Podcast Episodes
Back to Search
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn M…
1 year, 4 months ago
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (an…
1 year, 4 months ago
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News.
Visit https://www.secu…
1 year, 4 months ago
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that…
1 year, 4 months ago
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environment…
1 year, 4 months ago
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News.
Visit https://www.securi…
1 year, 4 months ago
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the bar…
1 year, 4 months ago
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade,…
1 year, 4 months ago
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News.
Visit ht…
1 year, 4 months ago
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The late…
1 year, 4 months ago