show episodes
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
This podcast is for all the moms and dads out there who struggle with life’s topics as they are related to family and finances. Our hope is we can provide our thoughts, successes and mistakes and share them with all of you. Please check us out at: financialdads.com
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Loading …
show series
 
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
LIBRARIES. My special guest on this episode is Sonnet Ireland the current head librarian of Washington Parish in Louisiana and the former head of the Louisiana Library Association. We chat about Book Bans, current climate win the Louisiana libraries and fake news and inaccuracies. Library are for everyone, but groups of hatemongers hope to stifle f…
  continue reading
 
Rachel Koller Croft is the author of Stone Cold Fox and We Love the Nightlife. She’s also a WGA award–nominated screenwriter. Rachel lives in Los Angeles with her husband, Charles, and their rescue pit bull, Juniper. Killer Women is copyrighted by Authors on the Air Global Radio Network#podcast #author #interview #authors #KillerWomen #KillerWomenP…
  continue reading
 
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Meryl chats with Gila Green about her new novel, With A Good Eye. The book tells the story of 19-year-old Luna Levi and her struggles with her dysfunctional family, including a father who has PTSD from Israeli military service and a mother who suffers from narcissistic personality disorder. They also discuss the writing process, the importance of l…
  continue reading
 
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
  continue reading
 
Elizabeth of East Hampton is a fresh and whip-smart modern retelling of Jane Austen’s classic Pride and Prejudice. Written by Audrey Bellezza and Emily Harding, this novel transports readers to the summer in the Hamptons, where classes clash, rumors run wild, and love has a frustrating habit of popping up where you least expect it.Audrey Bellezza a…
  continue reading
 
On the latest episode of Now, Appalachia, Eliot interviews author Heather Day Gilbert about her new psychological mystery QUEEN OF HEARTS. Heather Day Gilbert, an RWA Daphne du Maurier Award winner and 2-time ECPA Christy Award finalist, enjoys writing contemporary mysteries with unpredictable twists, much like the Agatha Christie books she read gr…
  continue reading
 
In this episode we interview John Richardson about his experience in hospitality and the iconic Baltimore restaurant The Corner Pantry. He talks about perfecting your craft while working and networking. In addition to working at The Corner Pantry, John is building a new art collective studio in Hampden, Hall Gallery. He is also expanding and growin…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week on Crime Wave: Stella Sands is not your typical debut mystery author. She’s written six best-selling true crime books and was for many years the editor of the educational magazine, Kids Discover. But now Stella has turned her hand to adult fiction—and has produced a smashing debut WORDHUNTER.Maggie Moore is tattooed, pierced, self-destruc…
  continue reading
 
While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level. The Accelerator found that 73% of CISOs expressed concern over cybersecurity becoming unwieldy, requiring risk-laden tradeoffs, compared to only 58% of both CIOs and CTOs. Understanding the C-suite’s business priorities …
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Reed Farrel Coleman is a New York Times bestselling author whose works have won Macavity, Barry, Anthony, and Shamus awards.Spies, Lies and Private Eyes is copyrighted by Authors on the Air Global Radio Network#podcast #author #interview #authors #SpiesLiesandPrivateEyesPodcast #authorsontheair #podcast #podcaster #authors #authorsofig #authorsofin…
  continue reading
 
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
  continue reading
 
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
  continue reading
 
Loading …

Quick Reference Guide