show episodes
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Your Best. Financial. Friends. (B.F.F.s) give you a weekly dose of personal finance stories, tips and insights. Join Trainers of The Financial Gym as they dig deep below the surface and get real about money! Along the way, they’ll be joined by members of the FinGym Fam for conversations about their own journeys of financial fitness and the triumphs and tribulations along the way.
  continue reading
 
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity
  continue reading
 
Stripped by SIA, your podcast for strippers, sex workers and all the fancy naked people. Hosted and produced by Steph Sia, an adult content creator, dancer and cam model based in Vancouver, Canada, Stripped by SIA aims to destigmatize the sex industry by telling peoples' stories and lived experiences every week. New episodes every single Sunday at 12am PST. Produced & hosted by Steph Sia @siasteph Music by TED-D @djteddmusic Photography by Ian Daburn @daburn_photography Graphics by Maria Bel ...
  continue reading
 
Let's talk trading. Especially how to trade options for income. Whether you want to trade for a living, have a side hustle, or make extra monthly income from stocks, this is the place. We are here to help individual investors learn to trade options in a way that is simple, fun and profitable. The goal is to help you achieve Freedom. Financial freedom so you have no more worries about making ends meet and so you have more than enough for safety and security. Time Freedom so you can do what yo ...
  continue reading
 
Good Looking Loser - the Original 'Hardcore' Self-Improvement Community. The community includes in-depth discussion on how to get laid, beat anxiety/depression, get ripped in the gym, get rich (from online business) and a "Nothing in Moderation" approach to various other subjects that mainstream shys away from. Our community values PERSONAL EXPERIENCE over theory and is one of the most proactive on the entire Internet. Come by and say hi!
  continue reading
 
Loading …
show series
 
I am SO excited that I get to reconnect with Season 1 OG guest, ShaeCutie, a seasoned sex worker, to discuss the evolution of her career and the stigma she's faced over the span of her career. We explore the importance of destigmatizing sex work, navigating tough conversations with family and friends, and the impact of judgment on sex workers. Shay…
  continue reading
 
Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor booths don’t have to suck (for vendors or conference attendees!) Budget planning guidance for 2025 CISOs might not be that great at predicting their own future needs Use this one easy trick to bypass EDR! A…
  continue reading
 
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
  continue reading
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
Air gaps are still not air gapped, making old exploits new again, chaining exploits for full compromise, patching is overrated, SBOMs are overrated, VPNs are overrated, getting root with a cigarette lighter, you can be any user you want to be, in-memory Linux malware, the Internet Archive is back, we still don't know who created Bitcoin, unhackable…
  continue reading
 
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
  continue reading
 
On this episode of Financially Naked: Stories from The Financial Gym, hosts Kadri and Sam dive into creative and budget-friendly ways to approach holiday gift-giving. They share their personal perspectives on setting gift budgets, prioritizing thoughtfulness, and planning ahead to avoid last-minute stress and overspending. Whether it's leveraging c…
  continue reading
 
In the leadership and communications segment, The CEO’s Role in Setting Tone at the Top, CISOs, C-suite remain at odds over corporate cyber resilience, Warren Buffett's Secret To Success? Run It 'Like A Small Family Business,' Says One Of His CEOs, and more! Show Notes: https://securityweekly.com/bsw-368…
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
This week, I get to interview Violet Voss, a professional glamour and fetish model, online and in-person dominatrix, and fetish clip artist. We discuss Violet's journey in the industry, the balancing act between in-person and online work, and the importance of communication and boundaries in relationships and professional partnerships. Violet share…
  continue reading
 
In the enterprise security news, Eon, Resolve AI, Harmonic and more raise funding Dragos acquires Network Perception Prevalent acquires Miratech The latest DFIR reports A spicy security product review Secure by Whatever New threats Hot takes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw…
  continue reading
 
Aaron was already a skilled bug hunter and working at HackerOne as a triage analyst at the time. What he discovered can't even be described as a software bug or a vulnerability. This type of finding has probably resulted in more security incidents and breaches than any other category: the unintentional misconfiguration. There's a lot of conversatio…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
The many lessons to take away from a 24-year old flaw in glibc and the mastery in crafting an exploit in PHP, changing a fuzzer's configuration to find more flaws, fuzzing LLMs for prompt injection and jailbreaks, security hardening of baseband code, revisiting the threat models in Microsoft's Recall, and more! Show Notes: https://securityweekly.co…
  continue reading
 
On this episode of Financially Naked: Stories from The Financial Gym, hosts Kylie and Gina, Certified Financial Trainers at The Financial Gym, are here to talk about financial moves to make before the end of the year. With just a few months left in 2024, there’s still plenty of time to get organized, tackle money tasks, and set yourself up for succ…
  continue reading
 
In the leadership and communications segment, PwC Urges Boards to Give CISOs a Seat at the Table, CISO Salary Surge: Fewer Job Changes, Bigger Paychecks for Experienced Cybersecurity Leaders, Fostering a cybersecurity-first culture: Key leadership insights for building resilient businesses, and more! Show Notes: https://securityweekly.com/bsw-367…
  continue reading
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
Loading …

Quick Reference Guide