Listen to the stories, motivational speeches and shayaris written and recited by renowned film (Bhootnath) writer-director Vivek Sharma. Vivek Sharma talks about life and cinema through his podcasts. Follow him on twitter@mainviveksharma Instagram@mainviveksharma Youtube@filmzonecreationsllp
…
continue reading
Bringing in stories of living people who fight the odds and contribute to society at large. Stay tuned to listen to a new episode every Monday morning to stay inspired and motivated. This Channel is part of an initiative to prevent depression and suicide amongst youth. Jai Hind, Vivek Sharma
…
continue reading
An ongoing series of interviews where I, Adrian Swinscoe, interview leading entrepreneurs, leaders and thought leaders about how to deliver stand out customer experience and service. Essentially, I'm looking for practical clues that will help you build a business that both customers and employees love. Topics covered in the interviews include customer service, experience and engagement, employee experience and engagement, technology, adaptable and responsive organizations, high-performing te ...
…
continue reading
Founders Focus is a podcast dedicated to helping small business owners, entrepreneurs, and leaders. The podcast is hosted by Scott Case, CEO of Upside Business Travel and founding CTO of Priceline.com. Scott is joined by industry experts to hash out shared pain points, experiences, and action steps. Visit foundersfocus.com to learn more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Rocking Entrepreneur Podcast | Startup Stories | Indian Entrepreneurs | India | Entrepreneurship | Startups. Rocking Entrepreneur is created for today’s entrepreneur whether you have just started your journey as an entrepreneur/founder/small business owner OR are a serial entrepreneur. Are you ambitious and crafting your next upstart or startup? Then there is no greater place to get quality information and education than The Rocking Entrepreneur. You don’t need to go to business school. ...
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Play later
Play later
Lists
Like
Liked
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Play later
Play later
Lists
Like
Liked
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
41:59
Play later
Play later
Lists
Like
Liked
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading
1
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
59:35
59:35
Play later
Play later
Lists
Like
Liked
59:35
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
1
The five promises of personalization - Interview with Mark Abraham and David Edelman
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33
Today’s interview is with Boston Consulting Group Senior Partner Mark F. Abraham and Harvard Business School Senior Lecturer David C. Edelman. They join me today to talk about their new book: PERSONALIZED: Customer Strategy in the Age of AI, defining personalization, the equation P=n×v2, the five promises of personalization, the technology that bra…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
Play later
Play later
Lists
Like
Liked
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
2:14:57
2:14:57
Play later
Play later
Lists
Like
Liked
2:14:57
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
1:12:35
1:12:35
Play later
Play later
Lists
Like
Liked
1:12:35
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading
1
AI, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet... - SWN #420
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-420
…
continue reading
1
Run Your Security Program Like an Election Campaign - Kush Sharma - BSW #367
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
…
continue reading
1
There are major tectonic shifts taking place in the outsourcing space right now - Interview with Craig Crisler of SupportNinja
55:28
55:28
Play later
Play later
Lists
Like
Liked
55:28
Today’s interview is with Craig Crisler, CEO at SupportNinja, a modern provider of Business Process Outsourcing (BPO) services. Amidst lots of research reporting that despite all the investment in new tech, customer satisfaction is at an all-time low, I talk to Craig about where folks are going wrong with their investments, what’s going on in the B…
…
continue reading
1
Perfctl, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland... - SWN #419
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
…
continue reading
1
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378
2:14:25
2:14:25
Play later
Play later
Lists
Like
Liked
2:14:25
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
3:07:23
3:07:23
Play later
Play later
Lists
Like
Liked
3:07:23
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - Farshad Abasi - ASW #301
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
…
continue reading
1
Death Stars, Recall, Microsoft, Brocade, AI, Josh Marpet, and more... - SWN #418
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-418
…
continue reading
1
How to Attain Zero Trust - Rob Allen - BSW #366
57:58
57:58
Play later
Play later
Lists
Like
Liked
57:58
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
…
continue reading
1
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker... - Rob Allen - SWN #417
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
…
continue reading
1
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377
1:59:45
1:59:45
Play later
Play later
Lists
Like
Liked
1:59:45
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
…
continue reading
1
Within five years, contact center agents will become contact center specialists - Interview with Sam Wilson of 8x8
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31
Today’s interview is with Sam Wilson, the CEO of 8x8, a provider of a unified cloud platform for contact center, business phone, video, chat, and APIs that helps companies of any size deliver differentiated customer experiences. I’ve spoken to Sam a couple of times, and every time, we have great conversations where we rummage around some of the big…
…
continue reading
1
AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844
2:59:14
2:59:14
Play later
Play later
Lists
Like
Liked
2:59:14
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
…
continue reading
1
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
1:07:51
1:07:51
Play later
Play later
Lists
Like
Liked
1:07:51
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
1:06:53
1:06:53
Play later
Play later
Lists
Like
Liked
1:06:53
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Play later
Play later
Lists
Like
Liked
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Building customer loyalty and a human connection in an increasingly competitive landscape - Interview with Conny Kalcher of Zurich Insurance
46:59
46:59
Play later
Play later
Lists
Like
Liked
46:59
Today’s interview is with Conny Kalcher, Group Chief Customer Officer at Zurich Insurance. Conny joins me today to talk about her ambitions for Zurich to become the “Apple of Insurance”, her guiding philosophy around customer retention and revenue, how they are building customer loyalty and a human connection in an increasingly competitive landscap…
…
continue reading
1
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
2:30:27
2:30:27
Play later
Play later
Lists
Like
Liked
2:30:27
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
3:04:37
3:04:37
Play later
Play later
Lists
Like
Liked
3:04:37
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
…
continue reading
1
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more... - SWN #412
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-412
…
continue reading
1
Paying Down Tech Debt, Rust in Firmware, EUCLEAK, Deploying SSO - ASW #298
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25
Considerations in paying down tech debt, make Rust work on bare metal, ECDSA side-channel in Yubikeys, trade-offs in deploying SSO quickly, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-298
…
continue reading
1
Cybersecurity and the Business - Theresa Lanowitz - BSW #363
56:32
56:32
Play later
Play later
Lists
Like
Liked
56:32
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading
1
If it matters for your customer, it’s important - Interview with Tara DeZao, Simon Thorpe and James Dodkins of Pega
48:27
48:27
Play later
Play later
Lists
Like
Liked
48:27
Today’s interview revisits and finalises the series of podcast conversations that I had with various folks whilst at Pegaworld earlier this. This episode is a combo affair and features a conversation with Tara DeZao, Director of Product Marketing, AdTech and MarTech, at Pega. It is then swiftly followed by a chat that I had with Simon Thorpe, Direc…
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on November 8, 2017. What is encryption anyway? Doug and Russel explain symmetric encryption, asymmetric encryption, and how crypto gets broken! Show Notes: https://securityweekly.com/vault-swn-19…
…
continue reading
1
Leadership Lessons from the First 100 Episodes of CISO Stories - Todd Fitzgerald - BSW Vault
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
…
continue reading
1
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
…
continue reading
1
Building AI BOMs - Helen Oakley - PSW #841
3:01:47
3:01:47
Play later
Play later
Lists
Like
Liked
3:01:47
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
…
continue reading
1
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland... - SWN #411
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-411
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading