The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
![Artwork](/static/images/128pixel.png)
51
DarkWeb.Today – Hackers and Cyber Security, Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Fox updates on the latest trends, gadgets and news in the world of technology.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, and industry pioneers who share their experiences, insights, and strategies for success. These discussions often cover topics such as: - Cloud computing and AI advancements - M ...
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cryptography, Quantum Computing, and the Future of Security with Dr. Bill Anderson
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40
Without the ability to keep secrets our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the world wide HAM radio operators. I’ve been utilizing cryptography in the development of web applications since my …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 8: Whiskey, Quantum Computing, and Executive Protection
1:21:34
1:21:34
Play later
Play later
Lists
Like
Liked
1:21:34
🎙️ Episode 8 of the Distilled Security Podcast is here! 🔐🥃 🔎 Join us as we explore: The Whiskey Rebellion and Craft Distilling: A dive into the history of the Whiskey Rebellion and what it means for today’s distillers. Learn about Iron City Distilling, creating national brand-quality spirits, and the significance of the Bessemer brand name. Whiskey…
…
continue reading
Der IT-Sicherheitsalptraum-Rückblick: Manchmal belustigend, zuweilen beunruhigend, aber mit Ausblick.Es ist wieder ein Jahr vergangen und niemand ist von einem Smartmeter erwürgt worden: Ist überhaupt etwas Berichtenswertes passiert? Und wenn nein, wird es denn nächstes Jahr wenigstens schlimmer?Wir betrachten das vergangene Jahr, versuchen Muster…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FOX On Games: Nintendo Switch 2 Unveiled- Features, Mysteries, and What to Expect
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17
Dive into the details of the newly announced Nintendo Switch 2, exploring its features, backward compatibility, and the mysteries that remain. FOX's Eammonn Dignam details in this "FOX On Games." Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A cute cover for a dangerous vulnerability. [Research Saturday]
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44
Nati Tal, Head of Guardio Labs, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting chang…
…
continue reading
Billionaire Mark Cuban says he wants to create a TikTok alternative using the Bluesky framework. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AIs in Love, UEFI, Fortinet, Godaddy, Juggalos, Aaran Leyland, and More. - SWN #443
39:25
39:25
Play later
Play later
Lists
Like
Liked
39:25
AIs in Love, UEFI, Fortinet, Godaddy, Juggalos, Aaran Leyland, and More. In this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-443
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#70 - How to Save Money by Talking to Your Tech Team
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
You know time and money can be wasted on any project if you don't know what to ask your team during the process. Tech Teams are no exception. With technology expert and author Douglas Squirrel.By Extra Something Media
…
continue reading
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulnerability in its Pluggable Authentication Module)software. Google relea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to Prepare Your Business for the End of Windows 10
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Establishing a New Standard for Cybersecurity Professionals Worldwide: Addressing Trust, Standards, and Risk for the CISO Role | CISO Circuit Series with Heather Hinton | Michael Piacente and Sean Martin ...
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44
About the CISO Circuit Series Sean Martin and Michael Piacente join forces roughly once per month (or so, depending on schedules) to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relev…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
HN764: Should You Pursue a Technical Leadership Role?
1:04:59
1:04:59
Play later
Play later
Lists
Like
Liked
1:04:59
Do you think you have what it takes to be a manager? Should you go for it? Laura Santamaria, host of the Technically Leadership podcast, joins Ethan Banks to discuss those questions. They talk about the motivations for moving into a management role, the challenges of managing people, and the need to understand the business... Read more »…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlock the Power of Open Source BI Software for Small Businesses in 2025
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51
Discover why Open Source BI Software is the key to small business success in 2025. Harness the data-driven insights you need to thrive and stay ahead of the competition today!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SE Radio 651: Paul Frazee on Bluesky and the AT Protocol
1:08:24
1:08:24
Play later
Play later
Lists
Like
Liked
1:08:24
Paul Frazee, CTO of Bluesky, speaks with SE Radio's Jeremy Jung about the Authenticated Transfer Protocol (ATProto) used by the Bluesky decentralized social network. They discuss why ATProto was created, as well as how it differs from the ActivityPub open standard, the scaling limitations of peer-to-peer solutions, cryptographic decentralized ident…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SE Radio 650: Robert Seacord on What's New in the C Programming Language
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02
Robert Seacord, the Standardization Lead at Woven by Toyota, the convenor of the C standards committee, and author of The CERT® C Coding Standard, Effective C, and Secure Coding in C and C++, speaks with SE Radio host Gavin Henry about What's New in the C Programming Language. They start with a review of the history of C and why it has a standard, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SANS ISC Stormcast, Jan 17, 2025: Analyzing Complex Datasets, Citrix Update Issues, Ivanti's Security Advisory, and the Future of Passkeys (@sans_edu) (#)
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50
SANS ISC Stormcast, Jan 17, 2025: Analyzing Complex Datasets, Citrix Update Issues, Ivanti's Security Advisory, and the Future of Passkeys (@sans_edu) In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event a…
…
continue reading
The social networking app Bluesky is getting its own photo-sharing alternative to Instagram called Flashes. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Stopping The Bad Things - Rob Allen - PSW #857
2:33:47
2:33:47
Play later
Play later
Lists
Like
Liked
2:33:47
Rob from ThreatLocker comes on the show to talk about how we can disrupt attacker techniques, including Zero Trust, privilege escalation, LOLbins, and evil virtualization. In the news we talk about security appliances and vulnerabilities, rsync vulnerabilities, Shmoocon, hacking devices, and more! This segment is sponsored by ThreatLocker. Visit ht…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Stopping The Bad Things - Rob Allen - PSW #857
2:33:47
2:33:47
Play later
Play later
Lists
Like
Liked
2:33:47
Rob from ThreatLocker comes on the show to talk about how we can disrupt attacker techniques, including Zero Trust, privilege escalation, LOLbins, and evil virtualization. In the news we talk about security appliances and vulnerabilities, rsync vulnerabilities, Shmoocon, hacking devices, and more! This segment is sponsored by ThreatLocker. Visit ht…
…
continue reading
President Biden issues a comprehensive cybersecurity executive order. Updates on Silk Typhoon’s US Treasury breach. A Chinese telecom hardware firm is under FBI investigation. A critical vulnerability has been found in the UEFI Secure Boot mechanism. California-based cannabis brand Stiiizy suffers a data breach. North Korea’s Lazarus Group lures fr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Behind the Scenes of Election Security: CISO of AZ Sec of State
1:04:08
1:04:08
Play later
Play later
Lists
Like
Liked
1:04:08
Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
2025: Automotive Tech Predictions, CES Highlights, and Programming for High-Integrity Systems
45:45
45:45
Play later
Play later
Lists
Like
Liked
45:45
Send us a text In this episode of Embedded Insiders, Bruce Franklin, Senior Director of Automotive at Micron, joins us to share his 2025 predictions for the automotive industry. He dives into the role of embedded memory and storage in robotaxis, key considerations for manufacturers, and how these advancements will shape the future of self-driving c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
N4N009: High-Speed Ethernet Lanes Explained
37:30
37:30
Play later
Play later
Lists
Like
Liked
37:30
On today’s episode, we’re explaining high-speed Ethernet lanes at the request of listener Matthew. We cover lanes, channels, and their physical representation in networking – think actual cables. We explain both 40Gb and 100Gb technologies and compare them to Link Aggregation Control Protocol (LACP). We also have a discussion on standards and pract…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
758 Liongard's Roar: Michelle Accardi and Brook Lee
53:45
53:45
Play later
Play later
Lists
Like
Liked
53:45
In this episode, Uncle Marv welcomes Michelle Accardi, CEO of Liongard, and Brooke Lee, the new VP of Community and Channel, to discuss Liongard's recent successes and future plans. The conversation kicks off with Michelle explaining Liongard's rapid growth, including new integrations and high-profile hires like David Powell as CRO. Brooke shares h…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SANS ISC Stormcast, Jan 16, 2025: Critical Vulnerabilities and Cybersecurity Updates You Need to Know (#)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02
SANS ISC Stormcast, Jan 16, 2025: Critical Vulnerabilities and Cybersecurity Updates You Need to Know Today's episode covers an odd 12 year old Netgear vulnerability that only received a proper CVE number last year. Learn about how to properly identify OpenID connect users and avoid domain name resue. Good old rsync turns out to be in need of patch…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker games, AI travel surveillance, and 25 years of IoT
49:15
49:15
Play later
Play later
Lists
Like
Liked
49:15
The video game Path of Exile 2 suffers a security breach, we explore the issues of using predictive algorithms in travel surveillance systems, and the very worst IoT devices are put on show in Las Vegas. Oh, and has Elon Musk accidentally revealed he cheats at video games? All this and much much more is discussed in the latest edition of the "Smash…
…
continue reading
Private AI companies could soon become neighbors with government offices. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Are Wormholes Possible? | Stories From Space Podcast With Matthew S Williams
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes Wormholes, port…
…
continue reading
The FBI deletes PlugX malware from thousands of U.S. computers. Researchers uncover vulnerabilities in Windows 11 allowing attackers to bypass protections and execute code at the kernel level. A look at (a busy) Patch Tuesday. Researchers uncovered six critical vulnerabilities in a popular Linux file transfer tool. Texas sues Allstate for allegedly…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
NAN082: Mastering Python One Bite at a Time
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18
How do you master Python? One bite at a time. On today’s show we talk with Bob Belderbos, co-founder of PyBites, a community and learning platform for Python. Bob shares his philosophy for learning Python in small bites with practical exercises, hands-on learning, and daily coding for improvement. We discuss the importance of small wins,... Read mo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Validation: A Deep Dive with Cymulate’s David Kellerman
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
In this Spotlight episode, host Paul Roberts speaks with David Kellerman, the Field CTO at Cymulate, about the growing demand for security validation technology, like Cymulate's, as organizations struggle to assess the utility and effectiveness of their security investments. The post Security Validation: A Deep Dive with Cymulate’s David Kellerman …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Boards Stepping Up, as CISOs Build Stronger Bonds with Legal and Safeguard Leadership - BSW #378
36:18
36:18
Play later
Play later
Lists
Like
Liked
36:18
In the leadership and communications segment, New Year, New Cyber Threats: How Boards Are Stepping Up (or Not), Why CISOs should build stronger bonds with the legal function in 2025, New Managers: You Don’t Need to Know It All, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches (#)
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49
SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches Today, Microsoft Patch Tuesday headlines our news with Microsoft patching 209 vulnerabilities, some of which have already been exploited. Fortinet suspects a so far unpatched Node.js authentication bypass to be behind some recent exploits…
…
continue reading
Are your docs part of your DevOps cycle? Richard chats with Mattias Karlsson about automating documentation for APIs, cloud resources, and more! Mattias talks about using tools to build text files that contain every Azure resource being utilized, hopefully per application, along with API info, NuGet packages, and more. He also digs into the differe…
…
continue reading