Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
SAP Security Podcasts
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
We recruit and hire SAP talent from the CIO level to team members in virtually every type of SAP/ERP skill set. We will shrink your recruiting cycle and ensure you have premium access to the non-active talent pool. Request a FREE Consultation.
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
From Angel To Exit is a business podcast exploring the entrepreneurial journey of scaling a business from raising your first round of funding to exiting. We cover the trials and tribulations that founders face, the pitfalls and pratfalls you want to avoid, as well as the joy and impact that success can bring. Join us on our next episode, where we speak about the challenges that real leaders face growing and scaling their organizations and how they’ve overcome them to achieve success and make ...
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
State of the CIO features senior IT professionals from leading organizations across America. Talking points on the show include the role of the CIO in business transformation, innovative AI implementation, and consumer engagement as a path to growth. Tune in every week to hear insights from the leading lights of enterprise Information Technology.
…
continue reading
The HR Famous Podcast is a lively conversation dealing with the real-life craziness HR pros deal with every day! Think of this as your own HR therapy session - sharing stories, strategies, and sometimes simply venting about a career we love, but one that makes us scream at the same time. This pod is a safe place of conversation, laughs, arguments, and hope. So, grab a cup of coffee or a glass a wine and sit back and enjoy the real-world HR talk with a few of your peers.
…
continue reading
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
…
continue reading
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading

1
How to Enhance Business Ownership of SAP Access Risk
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. One of the biggest challenges in managing SAP access risk is getting the business to take ownership. In this episode, we explore: Why business users often don’t engage with access risk The role of process design and education How techn…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
21: Facing a Runway Crisis? How Employee Deferrals Secured Roy Vella a Successful Acquisition
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58What do you do when the dot-com bust kills your $15M funding round just two weeks before closing? In this episode, Bruce Eckfeldt speaks with Roy Vella, co-founder of NetAbacus (later Rivio), who faced a sudden capital crisis in 2000. Instead of folding, he created an employee salary deferral program that extended runway and impressed potential buy…
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
20: Struggling to Scale Your Expertise? How Thomas Michael Turned SAP Training into a 7-Figure SaaS Exit
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48What happens after you sell your company for millions and walk away with no earnout? In this episode, Bruce Eckfeldt sits down with Thomas Michael, a former SAP consultant turned founder who scaled an online training company and exited with a clean deal. Thomas shares how he transformed his business into a subscription model, prepared for acquisiti…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
Security Metrics, Detection & Response & Paintball with Erik Bloch
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15🔐 Erik Bloch on his path from military hacker to Illumio security leader. Eden Naftali and Amitai sat down with Erik Bloch & here's what they covered 👇 How starting in the military shaped Erik's approach to security Building and scaling cloud detection & response teams Converting security metrics into actionable business KPIs…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
19: Managing Mid-Performer Assets: A Tactic for Founders Facing M&A Stagnation
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11Frank Williamson, CEO of Oaklyn Consulting, joins Bruce Eckfeldt to explore what happens when a business stagnates—performing decently, but not meeting growth or exit expectations. He shares real-world insights on managing misaligned cap tables, preparing for strategic exits, and dealing with investor pressure. Frank offers clear tactics to transfo…
…
continue reading

1
Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More... - SWN #503
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-503
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
18: From Near Bankruptcy to 10X Exit: How Sam Arman Mastered the Art of Selling Businesses
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52In this episode of From Angel to Exit, serial entrepreneur Sam Arman shares how he built and sold multiple companies—sometimes under pressure, sometimes for massive wins. From his first computer assembly business disrupted by Dell to a 10X private equity-backed exit during COVID, Sam reveals the emotional and strategic pitfalls founders face in M&A…
…
continue reading

1
Coldplay, CHROs & Crisis Comms: A Masterclass with Dinah Alobeid
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07In this episode of the HR Famous Podcast, Tim Sackett welcomes communications pro Dinah Alobeid for a brutally honest, wildly entertaining conversation about corporate comms, brand moments, and the power of good storytelling in HR tech. Dinah, now Head of Communications at Visier and formerly with Greenhouse, joins Tim for a laugh-filled yet though…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Richard Bird, Nick Mistry - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Nick Mistry, Richard Bird - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Richard Bird, Nick Mistry - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading

1
Big Tech Buys Little Tech: Will SAP Ruin SmartRecruiters?
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this solo summer edition of the HR Famous Podcast, host Tim Sackett unpacks one of the biggest HR tech acquisitions of the year: SAP SuccessFactors acquiring SmartRecruiters. Tim gives his unfiltered, insider take on why this move matters, how it stacks up against Workday and Oracle, and whether SAP will actually leverage the cutting-edge, AI-dr…
…
continue reading

1
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading