Podcast Episodes
Back to SearchThe risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly ever…
1 year, 9 months ago
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do…
1 year, 9 months ago
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News.
Visit https://www.secu…
1 year, 10 months ago
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to pr…
1 year, 10 months ago
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade …
1 year, 10 months ago
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approa…
1 year, 10 months ago
Cybersecurity In College - SWN Vault
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 1…
1 year, 10 months ago
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most sec…
1 year, 10 months ago
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why?…
1 year, 10 months ago
Hacker Heroes - Dave Aitel - PSW Vault
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel
Welcome to an enlightening episode of our podcast, where we sit down w…
1 year, 10 months ago