The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Smart Firefighting Podcast covers real-world deployments of smart technologies through conversations with technologists, innovators, companies, and forward-thinking public safety and government agencies. Learn from interviews with leaders as they share their insights and offer their expertise every week! Host Kevin Sofen is a co-founding member of the Smart First Responder Community who loves to explore change management and technology in public safety.
…
continue reading
Prepareing Orginizations for Managing Crisis
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Interviews, stories and lessons learned from experienced crisis leaders. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of crisis management. Your host, Tom Mueller, is ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Natural Resources Wales' podcast focusing on the Welsh environment, giving you a behind the scenes look at our work.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Page It to the Limit is a podcast that focuses on what it means to operate software in production. Hosted by the PagerDuty Community Team, we cover the leading practices used in the software industry to improve both system reliability and the lives of the people responsible for supporting it.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Leading Las Vegas is a podcast produced by the Emergency and Crisis Management Program at the University of Nevada, Las Vegas. Each season, students in a Leadership, Innovation and Adaptability class interview prominent leaders, who discuss their leadership approaches, and how they prepare for, respond to, and recover from shocks and stresses faced by the community. Las Vegas is known for being the entertainment capital of the world. However, it is also a complex environment, with a highly d ...
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can the latest wave of AI innovation deliver for security operations teams? - ESW #369
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 233: Supporting Firefighter Wellness: The Power of FirstNet by AT&T with Ryan Fields-Spack
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42
How does FirstNet support firefighter wellness? Hello Smart Firefighting Community! Welcome to another episode of covering real world innovations via interviews with fire service and technology industry experts that empower YOU to develop your very own Smart Firefighting strategy! In this episode: How is AT&T revolutionizing public safety communica…
…
continue reading
What is a zero-day vulnerability and what can organizations do about them? These two questions kick off an engaging discussion on this type of threat with Accenture Security colleagues Shawn Duffy, Global Lead for Threat Exposure Management, and David Williams, Global Lead of Advanced Threat Services. Discover what they have to say and learn more a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Twitter, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland... - SWN #401
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56
Twitter Opt-In, the DOJ, DarkSeoul, Fake Employees, PlugX, Stargazer Ghost, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-401
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch - ESW #369
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crowdstrike: The Aftermath - PSW #836
1:59:49
1:59:49
Play later
Play later
Lists
Like
Liked
1:59:49
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing - Douglas McKee - PSW #836
1:05:12
1:05:12
Play later
Play later
Lists
Like
Liked
1:05:12
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05
How can we effectively use large language models (LLMs) for cybersecurity tasks? In this Carnegie Mellon University Software Engineering Institute podcast, Jeff Gennari and Sam Perl discuss applications for LLMs in cybersecurity, potential challenges, and recommendations for evaluating LLMs.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SAPwned, Squarespace Domain Hijacks, AIs Fixing Code, Infosec Investments - ASW #292
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
SAPwned demonstrates tenets of tenant isolation, a weak login flow puts Squarespace domains at risk, how AIs might (or might not) be useful for fixing code, getting buy-in for infosec investments, and more! Show Notes: https://securityweekly.com/asw-292
…
continue reading
Send us a Text Message. Thank you for joining us on the CyberDap podcast, where we delve deep into the crucial world of cybersecurity and arm your business with the knowledge to protect itself. We hope today's episode has shed light on the importance of proactive cybersecurity measures and provided you with actionable insights. Cybersecurity is not…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Allie Mellen, Farshad Abasi - ASW #292
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Staying True to Your Values | A Conversation with Lisa Plaggemier | The Soulful CXO Podcast with Dr. Rebecca Wynn
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29
Guest: Lisa Plaggemier, Executive Director, National Cybersecurity Alliance Website: https://staysafeonline.org LinkedIn: https://www.linkedin.com/in/lisaplaggemier Facebook: https://www.facebook.com/staysafeonline/ Instagram: https://www.instagram.com/nationalcybersecurity/ Twitter/X: https://twitter.com/lisaplaggemier Host: Dr. Rebecca Wynn On IT…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar - BSW #357
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
…
continue reading
Episode 2: Ceredigion Environment Team and Bathing Waters In this episode of Cyfoeth, Llion talks with Ffion Quan, an Environment Officer at Natural Resources Wales (NRW), about her role and the critical work being done to monitor and maintain bathing water quality along the Ceredigion coastline. Ffion shares her journey from a geography enthusiast…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Combating The Rise Of AI-Generated Child Exploitation Material With Heather Barnhart
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41
Heather Barnhart from Cellebrite joins the Forensic Focus Podcast to discuss combating the rise of AI-generated child exploitation material. Heather shares her extensive experience and insights on the impact of AI and deepfakes on investigations, the challenges faced by law enforcement worldwide, and the importance of education in combating digital…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Analyzing the CrowdStrike Incident and Its Ripple Effects - SWN #399
42:23
42:23
Play later
Play later
Lists
Like
Liked
42:23
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 232: Innovating Wildfire Solutions: The American Family Insurance & XPRIZE Partnership with Stephanie Mueller
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24
How can we decrease the frequency and severity of wildfires? Hello Smart Firefighting Community! Welcome to another episode of covering real world innovations via interviews with fire service and technology industry experts that empower YOU to develop your very own Smart Firefighting strategy! In this episode: How American Family Insurance & XPRIZE…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rumored Wiz Deal Would be HISTORIC (if it happens), redefining shared responsibility - ESW #368
54:43
54:43
Play later
Play later
Lists
Like
Liked
54:43
In this week's enterprise security news, Google is rumored to be considering acquiring Wiz for $23 BILLION ThreatConnect acquires Polarity XBOW and Sola Security are interesting new companies we’ll discuss What does “shared responsibility” actually mean? Palo Alto probably isn’t going to buy your startup Snowflake-related breaches continue getting …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What's wrong with the cybersecurity industry and what we can do about it - Richard Hollis - ESW #368
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47
On this segment, we're going to zoom all the way out to discuss one of my favorite topics: what's fundamentally wrong with this industry? I believe we're at an inflection point: security teams have budget, staff, and more sway at the board level than ever. The cybersecurity market is doing great - growing at an astonishing rate with cyber startups …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Book Discussion: Jump-start Your SOC Analyst Career - Jarrett Rodrick, Tyler Wall - ESW #368
34:39
34:39
Play later
Play later
Lists
Like
Liked
34:39
Three years after we last discussed this book on episode #221, Jarrett Rodrick returns, joined by co-author Tyler Wall to discuss an update of the book. We talk opportunities and layoffs. Career paths and experience. Degrees, certifications, and home labs. We talk about who cybersecurity is the right field for, and the pros and cons of the industry…
…
continue reading
Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we'd all be in screwed, Exim has not been replaced by something better and its vulnerable, CISA's red team reports, and attackers use d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
3D Printing For Hackers - David Johnson - PSW #835
1:03:50
1:03:50
Play later
Play later
Lists
Like
Liked
1:03:50
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Capability-based Planning for Early-Stage Software Development
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55
Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategically deciding what is needed and how to effectively achieve it. Both business and government acquisition domains use CBP for financial success or to design a well-balanced defense system. The definitions understa…
…
continue reading
Send us a Text Message. A modern world is where data is like water and the internet is the ocean for anything possible under the sun. Data is the cornerstone of our lives. With our dependence on data for everything, businesses have had to adapt and restructure to ensure they bring in customers and scale up. Restructuring or automating aspects of ru…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A 2024 Appsec Report, Preparing for the AIxCC, Secure Design and Post-Quantum Crypto - ASW #291
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
Cloudflare's 2024 appsec report, reasoning about the Cyber Reasoning Systems for the upcoming AIxCC semifinals at DEF CON, lessons in secure design from post-quantum cryptography, and more! Show Notes: https://securityweekly.com/asw-291
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Defense Frontline: Crafting the Ultimate Incident Response Tabletop Exercises
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29
Join host Rob Burton in the 139th episode of Cyber Defense Frontline as we delve into the critical world of incident response tabletop exercises. This episode is a must-listen for anyone looking to bolster their organization’s cyber defense capabilities. We’ll walk you through the meticulous process of designing and executing effective tabletop exe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet and more... - SWN #398
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet, and more are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-398
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Producing Secure Code by Leveraging AI - Stuart McClure - ASW #291
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
…
continue reading