Podcast Episodes

Back to Search
No image available

Why Native Controls Aren't Enough to Protect Your Cloud Workspaces (Sponsored)


Episode 90


Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive docume…


Published on 1 day, 16 hours ago

No image available

Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of


Episode 89


There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your …


Published on 1 week, 1 day ago

No image available

How Fortinet Delivers Web App Security in the AI Era (Sponsored)


Episode 88


Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be m…


Published on 2 weeks, 1 day ago

No image available

Why SBOMs Are Cooler and More Useful Than You Think


Episode 87


Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Mater…


Published on 3 weeks, 1 day ago

No image available

Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates


Episode 86


Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a d…


Published on 4 weeks, 1 day ago

No image available

News Roundup - Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks


Episode 85


Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traff…


Published on 1 month ago

No image available

Inside the CVE Process With Cisco (Sponsored)


Episode 84


CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some…


Published on 1 month, 1 week ago

No image available

A CISO’s Perspective on Model Context Protocol (MCP)


Episode 83


Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations d…


Published on 1 month, 2 weeks ago

No image available

Building a Workable Mobile Security Strategy In a World of Risky Apps


Episode 82


Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fo…


Published on 1 month, 3 weeks ago

No image available

News Roundup - BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans


Episode 81


From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cis…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate