Podcast Episodes

Back to Search
Cybersecurity & Patient Safety - Justin Armstrong - PSW #665
Cybersecurity & Patient Safety - Justin Armstrong - PSW #665

Successful attacks on healthcare entities are steadily increasing. Sophisticated criminals and nation states are focusing more attention on healthcar…

5 years, 7 months ago

Short Long
View Episode
Lovable Security: Be a Data Custodian, Not a Data Owner - Fredrick "Flee" Lee - PSW #665
Lovable Security: Be a Data Custodian, Not a Data Owner - Fredrick "Flee" Lee - PSW #665

Loveable Security: Flee's approach to cybersecurity is that is should be "loveable." He thinks cybersecurity perpetuates a myth of an elite, isolated…

5 years, 7 months ago

Short Long
View Episode
Predicting Vulnerabilities In Compiled Code - Roi Cohen & Shani Dodge - PSW #664
Predicting Vulnerabilities In Compiled Code - Roi Cohen & Shani Dodge - PSW #664

The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of…

5 years, 7 months ago

Short Long
View Episode
SWVHSC Micro Interviews: Polarity & Netsparker - Ferruh Mavituna, Paul Battista - PSW #664
SWVHSC Micro Interviews: Polarity & Netsparker - Ferruh Mavituna, Paul Battista - PSW #664

Most analysts will tell you that they balance between being thorough and getting the job done quickly. Paul Battista asked the security community to …

5 years, 7 months ago

Short Long
View Episode
Hacking Tesla's Model 3, 28,000 Printers Hijacked, & iOS 14 Privacy Changes - PSW #664
Hacking Tesla's Model 3, 28,000 Printers Hijacked, & iOS 14 Privacy Changes - PSW #664

Google Researcher Reported 3 Flaws in Apache Web Server Software, Medical Data Leaked on GitHub Due to Developer Errors, Experts hacked 28,000 unsecu…

5 years, 7 months ago

Short Long
View Episode
SWVHSC Micro Interviews: Gravwell & Rapid7 - Corey Thuen, Deral Heiland - PSW #663
SWVHSC Micro Interviews: Gravwell & Rapid7 - Corey Thuen, Deral Heiland - PSW #663

What use cases are addressed by Threat Hunting Platforms and SIEMs? Where is the overlap and where are the differences? Corey Thuen, Founder of Gravw…

5 years, 7 months ago

Short Long
View Episode
Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663
Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663

New Microsoft Defender ATP Capability Blocks Malicious Behaviors, Voice Phishers Targeting Corporate VPNs, IBM finds vulnerability in IoT chips prese…

5 years, 7 months ago

Short Long
View Episode
Protecting Critical Infrastructure In Hybrid Clouds - Dan Perkins, Harry Sverdlove - PSW #663
Protecting Critical Infrastructure In Hybrid Clouds - Dan Perkins, Harry Sverdlove - PSW #663

Customers are concerned about protecting critical services such as Active Directory from compromise. It's game over if AD is compromised. AD environm…

5 years, 7 months ago

Short Long
View Episode
Vulnerability Rich - Contextually Blind! - Michael Assraf - PSW #662
Vulnerability Rich - Contextually Blind! - Michael Assraf - PSW #662

It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest bloo…

5 years, 7 months ago

Short Long
View Episode
Adobe RCEs, Amazon Alexa Vulns, & TeamViewer Flaw - PSW #662
Adobe RCEs, Amazon Alexa Vulns, & TeamViewer Flaw - PSW #662

This week, Amazon Alexa One-Click Attack Can Divulge Personal Data, Adobe tackles critical code execution vulnerabilities in Acrobat, Reader, Threat …

5 years, 7 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us