Podcast Episodes

Back to Search
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was create…

1 year, 6 months ago

Short Long
View Episode
Exploding Pagers - PSW #843
Exploding Pagers - PSW #843

Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more thi…

1 year, 6 months ago

Short Long
View Episode
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299

A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber ris…

1 year, 6 months ago

Short Long
View Episode
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299

When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to unders…

1 year, 6 months ago

Short Long
View Episode
Consolidating C-Suite Tech Roles as Security Budgets and Workforce Growth Flatline - BSW #364
Consolidating C-Suite Tech Roles as Security Budgets and Workforce Growth Flatline - BSW #364

In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows…

1 year, 6 months ago

Short Long
View Episode
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364

Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber ri…

1 year, 6 months ago

Short Long
View Episode
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375

Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most suc…

1 year, 6 months ago

Short Long
View Episode
Oktane 2024 and the Current State of Identity Security - Harish Peri - ESW #375
Oktane 2024 and the Current State of Identity Security - Harish Peri - ESW #375

We are a month away from Oktane -- the biggest identity event of the year. Okta is bringing thousands of identity industry thought leaders, IT and se…

1 year, 6 months ago

Short Long
View Episode
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413

Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News.

Sh…

1 year, 6 months ago

Short Long
View Episode
Cybersecurity has too many distractions and can the White House fix BGP? - ESW #375
Cybersecurity has too many distractions and can the White House fix BGP? - ESW #375

This week, in the enterprise security news,

Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire…

1 year, 6 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us