Secrets to Real Estate Investing Podcast with Holly McKhann. Expert Real Estate Investor and House Flip Master.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Mark Ellen and David Hepworth have been talking about and writing about music together and individually for a collective eighty years in magazines like Smash Hits, Mojo and The Word and on radio and TV programmes like "Rock On", "Whistle Test" and VH-1. Over thirteen years ago, when working on the late magazine The Word, they began producing podcasts. Some listeners have been kind enough to say these have been very special to them. When the magazine folded in 2012 they kept the spirit of tho ...
…
continue reading
1
Buddy Holly airlines and the inimitable Bob Dylan
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59
As Mark Ellen goes shrimping at Frinton David Hepworth and Alex Gold links hands across the Atlantic to discuss: ….why a quick turn around Mount Hood in a Cessna should never be confused with pleasure ….why all the highly-rated albums are actually over-rated. ….why Timothee Chalamet has no hope of being able to capture more than one facet of Bob Dy…
…
continue reading
1
More AI funding, Crowdstrike ripples continue, GPT yourself - ESW #371
1:02:40
1:02:40
Play later
Play later
Lists
Like
Liked
1:02:40
, in the enterprise security news, AI is still getting a ton of funding! Netwrix acquires PingCastle Tenable looks for a buyer SentinelOne hires Alex Stamos as their new CISO Crowdstrike doesn’t appreciate satire when it’s at their expense Intel begins one of the biggest layoffs we’ve ever seen in tech Windows Downdate RAG poisoning GPT yourself Th…
…
continue reading
1
Interviewing Black Hat Startup Spotlight Winner, Knostic - Sounil Yu - ESW #371
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
We chat with Sounil Yu, co-founder of LLM access control startup, Knostic. We discuss both the experience of participating in Black Hat's startup competition, and what his company, Knostic, is all about. Knostic was one of four finalists for Black Hat's Startup Spotlight competition and was announced as the winner on August 6th. References DarkRead…
…
continue reading
1
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More... - SWN #405
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-405
…
continue reading
1
AI Red Teaming and AI Safety - Amanda Minnich - ESW #371
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
…
continue reading
1
Things Not to Miss at BH/DC/Bsides - PSW #838
1:03:32
1:03:32
Play later
Play later
Lists
Like
Liked
1:03:32
Learn what is most interesting at hacker summer camp this year! Show Notes: https://securityweekly.com/psw-838
…
continue reading
1
Downgrades and Attacking Security Things - PSW #838
2:04:44
2:04:44
Play later
Play later
Lists
Like
Liked
2:04:44
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Show Notes: https://securityweekly.com/psw-838…
…
continue reading
1
Dead Code, CrowdStrike's Kernel Lessons, VMs & Security Boundaries, SLUBStick Attack - ASW #294
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55
The code curation considerations of removing abandoned protocols in OpenSSL, kernel driver lessons from CrowdStrike's crash, choosing isolation primitives, cross-cache attacks made possible by SLUBStick, and more! Show Notes: https://securityweekly.com/asw-294
…
continue reading
1
Fake IDS, Storm Bamboo, uBlock, Rhysida, Snake, Delta, TikTok, Josh Marpet... - SWN #404
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
Fake IDS, Storm Bamboo, uBlock, Rhysida, Snake, Delta, TikTok, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-404
…
continue reading
1
Building Successful Security Champions Programs - Marisa Fagan - ASW #294
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
…
continue reading
1
Say Easy, Do Hard - Job Search Strategies for CISOs - Part 2 - Merlin Namuth, Brad Rager - BSW #359
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 2, Jason proposes we blow it all up, while Ben recommends a certification board for CISOs. We have no shortage of suggestions for how to fix the CISO hiring problem. Show Notes: https://securityweekly.com/bsw-359…
…
continue reading
1
Say Easy, Do Hard - Job Search Strategies for CISOs - Part 1 - Merlin Namuth, Brad Rager - BSW #359
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Show Notes: https://securityweekly.com/bsw…
…
continue reading
1
“Pop music is 80 per cent about hair”, remaking classic albums and why CDs are so hard to love
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25
A small Pastis, a game of boules and a conversation putting the rock and roll world to rights, which this week includes … … why Debbie Harry and Mick Jagger worked so well on the small screen. … Elvin Pelvin on the Bilko Show and how Elvis was modelled on Tony Curtis. … An American Werewolf In London, The Birds, Invasion of the Bodysnatchers, Don’t…
…
continue reading
1
Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denia…
…
continue reading
1
10 Security Researcher Qualities Marketers Should Adopt - Dani Woolf - ESW #370
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01
There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and …
…
continue reading
1
Queen, Bowie and other residents of Rockfield Studios remembered by the cook’s daughter
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59
Rockfield is a converted farmhouse in the Welsh countryside where, for over 50 years, bands have lived while recording. In the ‘70s Tiffany Murray’s mum was the in-house cook, filling Motorhead to the brim with boeuf bourguignon and Black Sabbath with salmon en croute. Her touching memoir My Family And Other Rock Stars – hailed as “a rock and roll …
…
continue reading
1
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, I try to be more succinct, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-403
…
continue reading
1
Cybersecurity's Love Affair with Distractions - Fred Wilmot - ESW #370
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
…
continue reading
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
…
continue reading
1
PK Fail - John Loucaides - PSW #837
1:12:22
1:12:22
Play later
Play later
Lists
Like
Liked
1:12:22
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
…
continue reading
1
57 years of Fleetwood Mac: author Mark Blake's fond encounters and fresh revelations
45:56
45:56
Play later
Play later
Lists
Like
Liked
45:56
Mark Blake calls Dreams: the Many Lives of Fleetwood Mac a “mosaic biography”, their almost six-decade saga presented as a series of enthralling short stories with titles like ‘Mick Fleetwood’s Great Epiphany’ and ‘Rumours: A Doomed Romance in Six Acts’. It opens in fact with a “cast of characters”, the 18 one-time members, as if dramatis personae …
…
continue reading
1
Forever mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More... - SWN #402
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
Forever Mouse, RPC, WhatsApp, NIST, PKFail, 0Auth, Josh Marpet, and More, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-402
…
continue reading
1
A CISO's Perspective on AI, Appsec, and Changing Behaviors - Paul Davis - ASW #293
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
…
continue reading
1
Ron Sexsmith doesn’t need a teleprompter. He can do 40 Dylan songs at the drop of a hat
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14
Beloved Canadian singer-songwriter Ron Sexsmith, old pal of the pod, is touring the UK in November, two of the nights at the Palladium, and looks back here at the first shows he saw and played himself. Which delights include … … what you learn playing Canadian bars aged 16. … seeing Elton John in a 75,000-seater stadium when he was 12. … early memo…
…
continue reading
1
The Evolving Role of the CISO - Allan Alford - BSW #358
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
…
continue reading
1
Identity Security Posture Management - Dor Fledel - BSW #358
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
…
continue reading
1
Without John Mayall … no Cream, Fleetwood Mac, Status Quo or Led Zeppelin?
52:36
52:36
Play later
Play later
Lists
Like
Liked
52:36
Passing the baton of discourse on the rock and roll racetrack, our Olympian hosts sprint in the following direction … … watching Toumani Diabaté play in the pitch-black Malian night. … Laurel Canyon, the Brain Damage Club and the great fire of ‘79. … the Kinks in Fortis Green Road, the Beatles in Chiswick House and other alternative London rock lan…
…
continue reading
1
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
…
continue reading