In-depth analysis, incisive commentary and beyond the surface look at the top and trending news of the day.
…
continue reading
Attack Surface Management Podcasts
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading

1
20. Ransomware Landscape Update: More Groups, More Victims
50:04
50:04
Play later
Play later
Lists
Like
Liked
50:04In this episode of The Dark Dive we check in on the ransomware landscape, following major developments identified by the Searchlight Cyber threat intelligence team. Luke Donovan, Head of Threat Intelligence at Searchlight Cyber, shares trends that his team has identified from the dark web in 2025 including: an escalation in the number of ransomware…
…
continue reading

1
Living With Diabetes: Understanding The Condition And Its Management
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05Diabetes is one of the fastest-growing health challenges in Nigeria. Millions live with the condition, many without even knowing it, while others struggle daily with the burden of managing it. But how much do Nigerians really know about this silent killer? In today’s episode of Nigeria Daily, we hear the story of a patient, test the knowledge of ev…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
The Decline Of Fish Production And Consumption In Nigeria
31:01
31:01
Play later
Play later
Lists
Like
Liked
31:01Once seen as an affordable alternative source of protein for the average Nigerian, fish is gradually disappearing from the dining table and not because it’s no longer wanted. With the high cost of feed, fuel, and transportation, many fish farmers are struggling to stay in business, and as a result, prices are rising beyond reach for millions. What’…
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Show Notes: https://securityweekly.com/asw-349…
…
continue reading

1
Why Security Officers Are Under Increasing Attack In Nigeria?
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32From Benue to Kogi to Edo, Nigeria has recently witnessed disturbing attacks on security officers. In Edo State, eight NSCDC personnel were ambushed and killed. In Kogi, gunmen opened fire on police checkpoints, leaving officers and a passerby dead. And in Benue, a joint patrol team was ambushed, with casualties recorded. These incidents reveal a t…
…
continue reading
Join Jeff Steadman and Jim McDonald for the September 2025 mailbag episode of Identity at the Center! This episode features listener questions from around the world about digital identity, trust, technology challenges, inclusion, biometrics, and even a candid discussion on air travel etiquette. Whether you're new to IAM or a veteran, you'll find pr…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
How Adamawa Community Lives In Fear As Flesh-Eating Disease Spreads
29:25
29:25
Play later
Play later
Lists
Like
Liked
29:25In Malabu, Adamawa State, fear and uncertainty define daily life as a strange flesh-eating disease has killed seven people and infected 68 others. While officials suspect Buruli Ulcer, residents bear the pain, stigma, and loss the outbreak has brought. This episode of Nigeria Daily focuses on the victims, their families, and the community living th…
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
Why Nigerian Graduates Are Turning to Menial Jobs To Survive
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16In today’s Nigeria, academic qualifications no longer guarantee a stable livelihood. Many degree holders, and even, allegedly, professors, are turning to menial jobs and petty trading to survive. This episode of Nigeria Daily finds out whether the root of this crisis lies in a failing education system or a struggling economy that no longer rewards …
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
Play later
Play later
Lists
Like
Liked
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading

1
Fubara’s Return: What Awaits Rivers State?
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52Governor Siminalayi Fubara is set to return to Port Harcourt after six months of emergency rule in Rivers State. During his absence, a federal administrator oversaw the state, 23 local government chairmen were sworn in, and the political landscape shifted. Now, as the governor resumes, questions remain: what will he meet on ground, and can he work …
…
continue reading
This episode is sponsored by SGNL. Visit sgnl.ai/idac to learn more. In this sponsored episode of Identity at the Center podcast, hosts Jeff and Jim discuss hot trends in the identity space, focusing on continuous identity with their guest Erik Gustavson, co-founder and CPO at SGNL. Erik shares his journey into the IAM space, exploratory projects, …
…
continue reading

1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading

1
Why New Yam Harvests Aren’t Bringing Prices Down
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34Yam is a staple at the heart of Nigerian diets and culture, yet prices remain stubbornly high even after this year’s harvest. While official figures suggest inflation is easing, many Nigerians say the relief has not reached their market stalls. In this episode of Nigeria Daily, we visit Utako and Kpana markets to hear from yam sellers, buyers, and …
…
continue reading

1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
Do State Governments Have The Power To Regulate Preaching?
30:39
30:39
Play later
Play later
Lists
Like
Liked
30:39Debate over a policy introduced by Niger State Government directing preachers to obtain licenses and submit their sermons for vetting before delivery is getting more intense. Authorities insist the move is to curb hate speech and promote security, but religious groups worry it may infringe on fundamental freedoms. With questions about legality and …
…
continue reading

1
#373 - Going Passkey Phishing with Nishant Kaushik
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45In this episode of the Identity at the Center podcast, Jeff and Jim discuss various aspects of identity access management (IAM) policies and the importance of having a solid foundation. They emphasize the need for automation, controls, and how IAM policies should be created without technology limitations in mind. The discussion also covers the impl…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
How Communities Are Rising To Help Themselves Against Flooding
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49The Federal Government has warned that at least 11 states in Nigeria may face heavy rainfall this week, raising fears of flooding. Communities in Benue, Zamfara, Adamawa, Niger, and Taraba know too well the destruction floods bring, homes lost, farmlands destroyed, and lives cut short. In this episode of Nigeria Daily, we find out what they are doi…
…
continue reading

1
Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More... - SWN #511
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-511
…
continue reading

1
Are AA Genotype People Healthier Than Others?
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54In Nigeria, genotype goes beyond medicine, it shapes relationships, marriage choices, and family planning. While focus often rests on sickle cell patients with the SS genotype, questions remain about whether AA people are truly healthier than AS or SS. Today on Nigeria Daily, we explore these beliefs through the voices of Nigerians and the insights…
…
continue reading
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
…
continue reading

1
Why Nigeria’s Rainy Season Claims Lives Despite Early Warnings
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00Flooding has continued to claim lives and displace families across Nigeria. Despite repeated warnings from the Federal Ministry of Environment about 14 states most at risk, the rains have brought devastation. With casualty figures rising and states issuing evacuation alerts, there are concerns about how prepared Nigeria really is to face this disas…
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading
Suicide rates in Nigeria are a growing concern, with various reports highlighting the need for awareness and prevention efforts. The complexity of this issue demands a multifaceted approach. As we explore the intricacies of suicide, it's essential to understand the perspectives of various stakeholders, including mental health professionals, individ…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
How The NUPENG-Dangote Face-Off Will Affect Nigeria
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45Efforts to reconcile the Nigeria Union of Petroleum and Natural Gas Workers (NUPENG) and the Dangote Group have not produced the desired result. An intervention meeting convened by the Federal Government ended in a stalemate. With the Nigeria Labour Congress (NLC) pledging support for NUPENG, there are concerns about disruptions in the nation’s fue…
…
continue reading

1
#372 - Exploring the Evolution of Identity Management with Darren Rolls
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42In this episode of the Identity at the Center podcast, hosts Jeff and Jim engage in an insightful conversation with Darren Rolls, a veteran in the Identity and Access Management (IAM) field. They discuss the complexities of identity fabrics, the evolving landscape of IAM, the impact of AI, and the challenges of integrating new technologies with leg…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
The Cost Of Education As Schools Are Resuming
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18The new school term in Nigeria has arrived, but many parents are anxious as back-to-school expenses pile up. Beyond tuition, costs for textbooks, uniforms, sandals, and writing materials are becoming increasingly difficult to bear. In this episode of Nigeria Daily, we explore what these rising costs mean for parents, schools, and the future of educ…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
How Gumel In Jigawa Marks Eid-ul-Maulud Differently
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33Eid-ul-Maulud is celebrated across Nigeria with prayers and gatherings, but in Gumel, Jigawa State, it takes on a unique cultural form called Sallar Gani. The festival blends religion with tradition and pageantry, featuring horse displays, district heads, and the Emirate Council. In this episode of Nigeria Daily, we explore what makes Sallar Gani s…
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
Play later
Play later
Lists
Like
Liked
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading