Podcast Episodes
Back to SearchSecuring Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol …
3 months, 1 week ago
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Wee…
3 months, 1 week ago
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clickin…
3 months, 2 weeks ago
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
Segment 1: OT Security Doesn’t Have to be a Struggle
OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls.…
3 months, 2 weeks ago
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News.
Visit http…
3 months, 2 weeks ago
Turning To The Darkside & AI Cyberslop - PSW #899
This week:
Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but…3 months, 2 weeks ago
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc…
3 months, 2 weeks ago
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News.
Visit https://www.securityw…
3 months, 2 weeks ago
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfi…
3 months, 3 weeks ago
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
Segment 1: Interview with Joel Burleson-Davis
Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-cr…
3 months, 3 weeks ago