Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
Enterprise Mobile Weekly Podcasts
Each week, join Roger Entner and the Recon Analytics team for an analysts perspective on the world of telecom.
…
  continue reading
Bangalore International Centre (BIC) is a non profit, public institution which serves as an inclusive platform for informed conversations, arts and culture. BIC TALKS aims to be a regular bi-weekly podcast that will foster discussions, dialogue, ideas, cultural enterprise and more.
…
  continue reading
In each episode I talk about a mobile topic that is of interest to enterprises of all sizes. I cover devices (smartphones, tablets, wearables), software, design, development, security, infrastructure and strategy. Show is hosted by @maneshlad, Manesh Lad is a seasoned IT professional with expertise in development, architecture, training, project management with a focus on enterprise mobility.
…
  continue reading
Hosted by Vishal Prasad, this is your daily dose of strategic clarity across HOPE - Humans, Operations, Products, and Engineering; delivered to you by the time your barista gets your coffee. One theme per week. Seven crisp episodes. And actionable strategic insights backed by research. No videos. No reels. Just pure podcast made for your walks, commute, breaks, or wind-down. Designed for CXOs, founders, and bold leaders who prefer momentum over meditation. TL;DR: Enterprise Strategies for Le ...
…
  continue reading
Freshly squeezed ideas to make your organization successful on its enterprise mobility journey. New episodes are posted every week covering a variety of topics related to mobility in the enterprise -- subscribe to make sure you don't miss an episode! This podcast is produced by Apperian, the mobile app management company.
…
  continue reading
Hosts Ike DeLorenzo and Justin Megahan cover the technology, drama, and corporate positioning of the mobile industry -- and the ongoing state of enterprise and consumer mobility.
…
  continue reading
SMACtalk hosted by Brian Fanzo and Daniel Newman is a weekly live podcast where the hosts discuss a wide range of topics ranging from technology, digital transformation and future of work. The show is often recorded live at enterprise technology events and includes thought leaders in social media, mobility, analytics and cloud.
…
  continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
  continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
  continue reading
Why Digital Nibbles? We’re providing listeners with bites (or is that bytes?) of technology info. We’ll be diving into cloud computing and data center topics our audience is curious about like big data, dev ops, mobile enterprise apps, and storage. We're live every other week - join us at our Website to ask questions and participate in the discussion!
…
  continue reading
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what's happening in the tech space — from startups to industry leaders, emerging tech, and what's ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into  ...
…
  continue reading

1
Social Media Zoom Factor with Pam Moore | Social Media Marketing | Branding |Business | Entrepreneur | Small Business | Digital Marketing | Content Marketing | Marketing | Influencer
Pam Moore Forbes Top 10 Social Media Influencer, CEO Marketing Nutz, Social
SocialZoomFactor is a podcast created for you, the business and marketing leader in startups to enterprise organizations. If you want to learn how to integrate social media, content marketing, experiential branding, digital marketing and the latest technology to zoom results in business and life you won't be disappointed in the energy and information Pam Moore delivers 5 days a week. Each episode brings you actionable tactics and strategies you can implement today for real business results.  ...
…
  continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
  continue reading

1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading

1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
  continue reading

1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
  continue reading

1
This Week: Q3 '25 Earnings - Breaking Down AT&T and T-Mobile’s Results
16:43
16:43
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
16:43Analysts Don Kellogg and Roger Entner break down Q3 earnings for AT&T and T-Mobile, exploring strengths, weaknesses, and what the numbers reveal about their future as industry leaders. 00:00 Episode intro 00:25 AT&T Q3 overview 02:59 Convergence as a key strategy 04:35 T-Mobile Q3 overview 05:27 Price increases and free lines 07:35 AT&T CapEx and r…
…
  continue reading
Are we teaching children what to think, or how to think? When our children focus on rote learning and exam-based academic progress, how do we nurture the inventive Indian who can fuel the imagination of the world with creativity, critical thinking and problem-solving? What if classrooms became labs of imagination, not factories of repetition? These…
…
  continue reading

1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
  continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
  continue reading

1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
  continue reading

1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
…
  continue reading

1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
  continue reading

1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
  continue reading

1
388. The Indo-Pacific Outlook: An Australian Perspective
54:42
54:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:42As global power dynamics continue to shift, the Indo-Pacific sits at the heart of a rapidly evolving strategic and economic landscape. In this timely and wide-ranging session, Peter Varghese, former Australian Foreign Secretary and High Commissioner to India, offers a perspective shaped by decades of diplomacy and deep engagement with the region. H…
…
  continue reading

1
This Week: Change is Afoot- All About Verizon's New CEO Dan Schulman
12:26
12:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:26Analysts Don Kellogg and Roger Entner discuss Verizon’s appointment of Dan Schulman as its new CEO, exploring what his leadership could mean for both the company and its competition. 00:00 Episode intro 00:39 Dan Schulman as new Verizon CEO 03:16 Schulman's experience aligns with Verizon's strengths 06:44 Pricing and customer service predictions 08…
…
  continue reading

1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
  continue reading

1
AI, EDR, and Hacking Things - PSW #896
2:04:54
2:04:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:04:54First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
…
  continue reading

1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
  continue reading

1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
  continue reading

1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
  continue reading

1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
  continue reading

1
This Week: ZTE’s Analyst Summit - AI, 6G, and Global Network Innovation
14:34
14:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
14:34Analysts Don Kellogg and Daryl Schoolar discuss the recent ZTE Global Summit & User Congress, including insights on the practical use of AI, 6G development, and global network standardization. 00:00 Episode intro 00:27 ZTE event overview 01:40 Current and future AI network applications 05:44 How much AI is too much? 06:13 The state of the internati…
…
  continue reading

1
387. Partition: Memory, Responsibility & Voice
1:07:27
1:07:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:07:27How do we honour truths without exploitation or erasure? This panel discussion will explore how the chapter of Partition is remembered, who holds the responsibility of preserving its stories, and what it means to give them an honest voice. Through literature, oral testimony, archives, or immersive media, each speaker has engaged with histories mark…
…
  continue reading

1
Ballistic Hot Dogs, Clayrat, Twonet, Lockbit, Resumes, Discord, Aaran Leyland and... - SWN #519
31:50
31:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
31:50Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
…
  continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
  continue reading
Scholars of international relations, political thought, and India's diplomatic history continue to debate the meaning and relevance of non-alignment in India's foreign policy today. The origins of these debates lie in Jawaharlal Nehru's articulation of non-alignment at the height of the Cold War, a concept both resolute and ambiguous. In this talk,…
…
  continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
  continue reading

1
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
28:47
28:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:47
…
  continue reading

1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:52
…
  continue reading

1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
  continue reading

1
This Week: Honoring Pioneers at the 2025 Wireless Hall of Fame Induction
7:52
7:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:52Analysts Don Kellogg and Jake Hawkridge discuss the recent Wireless Hall of Fame Induction Ceremony, highlighting the five new inductees, their career milestones, and how the industry has evolved. 00:00 Episode intro 00:26 Ceremony overview 01:22 The 2025 inductees 01:49 Ken Horowitz's career highlights 02:17 Jesse Russell's career highlights 03:09…
…
  continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-517
…
  continue reading
Journalism. Politics. Justice. One fateful evening in 2017, journalist Gauri Lankesh was shot outside her Bangalore home. Her death sent shockwaves across the country. But the story didn't end there. This evening with journalist and author Rollo Romig, as he explores in his powerful new book, I Am on the Hit List, offers new insights into the life …
…
  continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
  continue reading

1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
  continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-516
…
  continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
  continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
  continue reading
Mumbai in the seventies and eighties was a city of sharp contrasts: glamour and gang wars, chaos and control. At the heart of it all was Assistant Commissioner of Police (Retd) Madhukar B. Zende, a sharp-minded officer with a knack for catching the city's most elusive criminals. Best known for arresting the infamous serial killer Charles Sobhraj, a…
…
  continue reading

1
This Week: T-Mobile’s New CEO Srini Gopalan and What to Expect Next
8:07
8:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:07Analysts Don Kellogg and Roger Entner discuss the upcoming appointment of Srini Gopalan as CEO of T-Mobile and what it means for the future of the company. 00:00 Episode intro 00:24 Srini Gopalan's background in telecom 01:48 What company aspects might benefit? 02:53 The evolution of T-Mobile's leadership 03:55 T-Mobile's fiber strategy poses chall…
…
  continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
  continue reading

1
Episode #73 - The Invisible Work Reset (Weekly Wrap-up)
4:50
4:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
4:50We close this week with a practical, evidence-backed reset for your calendar: the L.E.D.G.E.R. Reset. In 15–20 minutes you’ll label where your time really goes, check equity on non-promotable work, tighten decision hygiene, add guardrails for collaboration, pulse psychological safety and leader inclusiveness, and re-allocate/recognise hidden load. …
…
  continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
  continue reading

1
Episode #72 - Invisible Work - What Counts, and What Should Stop
4:59
4:59
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
4:59In this episode, we separate the signal from noise in the unseen side of leadership. You’ll hear what counts and what should stop when it comes to invisible work. With clear rules you can codify today, scale what actually moves clarity, quality, and speed. References: 1) 2017 Letter to Shareholders: https://www.aboutamazon.com/news/company-news/201…
…
  continue reading
In this episode, we unpack how culture becomes a force-multiplier for your systems: why teams with psychological safety learn faster and perform better, how leaders actually shape culture through Schein’s “embedding mechanisms” (what you fund, schedule, reward), and what Netflix’s “freedom & responsibility” shows about rituals that make candor trav…
…
  continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
  continue reading

1
Episode #70 - Leverage: Designing Systems So Invisible Work Doesn’t Eat Your Week
3:47
3:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:47In this episode, we break down how leaders can reclaim their week from the invisible drag of coordination and decision churn by building leverage into their systems. From Amazon’s narrative memos that sharpen debate, to Bain’s RAPID framework that cuts decision ping-pong, to research on meeting-free days that protect deep work, you’ll learn three e…
…
  continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
  continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
  continue reading
 
 
 
