Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
A weekly podcast from AlertsUSA, Inc expanding on SMS alerts sent as part of the National Threat and Incident Notification Service for Mobile Devices. Topics covered include terrorism, border security, nuclear and radiological emergencies, civil unrest, embassy warning messages, major public health threats such as epidemics and pandemics and more. Each weekly episode is a fast paced roundup of threats, developments and practical advice directly impacting your safety and security.
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you!
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading

1
Episode 448 - Global Technology Industry Association renews call to the IT Channel
6:24
6:24
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:24We speak with Wayne Selk of the Global Technology Industry Association, or GTIA during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. GTIA was formerly CompTIA. The renaming is the result of the sale of the Computing Technology Industry Association’s CompTIA brand in combination with …
…
continue reading

1
Building the SOC of the Future - JP Bourget - ESW #399
31:22
31:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:22What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Homeland Security Weekly Update - March 22, 2025
9:00
9:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:00This week's update begins with a look at the increasingly dangerous trend of attacking Tesla dealerships, charging stations, employees, and owners as the Left begins their annual summer protests. We then turn to Secretary of Defense Hegseth's moves putting US Navy assets into the border security mission. An expanded written version of this report c…
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Its Not Really A 0-Day - PSW #866
2:14:34
2:14:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:14:34This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading

1
Smart Cybersecurity Spending, as CISOs Architect Resilience and Grade Themselves - BSW #387
28:21
28:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:21In the leadership and communications segment, Smart cybersecurity spending and how CISOs can invest where it matters, Grading CISOs: Effective Metrics and Personal Growth Strategies, The Pandemic Proved that Remote Leadership Works, and more! Show Notes: https://securityweekly.com/bsw-387
…
continue reading

1
Breaking Down Human-Element Breaches To Improve Cybersecurity - Jinan Budge - BSW #387
1:06:12
1:06:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:12Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
…
continue reading

1
Redlining the Smart Contract Top 10 - Shashank - ASW #322
53:01
53:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:01The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
…
continue reading

1
Redlining the Smart Contract Top 10 - Shashank . - ASW #322
53:01
53:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:01The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
…
continue reading

1
Penetration Tests: useful, pointless, harmful, required, ineffective? - Phillip Wylie, Marina Segal - ESW #398
1:40:36
1:40:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:40:36Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm. Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet…
…
continue reading

1
Episode 447 - Protecting Microsoft 365 Tenants at Scale
3:25
3:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:25We speak with Matthé Smit, Chief Product Officer of Inforcer during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. Zero Trust World 2025 aims to empower IT professionals to embrace a default-deny security posture and build stronger, more resilient cybersecurity frameworks. Attendees g…
…
continue reading

1
Episode 446 - Getting started with Rubber Ducky
3:55
3:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:55We speak with Kieran Human, Special Projects Engineer with ThreatLocker during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. Kieran ran a hands-on lab to teach what a Rubber Ducky is and how to create and deploy your own payload. Zero Trust World 2025 aims to empower IT professionals…
…
continue reading

1
Episode 445 - Makes clients sleep better at night - Zero Trust World focuses on the serious business of cybercrime
6:36
6:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:36We speak with Rob Allen, Chief Product Officer of Threatlocker during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. Zero Trust World 2025 aims to empower IT professionals to embrace a default-deny security posture and build stronger, more resilient cybersecurity frameworks. Attendees…
…
continue reading

1
Episode 444 - How vulnerable is your Mac
5:02
5:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:02We speak with Slava Konstantinov, macOS Lead Architect of Threatlocker during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. How vulnerable do you think your Macs are to Malware? Mac expert Slava Konstantinova uncovers the hidden data and security risks lurking in your macOS browsers …
…
continue reading

1
Episode 443 - Embracing a default-deny security posture
8:37
8:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
8:37We speak with Danny Jenkins, CEO & Founder of Threatlocker during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. Zero Trust World 2025 aims to empower IT professionals to embrace a default-deny security posture and build stronger, more resilient cybersecurity frameworks. Attendees gai…
…
continue reading

1
Building the SOC of the Future - JP Bourget - ESW #399
31:22
31:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:22What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Homeland Security Weekly Update - March 22, 2025
9:01
9:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:01This week's update begins with a look at the increasingly dangerous trend of attacking Tesla dealerships, charging stations, employees, and owners as the Left begins their annual summer protests. We then turn to Secretary of Defense Hegseth's moves putting US Navy assets into the border security mission. An expanded written version of this report c…
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Its Not Really A 0-Day - PSW #866
2:14:34
2:14:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:14:34This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading

1
Its Not Really A 0-Day - PSW #866
2:14:34
2:14:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:14:34This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading

1
Its Not Really A 0-Day - PSW #866
2:14:34
2:14:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:14:34This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading

1
Smart Cybersecurity Spending, as CISOs Architect Resilience and Grade Themselves - BSW #387
28:21
28:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:21In the leadership and communications segment, Smart cybersecurity spending and how CISOs can invest where it matters, Grading CISOs: Effective Metrics and Personal Growth Strategies, The Pandemic Proved that Remote Leadership Works, and more! Show Notes: https://securityweekly.com/bsw-387
…
continue reading

1
Breaking Down Human-Element Breaches To Improve Cybersecurity - Jinan Budge - BSW #387
1:06:12
1:06:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:12Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
…
continue reading

1
Breaking Down Human-Element Breaches To Improve Cybersecurity - Jinan Budge - BSW #387
37:52
37:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:52Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
…
continue reading

1
Breaking Down Human-Element Breaches To Improve Cybersecurity - Jinan Budge - BSW #387
37:52
37:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:52Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
…
continue reading

1
Episode 442 - Maritime Domain Awareness Series - Securing our seas: Innovations and challenges
1:02:01
1:02:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:01This session focused on gaining insights in the latest developments and capabilities for establishing and maintaining situational awareness across the maritime domain, with a focus on security, sustainability and space-earth observation. For Reference to the Maritime Domain and related activities – welcome to refer to the following links: https://w…
…
continue reading