Following the trends in perpetuity. TyphoonTalks is a podcast that analyzes current and emerging business trends and themes. Hosted by Typhoon's staff, the podcasts share insights gained by the firm's consultants during client engagements in the Financial Services; Energy & Utilities; Health & Life Sciences; Telecommunications, Media and Technology; and Retail, Leisure & Transportation sectors. Typhoon's activities in the market identify trends that, when exploited, allow firms to create a s ...
…
continue reading
Discover every episode of Behind the Mic currently available! Check out OTRGOLD.COM for more classic radio. Audio Credit: "Behind the Mic" by The Old Time Radio Researchers Group
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
42:00
42:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
42:00
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Show Notes: https://securityweekly.com/asw-303
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
30:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-422
…
continue reading
1
Setting the Tone at the Top as CISOs and C-Suite Remain at Odds - BSW #368
19:25
19:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
19:25
In the leadership and communications segment, The CEO’s Role in Setting Tone at the Top, CISOs, C-suite remain at odds over corporate cyber resilience, Warren Buffett's Secret To Success? Run It 'Like A Small Family Business,' Says One Of His CEOs, and more! Show Notes: https://securityweekly.com/bsw-368…
…
continue reading
1
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
40:26
40:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:26
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
1
Funding, acquisitions, DFIR reports, bad products, secure by design, and more! - ESW #379
53:43
53:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:43
In the enterprise security news, Eon, Resolve AI, Harmonic and more raise funding Dragos acquires Network Perception Prevalent acquires Miratech The latest DFIR reports A spicy security product review Secure by Whatever New threats Hot takes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
30:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Discovering a common Salesforce mistake launched this security professional's career - Aaron Costello - ESW #379
31:15
31:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:15
Aaron was already a skilled bug hunter and working at HackerOne as a triage analyst at the time. What he discovered can't even be described as a software bug or a vulnerability. This type of finding has probably resulted in more security incidents and breaches than any other category: the unintentional misconfiguration. There's a lot of conversatio…
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel - ESW #379
28:18
28:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:18
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
54:53
54:53
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
54:53
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
RCE from Iconv + PHP, Fuzzing a Codec, Fuzzing LLMs, Revisiting Recall - ASW #302
37:03
37:03
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:03
The many lessons to take away from a 24-year old flaw in glibc and the mastery in crafting an exploit in PHP, changing a fuzzer's configuration to find more flaws, fuzzing LLMs for prompt injection and jailbreaks, security hardening of baseband code, revisiting the threat models in Microsoft's Recall, and more! Show Notes: https://securityweekly.co…
…
continue reading
1
Give CISOs a Seat at the Table as CISO Salaries Surge - BSW #367
25:33
25:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:33
In the leadership and communications segment, PwC Urges Boards to Give CISOs a Seat at the Table, CISO Salary Surge: Fewer Job Changes, Bigger Paychecks for Experienced Cybersecurity Leaders, Fostering a cybersecurity-first culture: Key leadership insights for building resilient businesses, and more! Show Notes: https://securityweekly.com/bsw-367…
…
continue reading
1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
35:34
35:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:34
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading
1
AI, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet... - SWN #420
30:10
30:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:10
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-420
…
continue reading
1
The Saga Continues - PSW #846
1:20:12
1:20:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:20:12
Get ready for a wild ride in this week's podcast episode, where we dive into the latest security shenanigans! Default Credentials Gone Wild: We’ll kick things off with a look at how default credential scanners are like that friend who shows up to the party but never brings snacks. They're everywhere, but good luck finding one that actually works! C…
…
continue reading
1
Run Your Security Program Like an Election Campaign - Kush Sharma - BSW #367
39:48
39:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
39:48
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
…
continue reading
1
Secure the Browser & Vulnerability and Exposure Management - Brian Contos, Neko Papez - ESW #378
31:04
31:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:04
The way we use browsers has changed, so has the way we need to secure them. Using a secure enterprise browser to execute content away from the endpoint, inside a secure cloud browser is a dramatically more effective and cost-effective approach to protect users and secure access. This segment is sponsored by Menlo Security. Visit https://securitywee…
…
continue reading
1
Perfctl, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland... - SWN #419
32:36
32:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:36
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-419
…
continue reading
1
Nothing Is Safe - PSW #845
2:05:10
2:05:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:05:10
Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabilities. Meanwhile, Supermicro's BMC firmware is giving away root access like it's going out of style. If you thought your Kia was safe, think again - all it takes is a license plate and 30 seconds to turn your car into a hacker's joyride.…
…
continue reading
1
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Jayson Grace - ESW #378
35:32
35:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:32
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
…
continue reading
1
Cybersecurity best practices are the worst, AI indegestion, real time doxxing - ESW #378
1:07:52
1:07:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:07:52
This week in the enterprise security news, we've got: Torq, Tamnoon, and Defect Dojo raise funding Checkmarx acquires ZAP Commvault acquires Clumio Would you believe San Francisco is NOT the most funded metro area for cybersecurity? Auto-doxxing Smart glasses are now possible Meta gets fined $100M for storing plaintext passwords AI coding assistant…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
1:03:12
1:03:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:03:12
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
Death Stars, Recall, Microsoft, Brocade, AI, Josh Marpet, and more... - SWN #418
29:24
29:24
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:24
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Show Notes: https://securityweekly.com/swn-418
…
continue reading
1
Underfunding and Leadership Gaps, as AI Replaces CEO and Senate Eyes Healthcare - BSW #366
26:02
26:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:02
In the leadership and communications segment, Underfunding And Leadership Gaps Weaken Cybersecurity Defenses, A Self-Care Checklist for Leaders, Senate bill eyes minimum cybersecurity standards for health care industry, and more! Show Notes: https://securityweekly.com/bsw-366
…
continue reading
1
How to Attain Zero Trust - Rob Allen - BSW #366
32:06
32:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:06
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
…
continue reading
1
Quantum threats, SOC automation, funding trends - ESW #377
44:10
44:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
44:10
In the Enterprise News, the hosts discuss various trends and challenges in the cybersecurity landscape, including the evolution of terminology, funding trends, the emergence of new startups, and the impact of AI on security practices. They also explore the challenges faced by CISOs, the importance of humor in the industry, and the future of quantum…
…
continue reading