Podcast Episodes

Back to Search
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848

Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environment…

1 year, 6 months ago

Short Long
View Episode
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424

Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News.

Visit https://www.securi…

1 year, 6 months ago

Short Long
View Episode
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369

Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the bar…

1 year, 6 months ago

Short Long
View Episode
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304

Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade,…

1 year, 6 months ago

Short Long
View Episode
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423

Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News.

Visit ht…

1 year, 6 months ago

Short Long
View Episode
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380

Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The late…

1 year, 6 months ago

Short Long
View Episode
Effective Operational Outcomes - Ken Dunham - PSW #847
Effective Operational Outcomes - Ken Dunham - PSW #847

New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern…

1 year, 6 months ago

Short Long
View Episode
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303

Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsof…

1 year, 6 months ago

Short Long
View Episode
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422

AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News.

1 year, 6 months ago

Short Long
View Episode
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368

In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary req…

1 year, 6 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us