Podcast Episodes

Back to Search
Effective Operational Outcomes - Ken Dunham - PSW #847
Effective Operational Outcomes - Ken Dunham - PSW #847

New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern…

1 year, 5 months ago

Short Long
View Episode
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303

Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsof…

1 year, 5 months ago

Short Long
View Episode
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422

AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News.

1 year, 5 months ago

Short Long
View Episode
Setting the Tone at the Top as CISOs and C-Suite Remain at Odds - BSW #368
Setting the Tone at the Top as CISOs and C-Suite Remain at Odds - BSW #368

In the leadership and communications segment, The CEO’s Role in Setting Tone at the Top, CISOs, C-suite remain at odds over corporate cyber resilienc…

1 year, 5 months ago

Short Long
View Episode
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368

In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary req…

1 year, 5 months ago

Short Long
View Episode
Funding, acquisitions, DFIR reports, bad products, secure by design, and more! - ESW #379
Funding, acquisitions, DFIR reports, bad products, secure by design, and more! - ESW #379

In the enterprise security news,

Eon, Resolve AI, Harmonic and more raise funding Dragos acquires Network Perception Prevalent acquires Miratech The…

1 year, 5 months ago

Short Long
View Episode
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421

Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News.

Sho…

1 year, 5 months ago

Short Long
View Episode
Discovering a common Salesforce mistake launched this security professional's career - Aaron Costello - ESW #379
Discovering a common Salesforce mistake launched this security professional's career - Aaron Costello - ESW #379

Aaron was already a skilled bug hunter and working at HackerOne as a triage analyst at the time. What he discovered can't even be described as a soft…

1 year, 5 months ago

Short Long
View Episode
Community Knowledge Sharing with CyberNest - Ben Siegel - ESW #379
Community Knowledge Sharing with CyberNest - Ben Siegel - ESW #379

For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing …

1 year, 5 months ago

Short Long
View Episode
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846

"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals …

1 year, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us