Podcast Episodes

Back to Search
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366

We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly ever…

1 year, 9 months ago

Short Long
View Episode
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833

This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do…

1 year, 9 months ago

Short Long
View Episode
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394

Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News.

Visit https://www.secu…

1 year, 10 months ago

Short Long
View Episode
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354

With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to pr…

1 year, 10 months ago

Short Long
View Episode
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289

OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade …

1 year, 10 months ago

Short Long
View Episode
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud  - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approa…

1 year, 10 months ago

Short Long
View Episode
Cybersecurity In College - SWN Vault
Cybersecurity In College - SWN Vault

Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 1…

1 year, 10 months ago

Short Long
View Episode
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most sec…

1 year, 10 months ago

Short Long
View Episode
Bringing Autonomy to AppSec - Dr. David  Brumley  - ESW Vault
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why?…

1 year, 10 months ago

Short Long
View Episode
Hacker Heroes - Dave Aitel - PSW Vault
Hacker Heroes - Dave Aitel - PSW Vault

Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel

Welcome to an enlightening episode of our podcast, where we sit down w…

1 year, 10 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us