A podcast about security for developers, covering tools and best practices.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
…
continue reading
AppSec Builders features practical and actionable conversations with application security experts and practitioners. Topics range from understanding and solving classes of vulnerability, building protections to efficiently scale with your business, and core best practices to strengthen your security posture. AppSec Builders is hosted by Jb Aviat, AppSec staff engineer at Datadog, former CTO and co-founder at Sqreen and Apple Red Team member. Contact us at appsecbuilders@datadoghq.com
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
D
DevSec For Scale from Akeyless


51
DevSec For Scale from Akeyless
Akeyless - The Secrets Management Company
Cybersecurity. InfoSec. DevSecOps. AppSec. Should companies be talking about these subjects only when they become too large? NO! Should cybersecurity be a priority for every company, no matter the size? YES! According to a study by BullGuard study in 2020, 43% of SMB owners have no cybersecurity defense plan in place at all – leaving their most sensitive financial, customer and business data, and ultimately their companies, at significant risk. Many startup and SMB companies will admit that ...
…
continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
continue reading
O
Open Web Application Security Project (OWASP) - Portland, Oregon Chapter


The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Behind the scenes with top go-to-market practitioners from the B2B tech industry to understand their mindset and tactics: how they define go-to-market, their journey to the top role, team size, top of mind challenges and goals. Learn how product, sales, marketing and customer success leaders create internal alignment, achieve desired outcomes and help their teams perceive their customer in a human way. Hosted by Vijay Damojipurapu. Presented by Stratyve
…
continue reading
A podcast covering socio-technical themes, concepts, and technologies that matter to the modern enterprise
…
continue reading
T
The Application Security Podcast


51
The Application Security Podcast
Chris Romeo and Robert Hurlbut
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Kerr Ventures, and Robert Hurlbut is a Principal Application Security Archi ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
A technology focused podcast - Talks about the business, people, technology, products, culture of silicon valley - with a security twist.
…
continue reading
Agile DevOps, Cloud Deployment, Microservices, and Open Source have all dramatically accelerated application delivery and complexity. Today’s AppSec teams, outnumbered by as much as 100:1 by developers, depend on a collection of point security products and siloed manual processes. This leaves them struggling to gain the visibility, insight, and process scale they need to identify and protect the always changing and growing application risk surface. This resulting AppSec Chaos means applicati ...
…
continue reading
Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives ...
…
continue reading
T
The AppSec Insiders


1
Exploring the Challenges of Testing Against the ASVS Standard - Part 3
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53
In this episode, we explore the challenges of testing against the ASVS standard - Part 3By Farshad Abasi
…
continue reading
On this episode of Security Noise, Geoff and Skyler speak with members of the TrustedSec Software Security team to discuss the past, present, and future of AppSec. Security Consultants Joe Sullivan and Philip DuBois and Director of Software Security Scott White weigh in on the evolution of security tools, how engagements have changed, and where App…
…
continue reading
Chris Romeo, Matt Coles, and Izar Tarandach attempt to demystify the concepts of Application Security (AppSec) and Product Security (ProdSec). They find that even defining and differentiating both concepts is challenging. Various articles exist about AppSec and ProdSec, but the industry is generally confused about these terms. Discussing the role o…
…
continue reading
A
Application Security Weekly (Audio)


1
Broadening What We Call AppSec - Christien Rioux - ASW Vault
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on January 10, 2022. There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web…
…
continue reading
Ken and Seth are back with another episode where they try _not_ to cover more on LLMs and AI. Specifically, talk about the basics of implementing security into an SDLC. A long conversation and personal experience from both Ken and Seth on time management and how to get into a flow when working on technical problems. Finally, some answers to questio…
…
continue reading
S
Secured by Galah Cyber


1
Whisky to Firewalls: Jason Murrell's Unconventional Path to Cybersecurity
51:56
51:56
Play later
Play later
Lists
Like
Liked
51:56
Jason Murrell is a cybersecurity advocate and consultant with more than two decades of experience in business and entrepreneurship. In this episode Jason chats with host Cole Cornford about both the successes and setbacks he’s experienced in the startup world, including as a founding shareholder in Starward Whisky and co-founder of Altius Mining. I…
…
continue reading
T
The Stack Overflow Podcast


1
Being creative with math: The immersive artist who traded a sketchpad for a keyboard
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48
Check out Luyang’s work at his website or in this Youtube playlist. To make these animations, Luyang uses Processing, a 20-year-old language that started out as a visual way to teach programming but evolved into a professional development tool. Logitech selected Luyang as one of the ambassadors to show off what you can do with their MX Keys S Combo…
…
continue reading
A
Application Security Weekly (Audio)


1
Supply Chain Security Security with Containers and CI/CD Systems - Kirsten Newcomer - #ASW 256
1:27:11
1:27:11
Play later
Play later
Lists
Like
Liked
1:27:11
Supply chain has been a hot topic for a few years now, but so many things we need to do for a secure supply chain aren't new at all. We'll cover SBOMs, vuln management, and putting together a secure pipeline. Segment resources: https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/2111swiwhitepaper_nextgenbuild.pdf https://next.redhat…
…
continue reading
A
Application Security Weekly (Video)


1
Equifax's Breach, CISA's 1,000 Vulns, Rust's TLS Library, Complexity vs. Design - ASW #256
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23
A stroll back through the Apache Struts breach of Equifax, CISA's list of Known Exploited Vulnerabilities, Rust's replacement for OpenSSL, Go no longer throws programmers for a loop, complexity vs. design (that leads to better security). Show Notes: https://securityweekly.com/asw-256
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Supply Chain Security Security with Containers and CI/CD Systems - Kirsten Newcomer - #ASW 256
1:27:11
1:27:11
Play later
Play later
Lists
Like
Liked
1:27:11
Supply chain has been a hot topic for a few years now, but so many things we need to do for a secure supply chain aren't new at all. We'll cover SBOMs, vuln management, and putting together a secure pipeline. Segment resources: https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/2111swiwhitepaper_nextgenbuild.pdf https://next.redhat…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Y3000, Sandman, ShadowSyndicate, MoveIt, Apple, Predator, More News, and Jason Wood - SWN #328
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
This week Dr. Doug talks: The Year 3000, Sandman, ShadowSyndicate, National Student Clearing House, Apple, Predator, Xenomorph, Mixin, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://…
…
continue reading
A
Application Security Weekly (Video)


1
Supply Chain Security Security with Containers and CI/CD Systems - Kirsten Newcomer - ASW #256
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55
Supply chain has been a hot topic for a few years now, but so many things we need to do for a secure supply chain aren't new at all. We'll cover SBOMs, vuln management, and putting together a secure pipeline. Segment resources: https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/2111swiwhitepaper_nextgenbuild.pdf https://next.redhat…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Human Risk Management at Western Governors University - Jake Wilson - BSW #321
1:09:37
1:09:37
Play later
Play later
Lists
Like
Liked
1:09:37
In this episode, we interview Jake Wilson, Western Governor University's Security Awareness Evangelist. We'll learn about how he built up and matured WGU's security awareness program, eliminating blind spots, and improving efficacy through data analysis and better reporting. This segment is sponsored by Living Security. Visit https://securityweekly…
…
continue reading
T
The Application Security Podcast


1
Itzik Alvas -- Secrets Security and Management
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05
Itzik Alvas, Co-founder and CEO of Entro, is an expert on secrets security. Itzik joins Chris and Robert to discuss the significance of understanding and managing secrets, emphasizing the importance of knowing how many secrets an organization has, where they are located, and their potential impact. He elaborates on the three pillars of secrets mana…
…
continue reading
Matt and Izar join in a debate with Chris Romeo as he challenges the paradigm of "scan and fix" in application security. Chris references a LinkedIn post he made, which sparked significant reactions, emphasizing the repetitive nature of the scan and fix process. His post critiqued the tools used in this process, noting that they often produce exten…
…
continue reading
If you missed the first part of our conversation with Chris, listen to it here. Modular’s new programming language, Mojo, is built for AI developers. Check out their docs or find them on GitHub. Connect with Chris on LinkedIn. Shoutout to user DanielGibbs, who earned a Lifeboat badge by answering what is the difference between getType() and getClas…
…
continue reading
e
eXecutive Security


1
Building a Career in Cybersecurity With Yuri Diogenes of Microsoft
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
The author of "Building a Career in Cybersecurity," Yuri Diogenes offers a wealth of knowledge, advice, and tips on entering this field in this episode. He and Gene discuss: Yuri's career journey His take on cybersecurity certifications Why building a lab is important for those looking for entry-level roles How to be intentional in your attendance …
…
continue reading
e
eXploring cybersecurity


1
eXp 5 - Dissecting Ransomware Attacks: Casinos, Best Practices and More!
36:05
36:05
Play later
Play later
Lists
Like
Liked
36:05
In this episode we are joined by Chris Denbigh-White, CSO from NextDLP as we chat about recent cybersecurity events at casinos in Las Vegas.By Jeremy Ventura
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
2024 Security Planning, Better Tabletop Exercises - Merritt Maxim, Ryan Fried - ESW #332
2:18:49
2:18:49
Play later
Play later
Lists
Like
Liked
2:18:49
Forrester Research releases a few annual reoccurring cybersecurity reports, but one of the biggest that covers the most ground is the Security Risk Planning Guide, which was recently released for 2024. One of the report's 17 authors, and research director, Merritt Maxim, will walk us through the report's most interesting insights and highlights. Th…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Passkeys, bots, hotels, conning the con, TrendMicro, Pizza & Aaran Leyland - SWN #327
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38
This week on the Security Weekly News: Passkeys, bots, hotels, conning the con, TrendMicro, Pizza, Aaran Leyland, & more! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn …
…
continue reading
T
The Stack Overflow Podcast


1
Mojo: The usability of Python with the performance of C
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37
Modular built a new programming language, Mojo, for AI developers. Explore their docs or find them on GitHub. Chris is on LinkedIn. Congratulations to user Shengyuan Lu, whose answer to Priority queue ordering of elements merited a Lifeboat badge.By Ryan Donovan, Ben Popper, Chris Lattner
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
AI Attacks and LLM Security Matters - Nathan Hamiel - PSW #799
3:15:41
3:15:41
Play later
Play later
Lists
Like
Liked
3:15:41
Nathan comes on the show to discuss LLMs, such as ChatGPT, the issues we face today and in the future. Learn about prompt injection attacks, jailbreaking, LLMs for threat actors, and more! In the Security News: LVFS is not a backdoor, attackers are in physical proximity, when you need to re-cast risk, oh Fortinet, pre-installed backdoors again, dee…
…
continue reading
T
The Security Champions Podcast


1
Tanya Janca - A Recipe for Security Champions
1:12:48
1:12:48
Play later
Play later
Lists
Like
Liked
1:12:48
Tanya Janca, also known as SheHacksPurple, is the best-selling author of 'Alice and Bob Learn Application Security' and founder of We Hack Purple. Tanya has been coding and working in IT for over 25 years, has won countless awards, and has been everywhere, from public service to tech giants, writing software, leading communities, founding companies…
…
continue reading
F
Future of Application Security


1
EP 46 — TuSimple’s Madjid Nakhjiri on the Evolving Need for Automotive Cybersecurity
24:03
24:03
Play later
Play later
Lists
Like
Liked
24:03
In this episode of the Future of Application Security, Harshil speaks with Madjid Nakhjiri, Head of Product Security and Lead Security Architect at TuSimple, a global autonomous driving technology company. They discuss the current landscape of automotive security today, why the industry is expanding its safety initiatives to cyber security initiati…
…
continue reading
B
B2B Go-To-Market Leaders


1
Proof Analytics: The GPS For Data-Driven Go-To-Market Excellence With Mark Stouse
39:57
39:57
Play later
Play later
Lists
Like
Liked
39:57
Proof isn't just about data – it's about unlocking the potential within every decision. Harness the power of data-driven navigation and make your go-to-market journey a triumph of strategy and success. In this illuminating discussion, we sit down with Mark Stouse, the visionary founder of Proof Analytics, a groundbreaking analytics solution that's …
…
continue reading
A
Application Security Weekly (Video)


1
Azure's Eight XSS Vulns, CNCF's Two Security Audits, CISA's OSS Roadmap, Repojacking - ASW #255
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40
A slew of XSS in Azure's HDInsights, CNCF releases fuzzing and security audits on Kyverno and Dragonfly2, CISA shares a roadmap for security open source software, race conditions and repojacking in GitHub, and more! Show Notes: https://securityweekly.com/asw-255
…
continue reading
A
Application Security Weekly (Audio)


1
Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255
1:15:53
1:15:53
Play later
Play later
Lists
Like
Liked
1:15:53
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can …
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255
1:15:53
1:15:53
Play later
Play later
Lists
Like
Liked
1:15:53
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can …
…
continue reading
A
Application Security Weekly (Video)


1
Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can …
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
SprySocks, Lazarus, Fortinet, Juniper, CISA, AI Art, More News, & Jason Wood - SWN #326
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11
This week Dr. Doug talks: SprySocks, Lazarus, Fortinet, Juniper, CISA, Transparent Tribe, AI Art, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Cyberdog, Pegasus, Webex, Peach Sandstorm, SAP, Caesar, Penn, Aaran Leyland, and More - SWN #325
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47
This week Dr. Doug talks: Cyberdog, Pegasus, Webex, Peach Sandstorm, SAP, Caesar, Penn State, Aaran Leyland, and More News on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwe…
…
continue reading
T
The Secure Developer


1
Ep. 137 AI Safety, Security, and Play with David Haber
52:12
52:12
Play later
Play later
Lists
Like
Liked
52:12
Security is changing quickly in the fast-paced world of AI. During this episode, we explore AI safety and security with the help of David Haber, who co-founded Lakera.ai. David is also the creator of Gandalf, an AI tool that makes Large Language Models (LLMs) accessible to everyone. Join us as we dive into the world of prompt injections, AI behavio…
…
continue reading
T
The Application Security Podcast


1
Harshil Parikh -- Deep Environmental and Organizational Context in Application Security
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07
Harshil Parikh is a seasoned security leader with experience building security and compliance functions from the ground up. He notably built the security and compliance team at Medallia from scratch and led it through several transitions. He is also a conference speaker, and, most recently, he co-founded Tromzo. Harshil shares insights about AppSec…
…
continue reading
The Security Table gathers to discuss the upcoming ThreatModCon 2023 (https://www.threatmodelingconnect.com), the inaugural and only conference dedicated entirely to threat modeling. ThreatModCon 2023 Sunday, October 29, 2023 Marriott Marquis Washington, DC The Threat Modeling Conference will cover various aspects of threat modeling, from AI integr…
…
continue reading
T
The Stack Overflow Podcast


1
Forget AGI. Let’s built ADI: Augmented Developer Intelligence
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19
If you missed the first part of this conversation, listen to it here. Replit is a browser-based IDE (integrated development environment). Check out their blog or start coding. ICYMI: Stack Overflow recently implemented semantic search, allowing users to search using natural language. Explore Stack Overflow Labs to learn more about OverflowAI and ot…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
2023 AT&T Cybersecurity Insights Report: Edge Ecosystem - Theresa Lanowitz, Steve Winterfeld - BSW #320
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55
Organizations still struggle with DDoS, ransomware, and personal information exfiltration. In order the prevent these attacks, we first need to understand the ‘types’ of DDoS and emerging threat techniques used by the adversary. In this interview, we explore these attacks in the context of edge computing. As edge computing use cases evolve, organiz…
…
continue reading
C
Cyber Security & Cloud Podcast


1
CSCP S4EP01 - Travis McPeak - Paved Road from Netflix to modern startups
0:38
0:38
Play later
Play later
Lists
Like
Liked
0:38
Travis McPeak is a security generalist with over a decade of experience working at several companies including Databricks, Netflix, IBM, HP, and Symantec. He’s the Co-Founder and CEO of Resourcely, whose goal is to create a paved road to secure, efficient, and easy to manage cloud infrastructure. In this conversation, Travis shares his biggest take…
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
MDR & Self Sabotage, Detection Difficulty - Jason Lassourreille, Chris Sanders - ESW #331
2:34:09
2:34:09
Play later
Play later
Lists
Like
Liked
2:34:09
Discussing ways to ensure client success with MDR and discuss the ways organizations hurt MDR efficacy with overly broad global exclusions, poor deployment practices, and poor policy hygiene. This segment is sponsored by Sophos. Visit https://securityweekly.com/sophos to learn more about them! We talk to Chris Sanders today, who has been steeped in…
…
continue reading
T
The Stack Overflow Podcast


1
Multiplayer programming on mobile: a chat with Replit CEO Amjad Masad
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54
Replit is a browser-based IDE (integrated development environment). See what they’re up to on their blog or just start coding. RIP Google Wave, one of the greats. Find Amjad on LinkedIn, Twitter, GitHub, or via his website.By Ben Popper, Ryan Donovan, Eira May, Amjad Masad
…
continue reading
S
Security Weekly Podcast Network (Audio)


1
Ransomware Infection Vectors - Ryan Chapman - PSW #798
3:06:04
3:06:04
Play later
Play later
Lists
Like
Liked
3:06:04
Ryan has his finger on the pulse of ransomware and response. We discuss how the initial infections are occurring, how they've changed over time, and where they are going in the future! Segment Resources: For folks to see my recent presentations: for528.com/playlist For folks to see the recordings of our recent Ransomware Summit: https://for528.com/…
…
continue reading