcast is the definitive cloud platform podcast for developers, dev ops, and cloud professionals seeking the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Jeff Barr for regular updates, deep dives and interviews. Whether you’re building machine learning and AI models, open source projects, or hybrid cloud solutions, the AWS Podcast has something for you.
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
 
The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape. Every month, join Setu Kulkarni, VP of Corporate Strategy and Business Development, alongside Zach Jones, Sr. Director Security Research, and other industry guests as they analyze key data points and trends, provide topical insights, and discuss what can be done to improve upon the current state of application security.
 
The podcast for SaaS CEOs who want to create a mobile app version of their service. You'll learn about everything it takes to make a successful mobile app. You hear experts in fields like security, UX design, recruitment, product design, and more to help you move forward in your mobile app project.
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
teaching the church that only through Jesus can our hearts truly say "let it be so" everyday of our lives. listen for simple, straight-to-the-point bible teaching with cultural and life application. hosted by alex and lokelani wilson. support this podcast: www.amenchurch.live
 
The Exascale Computing Project (ECP) is accelerating delivery of a capable exascale computing ecosystem to provide breakthrough solutions that will address America's most critical challenges in scientific discovery, energy assurance, economic competitiveness, and national security. Let’s Talk Exascale explores Application Development, Software Technology, and Hardware and Integration—focus areas of the ECP.
 
The SDxCentral 2-Minute Weekly Wrap podcast provides you with a way to easily and quickly catch-up on the top next-generation IT infrastructure developments from the week. In this two-minute podcast, we cover the week's major news stories around topics such as SD-WAN, 5G, the IoT, AI, network security, containers, SDN, NFV, data centers, storage, and network and application performance management. Subscribe today to never miss an episode and visit an episode's webpage for more details on the ...
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
 
Hosted by Anexinet Sr. Mobile Strategists Steven Brykman and Glenn Gruber, this podcast covers all aspects of Digital Transformation, including strategy, mobility, security, development, design, testing and more. Anexinet is a leading technology consultancy and reseller, focused on technology-enabled business transformation strategies and solutions. Anexinet (www.anexinet.com) customers benefit from our holistic approach—from engaging front-end interactions to dependable back-end solutions, ...
 
Loading …
show series
 
This Week in the AppSec News: View source good / vuln bad, IoT bad / rick-roll good, analyzing the iOS 15.0.2 patch to develop an exploit, bypassing reviews with GitHub Actions, & more NIST DevSecOps guidance! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw170…
 
This week, we welcome Nuno Loureiro, CEO at Probely, and Tiago Mendo, CTO at Probely, to talk about Dev(Sec)Ops Scanning Challenges & Tips! There's a plenitude of ways to do Dev(Sec)Ops, and each organization or even each team uses a different approach. Questions such as how many environments you have and the frequency of deployment of those enviro…
 
Forrester predicts that 25% of developers will be using serverless technologies by the end of next year. There are a lot of benefits from serverless applications: faster release cycles, lower infrastructure costs, and improved efficiencies. Yet, at the same time, organizations are running into application security roadblocks. Legacy application sec…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Om Moolchandani (@omaitrika) is a CISO and CTO at Accurics (@AccuricsSec).. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: Om Moolchandani (@omaitrika) Podcast Twitter - C…
 
There are two sides to any story - and it is no different here for Healthcare. While the applications in this sector are vulnerable, they still aren't as vulnerable as Retail applications. At the same time, consumers have personal responsibilities while using web and mobile applications in order to prevent data theft. Additional Links: WhiteHat Sec…
 
Seeking to capitalize on the full potential of digital transformation, organizations are turning to serverless applications to accelerate development cycles, reduce operational complexities, and improve efficiencies. But as organizations embrace serverless applications, a majority are encountering security roadblocks that impede release cycles and/…
 
Our special guest today is Michael Allen Lake who is a digital transformation consultant focused on innovation and change adoption within the Federal government. He has worked on projects at nine different Federal agencies. His experience ranges from helping organizations leverage data as a strategic asset to the adoption and promotion of enterpris…
 
Colin Bell, Rob Cuddy and Kris Duer from HCL Software bring you another application security interview special. In this Episode the team talk to Dr. Michael Owens who is the BISO at Equifax. Michael is an innovative, collaborative, and distinguished leader with over 25 years of experience in startup, corporate, government, and military organization…
 
Mazin Ahmed is a security engineer that specializes in AppSec and offensive security. He is passionate about information security and has previously found vulnerabilities in Facebook, Twitter, Linkedin, and Oracle, to name a few. Mazin is the developer of several popular open-source security tools that have been integrated into security testing fra…
 
Guest: Matt Svensson, Senior Security Engineer @ BetterCloud Topics: What are the approaches for monitoring serverless and other modern application architectures? What are the challenges with these new environments? What approaches don’t work? What can go wrong with modern stack security monitoring? What should we watch for in a modern application …
 
Harvard CS and English minor Catherine Yeo talks about her journey founding an AI ethics organization with tens of thousands of article views and discovering her interests through her love of writing. Besides founding her organization Fair Bytes, Catherine is also lead venture partner at Contrary Capital and has previously worked at Disney’s Studio…
 
Rana discovered application security as a software developer which inspired her interest in web app pentesting. During her studies and journey to prepare for the OSCP certification, Rana started sharing what she learned in blogs and went on to create video learning content for aspiring pentesters and security professionals. _______________________ …
 
This is one of those origin stories that we love to share on ITSPmagazine. While each company's story is unique, inspiring, and beautiful in its own way, this one is told by the four friends that happen to be those that had a dream and turned it into reality. It is an extraordinary moment for the four of the co-founders to tell us how Blue Lava cam…
 
According to our guest, Len Noe, “biohackers exist and walk among us.” We have no reason to doubt him. His latest talk called “BioHackers, Augmented Human Attack Vectors” explains the details — but that’s only one side of our conversation: the meaning of transhumanism and the relationship between being human and technology. We all enjoyed this conv…
 
Cloud Security News this week 22 October 2021 Hope you have been enjoying your Cloud Security News this week and in our special third instalment for this week we bring you our best bits from Hashiconf Global 2021, conference held by Hashicorp. Hashicorp is a software company who provide open source tools and products - some of their popular product…
 
Imagine a world where you own some sort of building whether that’s a grocery store, a restaurant, a factory… and you want to know how many people reside in each section of the store, or maybe how long did the average person wait to be seated or how long did it take the average factory worker to complete their assembly task. Currently today these sy…
 
Andrew "AJ" Jarrett is Applied Cybersecurity Program Manager at the Cyber Readiness Center (CRC) and Texas A&M Engineering Extension Service (TEEX). He's been a wildland firefighter for more than a decade and believes Emergency Response frameworks that save lives can apply to cyber incident response and IT security to help protect organizations. He…
 
Over the last year, The Record has published several interviews between security analysts and cybercriminals. This includes representatives from REvil, BlackMatter, and Marketo. The interviews have uncovered the gangs' motivations, targets, and tactics, and have been cited by officials including White House Deputy National Security Advisor Anne Neu…
 
How Yahoo Built a Culture of Cybersecurity- https://hbr.org/2021/09/how-yahoo-built-a-culture-of-cybersecurity Commentary: Security culture continues to grow as a non-negotiable piece of a security strategy. ​ minimaxir/big-list-of-naughty-strings​ – https://github.com/minimaxir/big-list-of-naughty-strings Commentary: Safe list input validation is …
 
Cloud Security News this week 21 October 2021 It's a month full of conferences and as promised we are back with our 2nd episode this week to bring you the cloud security highlights from KubeCon. In this episode we will share some of our team’s favourite from Kubecon 2021 North America If you aren't quite familiar with the wonderful world of Kuberne…
 
The gig economy involves independent contractors engaging in flexible jobs. Today gig workers often get work from centralized platforms that facilitate the process of connecting workers with employers in exchange for a fee. Some workers find the relationship between worker and platform to be adversarial in nature since the platform can establish an…
 
This Week in the Enterprise Security News: HelpSystems Acquires PhishLabs, Elastic and Optimyze, The Leading Indicators of a Great Info/Cybersecurity Program, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw247
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Lynn Dohm (Executive Director At WiCyS) as a guest on the show — together they talk about: WiCyS | Vladimir The Cat | Lynn’s Scary Mummy | Plants And Solar Panels | A DNA Test That Tells You What To Eat | An Electric Cure to Depression | Happy Bday Pac…
 
Casey Driscoll is a rockstar in the learning and development space. Join Erika, Jax and Casey for an engaging conversation on the importance of soft skills in the workforce. Casey breaks down invaluable soft skills that are relevant for any industry. Starting with how you present yourself, your communication skills and relationship building. Casey …
 
There are tons of cybersecurity job openings for folks with 3-5 years of experience, but where are the junior roles? How are people getting their initial 3-5 years in? Josh and the ESW hosts discuss the finer points and challenges of breaking into InfoSec via the analyst path. - As mentors: where do we struggle with our mentees? - There are a milli…
 
Cloud Security News this week 20 October 2021 Google Cloud is adding new features to their zero trust access solution, BeyondCorp Enterprise which will enable identity and context-aware access to non-web applications running in Google Cloud and non-Google Cloud environments. They also claim to be making it easier for admins to diagnose access failu…
 
Venture capital investment has continued to flow into technology startups. No one builds technology from scratch. There are cloud services, software libraries, 3rd party services, and software platforms that modern entrepreneurs must adopt to build their products efficiently and quickly. These layers of infrastructure are a key area for many invest…
 
I have two thoughts that I’d like to share and have a discussion on. The first is that Developmental Teams are really powerful and important for not only influencing the professional development of individual officers, but shaping the entire career field. I don’t know that I fully grasped that until now. Yes, I’ve known about how they vector office…
 
What would you do differently if you knew then what you know now? Good question, but not practical, because that is obviously not going to happen. Still, some people have “been there” before you, and even if they cannot guide you step by step — they can lay out some master plans and give you some tips on how to advance your cybersecurity career. Th…
 
What does nutrition, rest, and movement have to do with peak performance in your career? Surgeon Dr. Glen Robison, MD joins Tech Done Different to help explain. You'll learn: why people will do anything to escape pain, and when you're in pain, cognition diminishes why to eat organic, and avoid the toxins & chemicals omnipresent in food, which lower…
 
Whether you love them or hate them, share them or ignore them, you encounter memes all over the internet. Those that are popular can often take off and spawn a long history of remixes, variants, derivatives, and inspired works. In this episode, we interview Johan Unger, the founder of meme.com. They’re creating a platform for Meme Explorers to trac…
 
Software development is a core component of digital transformation, and the use of serverless technologies is helping to accelerate release cycles to new heights. A panel of serverless application security experts discuss key findings and insights from a new survey report on serverless application security in this Inside AppSec Podcast. The moderat…
 
There's a plenitude of ways to do Dev(Sec)Ops, and each organization or even each team uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important to understand how to integrate a security scanner in your DevSecOps processes. It all comes down to speed, how fast can…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login