Podcast Episodes
Back to Search
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process…
1 year, 5 months ago
CEO Accountability as CISOs Concerned Over Demands and Measured by Profit/Cost - BSW #369
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by…
1 year, 5 months ago
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News.
Show Notes: https://secu…
1 year, 5 months ago
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade,…
1 year, 5 months ago
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the bar…
1 year, 5 months ago
Alternative CISO career paths, budget planning, and one easy trick to bypass EDR! - ESW #380
Finally, in the enterprise security news,
HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor boot…1 year, 5 months ago
Exploring Unified SASE as a Service - Renuka Nadkarni - ESW #380
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Produ…
1 year, 5 months ago
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News.
Show Not…
1 year, 5 months ago
Cybersecurity Success is Business Success - Theresa Lanowitz - ESW #380
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The late…
1 year, 5 months ago
Everything is Overrated - PSW #847
Air gaps are still not air gapped, making old exploits new again, chaining exploits for full compromise, patching is overrated, SBOMs are overrated, …
1 year, 5 months ago