Liz Theresa helps you launch and build online businesses they love! This weekly podcast helps entrepreneurs overcome the mental, financial, and emotional hurdles of starting or scaling a business by sharing personal stories and valuable pieces of advice from guest experts. Liz on Biz™ covers topics including but not limited to life, lifestyle, the choices you make, finding your purpose, personal brand advice, copy, writing professionally, copywriting, blogs, blogging, branding, going viral, ...
…
continue reading
Long-time editors Liz Beaulieu and Theresa Flaherty discuss the HME industry’s top news, and call on experts to provide context and add color to the stories they’re writing for HME News. It’s everything you’ve come to expect from HME News, just in podcast form, in about 10 minutes or less. HME News, www.hmenews.com, is the leading source of news for the home medical equipment industry.
…
continue reading
Top advisers to our significant political leaders analyse the successes and failures of today's politics, sharing their experiences of working in Whitehall. Kirsty Buchanan worked with Theresa May as PM, and Liz Truss when she was Secretary of State. Frankie Leach advised Jeremy Corbyn when he was Labour Leader. Journalist and broadcaster Calum Macdonald manages their in-tray of talking points, U-turns and crises. From parties in Westminster to the tactics of SpAds, this is your exclusive in ...
…
continue reading
Hosted by Dr. Theresa Ashby, this show is for people who are influencing the way we do business through Heart, Hustle and Humor.
…
continue reading
Each week on The Capitol Connection, you can keep yourself abreast of political developments and gain a little insight into how New York State's politicians think when you listen in as political scientist Dr. Alan Chartock holds conversations with members from the Assembly and Senate, and other political movers and shakers.
…
continue reading
The Boston Knotlight is a monthly podcast featured MA-based women entrepreneurs on their journey to success, plus expert tips on Marketing, PR and Sales for growth. The podcast is produced by MAG PR, a Boston-based boutique agency dedicated to helping emerging brands + influencers define their authentic value, gain exposure, build community, and achieve growth via innovative Public Relations programs.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
I am the founder of the Healing From Emotional Abuse Philosophy, that is based on 11+ years of research and real life experience, having gone through it myself, which makes me different from everyone else. I have developed a three key process, that can take anybody who has been through any kind of emotional abuse, and pull them out of that. It’s based on 3 steps, what I call the 3 R’s.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - Chris Wolski - SWN #395
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
2:16:26
2:16:26
Play later
Play later
Lists
Like
Liked
2:16:26
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
2:51:52
2:51:52
Play later
Play later
Lists
Like
Liked
2:51:52
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Capitol Connection – New York State Comptroller Tom DiNapoli
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31
By WAMC
…
continue reading
Welcome to a special episode of HME News in 10 sponsored and developed by ACU-Serve. Today’s guest is Kyle Neese, recently named senior account executive at ACU-Serve. He joins HME News in 10 to talk about his resupply journey - from AllCall Connect, which was bought by Brightree, to React Health and now to ACU-Serve - and the importance of finding…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Polling, Kids' Takes and Energy... with Adam Bell
48:55
48:55
Play later
Play later
Lists
Like
Liked
48:55
Calum Macdonald and Kirsty Buchanan discuss various topics related to the upcoming election. They talk about the length of the campaign, the impact of polling, and the challenges faced by the Conservative Party. Kirsty also shares her experience at her son's school and discusses the views of children on politics. Adam Bell, former Energy SpAd and n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Dave Aitel - PSW Vault
1:29:24
1:29:24
Play later
Play later
Lists
Like
Liked
1:29:24
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Capitol Connection – State Senator Liz Krueger
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31
By WAMC
…
continue reading
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Back To School: Networking 101 - SWN Vault
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
The conversation discusses the recent TV moment where Beth Rigby questioned Keir Starmer and Rishi Sunak individually. It explores the lack of inspiration and vision from both leaders and the sense of distrust and cynicism among the public. The conversation also touches on the manifestos of the Labour and Conservative parties, highlighting the Cons…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365
2:41:25
2:41:25
Play later
Play later
Lists
Like
Liked
2:41:25
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-393
…
continue reading
![Artwork](/static/images/128pixel.png)
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
2:54:18
2:54:18
Play later
Play later
Lists
Like
Liked
2:54:18
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Josh Marpet... - SWN #392
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-392
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft Recall's Security & Privacy, Hacking Web APIs, Secure Design Pledge - ASW #288
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The State of the Cybersecurity Market, At Least According to Gartner - Vivek Ramachandran, Carl Froggett, Padraic O'Reilly - BSW #353
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Capitol Connection – Yancey Roy, Albany Bureau Chief for Newsday
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31
By WAMC
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland... - SWN #391
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26
Burning AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-391
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364
2:31:08
2:31:08
Play later
Play later
Lists
Like
Liked
2:31:08
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
2:43:47
2:43:47
Play later
Play later
Lists
Like
Liked
2:43:47
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Capitol Connection – Theresa Roth, Executive Director of the New York State Children’s Alliance (NYSCA)
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31
By WAMC
…
continue reading
The first TV debate between Keir Starmer and Rishi Sunak is in the books, but what did we learn? Nigel Farage is firmly back in the UK political fray: what does this mean for the Conservatives? And former MP and housing minister Sir Brandon Lewis CBE joins to discuss how to fix the country's housebuilding problem, and why Labour might have taken a …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-389
…
continue reading
![Artwork](/static/images/128pixel.png)
1
BCNF, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet... - SWN #390
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55
Boyce Codd Normal Form, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-390
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287
1:12:08
1:12:08
Play later
Play later
Lists
Like
Liked
1:12:08
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Emotional Intelligence for Cyber Leaders - James Doggett, Jessica Hoffman, Sivan Tehila - BSW #352
1:00:56
1:00:56
Play later
Play later
Lists
Like
Liked
1:00:56
Since the 1995 publication of Daniel Goleman’s international bestseller Emotional Intelligence, Why It Can Matter More Than IQ, a global movement has developed to bring “EQ” into practice in businesses, schools, and communities around the globe. But what is its impact on Cybersecurity? In this interview, we welcome Jessica Hoffman, Deputy CISO for …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs. This segment is sponsored by Swimlane. Visit https:/…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 14, 2017. Doug and Russ talk about different types of backups, how they work and out-of-band strategies. Show Notes: https://securityweekly.com/vault-swn-14
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Ming Vase Strategy and lack of policy
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
The conversation covers various aspects of the ongoing election campaign, including the performance of the Conservative and Labour parties, the impact of policy announcements, the handling of key issues such as Brexit and the economy, and the upcoming manifesto launches and leadership debates. The discussion also delves into the strategies and chal…
…
continue reading
Welcome to a special episode of HME News in 10 sponsored and developed by Advanced Diabetes Supply. Today’s guest is Bill Mixon, CEO of Advanced Diabetes Supply. He joins HME News in 10 to talk about how ADS helps both health care providers and patients navigate the complex insurance landscape of diabetes technology and how the company empowers pat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Capitol Connection – Karen DeWitt, Capital Correspondent for The New York Public News Network
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30
By WAMC
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Josh Corman - PSW Vault
1:10:35
1:10:35
Play later
Play later
Lists
Like
Liked
1:10:35
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing Shadow Apps & Protecting Data - Guy Guzner, Pranava Adduri - ASW Vault
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Collecting Bounties and Building Communities - Ben Sadeghipour - ASW Vault
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9…
…
continue reading
Check out this episode from the Secure Digital Life Vault, hand picked by main host Doug White! This segment was originally published on June 8, 2017. Doug and Russ swim the warm waters of academia, college degrees, types of degrees, and whether or not you need one. Show Notes: https://securityweekly.com/vault-swn-13…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shifting Third Party Risk & What You Need to Know About PCI DSS 4.0 - Lynn Marks, Paul Valente - BSW Vault
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26
Explore how to transform your third party risk program from a business bottleneck to a business driver. Discover how evidence-based security documentation and AI can streamline risk assessments, completing them in days not months. This data-driven approach will reduce TPRM backlog and allow your security team to move faster, identify risk proactive…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The VC Perspective: Embracing Uncertainty & Staying the Course - Alberto Yépez - BSW Vault
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on June 27, 2022. Forgepoint Capital’s Co-Founder and Managing Director, Alberto Yépez, explains what the current economic challenges mean for innovation and the future of the cybersecurity market. Hear his perspective on what …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363
2:39:17
2:39:17
Play later
Play later
Lists
Like
Liked
2:39:17
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pen Testing As A Service - Seemant Sehgal - PSW #830
2:52:21
2:52:21
Play later
Play later
Lists
Like
Liked
2:52:21
The Security Weekly crew and special guest Seemant Sehgal explore what PTaaS involves, how it differs from traditional penetration testing, and why it's becoming a crucial service for companies of all sizes to protect their digital assets. We'll discuss the how PTaaS is using the latest technologies (e.g machine learning), the benefits of having a …
…
continue reading