show episodes
 
Why are there nutrition labels required for the food we eat, but not the media we consume? How do you find out if the show you are sponsoring or listening to is saving lives or destroying the fabric of our democracy? The Media Roundtable is back in session for a new season this September but with a fun new twist. We are sharpening our focus to conversations with podcasters and creators about the shows they make and the reasons WHY they make them. The Media Roundtable season two will “unbox” ...
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Two Old Farts Talk Sci-Fi will bring you back to when you first fell in love with the speculative genre, which includes science fiction, fantasy, and horror, their mashups and subgenres, whether that be the written word or movies, TV, theatre, comic books and graphic novels. Whatever the format, if it can’t happen in real life, it may be brought up. --- What is it that first brought you to love the things that could not happen? --- What is it about the speculative genre that keeps you readin ...
  continue reading
 
Loading …
show series
 
If you get too cute, too kitschy with it, that could turn people off in the wrong way where they actively dislike the brand.” Ray Harkins, Senior Account Executive, WonderyThe world’s only podcast solely dedicated to audio ads is back! Presenting Ad Infinitum Season 2, Episode 4 - "Scary Ads."Context is everything for ads, but what do you do when t…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
“When we think of AI, it is a forward and a backward-looking question. ‘What's going to happen?’ We don't know. ‘Have we ever not known before?’ Well, every day of our history, we've not known. So there's the lesson.”- Lindsay Graham (CEO & Founder, Airship)The Media Roundtable is back! This week we’re looking into the present through the lens of h…
  continue reading
 
Viva la Birds In Row! We are lucky to go international here with Bart Balboa, the lead vocalist and guitarist from French screamo/hardcore/metal/awesome band Birds In Row. We discuss his life growing up in the rural French countryside, where his interest in politics began and how he got involved in being a tattoo artist. It's a great look into how …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
“Rather than trying to throw brands in at the deep end of the pool, how do we build them a staircase?”Dan Granger (CEO & Founder, Oxford Road)The Media Roundtable is back! This week we’re talking directly with two extremely successful Chief Audio Officers to answer one key question:“What do brands want?”At Podcast Movement Evolutions, Dan Granger (…
  continue reading
 
So incredibly stoked to welcome Brett Campbell from Pallbearer which is one of my favorite bands doing this style right now. It's melodic, it's doom, it's everything you could want from heavy music and I had to bounce around his brain to be able to find out more. We discuss the Little Rock scene, being a technical player and finding your way. He's …
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
  continue reading
 
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
  continue reading
 
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
  continue reading
 
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
Welcome back to The Hope Conspiracy and to celebrate their new LP that just hit, we had the vocalist Kevin Baker on the show. He's always been a somewhat mythic figure so was happy to be able to ask him questions about his love of hockey, 90's metalcore and coming up in the Boston scene. Despite his nihilistic music, Kevin is a damn sweetheart and …
  continue reading
 
The Media Roundtable is back! This week we’re recapping a whirlwind of a time from the 3rd International Podcast Show in London. If you missed out, we’re here to ease your FOMO (and hopefully inspire you to make the trip next year).Steven Abraham (President, Oxford Road) hosts fellow Oxford Road jetsetters Miranda Romano, (SVP of Media Services, Ox…
  continue reading
 
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
  continue reading
 
Since the 1995 publication of Daniel Goleman’s international bestseller Emotional Intelligence, Why It Can Matter More Than IQ, a global movement has developed to bring “EQ” into practice in businesses, schools, and communities around the globe. But what is its impact on Cybersecurity? In this interview, we welcome Jessica Hoffman, Deputy CISO for …
  continue reading
 
Since the 1995 publication of Daniel Goleman’s international bestseller Emotional Intelligence, Why It Can Matter More Than IQ, a global movement has developed to bring “EQ” into practice in businesses, schools, and communities around the globe. But what is its impact on Cybersecurity? In this interview, we welcome Jessica Hoffman, Deputy CISO for …
  continue reading
 
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs. This segment is sponsored by Swimlane. Visit https:/…
  continue reading
 
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
  continue reading
 
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questi…
  continue reading
 
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the…
  continue reading
 
Anytime I get a guest that is connected to punk/hardcore/indie rock, but isn't immediately obvious that they are involved is my sweet spot. You know Fred Armisen, he's been on Saturday Night Live, a creator/actor on Portlandia and frankly, so much more but were you aware of his deep roots within punk/hardcore/indie rock? It's absolutely there and w…
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 18, 2023. We talk with Ben about the rewards, hazards, and fun of bug bounty programs. Then we find out different ways to build successful and welcoming communities. Show Notes: https://securityweekly.com/vault-asw-9…
  continue reading
 
Explore how to transform your third party risk program from a business bottleneck to a business driver. Discover how evidence-based security documentation and AI can streamline risk assessments, completing them in days not months. This data-driven approach will reduce TPRM backlog and allow your security team to move faster, identify risk proactive…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on June 27, 2022. Forgepoint Capital’s Co-Founder and Managing Director, Alberto Yépez, explains what the current economic challenges mean for innovation and the future of the cybersecurity market. Hear his perspective on what …
  continue reading
 
Explore how to transform your third party risk program from a business bottleneck to a business driver. Discover how evidence-based security documentation and AI can streamline risk assessments, completing them in days not months. This data-driven approach will reduce TPRM backlog and allow your security team to move faster, identify risk proactive…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on June 27, 2022. Forgepoint Capital’s Co-Founder and Managing Director, Alberto Yépez, explains what the current economic challenges mean for innovation and the future of the cybersecurity market. Hear his perspective on what …
  continue reading
 
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in…
  continue reading
 
The Security Weekly crew and special guest Seemant Sehgal explore what PTaaS involves, how it differs from traditional penetration testing, and why it's becoming a crucial service for companies of all sizes to protect their digital assets. We'll discuss the how PTaaS is using the latest technologies (e.g machine learning), the benefits of having a …
  continue reading
 
"SYSTEMS OVERLOADED, FEAR ENVELOPS ME" You know his tone, you know his music, now get to know the man behind all of that in the form of Aaron Melnick. He played guitar for Integrity during their formative years, started In Cold Blood and has just dropped a mind-blowing solo record entitled Nuclae. He's a very thoughtful and soft spoken guy so we pe…
  continue reading
 
You could envisage a future where a run-of-network buy was voiced by the person who's hosting each individual show through the power of AI.”- Giles Martin (EVP, Strategy & Insights, Oxford Road)Chief Audio Officers, rejoice! The Media Roundtable is back, covering this week’s top audio stories and there’s a lot to digest.Dan Granger (CEO & Founder, …
  continue reading
 
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-388
  continue reading
 
Loading …

Quick Reference Guide