Podcast Episodes
Back to Search
ToddleShark, Zeek, Stuxnet revisited, ICS, AMEX, Apple, Change, Josh Marpet, and More - SWN #366
ToddleShark, Zeek, Stuxnet revisited, ICS, AMEX, Apple, Change, Josh Marpet, and More on this Edition of the Security Weekly News.
Show Notes: https:…
2 years ago
The Simple Mistakes and Complex Seeds of a Vulnerability Management Program - Emily Fox - ASW #275
The need for vuln management programs has been around since the first bugs -- but lots of programs remain stuck in the past. We talk about the traps …
2 years ago
SAML & Secrets, Serializing AI Models, OWASP ISTG, More Memory Safety - ASW #275
A SilverSAML example similar to the GoldenSAML attack technique, more about serializing AI models for Hugging Face, OWASP releases 1.0 of the IoT Sec…
2 years ago
Security Starts At The Top and as CISOs Struggle, do they replace the CIO? - BSW #340
In the leadership and communications section, Effective cyber security starts at the top, CISOs Struggling to Balance Regulation and Security Demands…
2 years ago
The Convergence of Security, Compliance, and Risk - Igor Volovich - BSW #340
The SEC's new cyber reporting requirements are forcing organizations to rethink their compliance and risk programs. No longer can compliance and risk…
2 years ago
Clueless pols, Lazarus, Ubiquity, UAMPQP, BlackCat, Airlines, Aaran Leyland and More - SWN #365
Clueless pols, Lazarus, Ubiquity, UAMPQP, BlackCat, CryptoChameleon, Airlines, Aaran Leyland, and More on this edition of the Security Weekly News.
S…
2 years ago
Funding goes quiet while M&A makes some noise! - ESW #351
In this week's news segment, we discuss the lack of funding announcements, and the potential effect RSA could have on the timing of all sorts of pres…
2 years ago
Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other netwo…
2 years ago
Malware In Strange Places, Overheating, LockBit - PSW #818
The latest attacks against WiFi, its illegal to break encryption, BLE Padlocks are as secure as you think, when command not found attacks, how did yo…
2 years ago
Social Engineering: AI & Living Off The Land - Jayson E. Street - PSW #818
Jayson joins us to discuss how he is using, and social engineering, AI to help with his security engagements. We also talk about the low-tech tools h…
2 years ago