Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
Weekly market commentary by Hedge Fund Manager Erik Townsend and interviews with the brightest minds in the world of finance and macroeconomics. Made possible by funding from Fourth Turning Capital Management, LLC
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A look at issues affecting the bank and insurance securities community
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Investment Insights is the podcast channel for BNP Paribas Asset Management and features in-depth commentary on the topics that really matter to investors. Each week, Daniel Morris, Chief Market Strategist at BNP Paribas Asset Management, joins our investment experts to analyse the market through the lens of sustainability. Alongside our weekly analysis, we'll also be releasing the Uncapped Impact Series, about impact investing, every few weeks. For more insights, visit Viewpoint: https://vi ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
The Plant is a podcast that discusses industrial automation technologies. Co-hosted by Bryan Harned and Tom Jordan from Rockwell Automation.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading

1
Mission-Critical Partnerships in Protest Preparedness and Schools
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Security benefits can come from unexpected sources, especially in community-centric organizations like schools and colleges. Melinda Heikkinen from Saint Louis University (SLU) explains how the college’s history of open dialogue and philosophy of meeting peace with peace helped it weather a wave of mass protests on campus. Then, Jason Stoddard with…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
Episode 449 - CISO applying and securing an enterprise-ready trust management platform
21:10
21:10
Play later
Play later
Lists
Like
Liked
21:10Vanta is the first ever enterprise-ready trust management platform – one place to automate compliance workflows, centralize and scale your security program, and build and manage trust with customers and partners. We speak with Jadee Hanson, Chief Information Security Officer (CISO) for Vanta. Security is at the heart of what Vanta does —helping cus…
…
continue reading

1
Episode 11: Encrypted Messaging, Data Breaches, and Vulnerability Management
1:30:02
1:30:02
Play later
Play later
Lists
Like
Liked
1:30:02Episode 11 of the Distilled Security Podcast is here! Join us as we cover: Signal, Encrypted Messaging, and Corporate Policy: A deep dive into the use of Signal in sensitive discussions—including a political mishap—and the implications for corporate communication policies, discovery, and compliance. Oracle Cloud Breach Allegations: Evaluating breac…
…
continue reading

1
Policies & Procedures for SAP Access Risk Management
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this episode we engage in insightful conversation on why Policies and Procedures are more than just compliance checkboxes - they’re business enablers. Whether you’re starting from scratch or updating existing Policies and Procedures…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
From Compliance to SBOMs: Josh Bressers’ Take on Security
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47In this episode, Raj Krishnamurthy sits down with Josh Bressers, VP of Security at Anchore and longtime leader in the open source security space. With decades of experience, Josh brings a candid and compelling perspective on everything from the chaos of early cybersecurity days to the nuanced challenges of SBOMs and compliance in today’s world. Jos…
…
continue reading

1
MacroVoices #478 Luke Gromen: Trump Tariff Policy Will Drive Gold Even Higher
1:13:28
1:13:28
Play later
Play later
Lists
Like
Liked
1:13:28MacroVoices Erik Townsend & Patrick Ceresna welcome, Luke Gromen. They’ll discuss the market’s Trump Tariff Tantrum, as Luke makes the bold case that President Trump could realistically raise enough tariff revenue to exempt the bottom 90% from federal income tax. https://bit.ly/3EOiD7t 🔻Download Big Picture Trading Chartbook 📈📉: https://bit.ly/4iEG…
…
continue reading

1
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
…
continue reading

1
S17 E02 (VIDEO) Is Your Job Safe From AI?
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
…
continue reading

1
How Much Should Salespeople Know About Their Product?
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet. In this episode: Aligning incentives T…
…
continue reading
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
…
continue reading

1
teissTalk: DORA - A new law for a new dawn
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04In this episode of the Security Repo Podcast, Ailin Castellucci shares her inspiring journey from selling shoes to building cybersecurity teams and leading human-centric education projects. She discusses the unique challenges and perspectives of cybersecurity education in Argentina, emphasizing the importance of empathy, communication, and passion …
…
continue reading
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
…
continue reading

1
ISC West Exclusive: AI and the Monitoring Center with Actuate CEO Ken Francis
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Live from the show floor at ISC West 2025, Security Business Editor-in-Chief Paul Rothman meets with Actuate CEO Ken Francis to discuss the impact of AI on monitoring centers and their employees, technology integrations, and Actuate’s mission. Actuate, an AI surveillance software company founded in 2018, aims to transform security guard operations …
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Talking Heads – Curious about private equity?
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Damien Fournier and Lionel Gomez, Co-Heads of Private Equity, discuss the benefits and risks of private equity, as well segments such as venture capital and distressed investments, with Daniel Morris, Chief Market Strategist. They highlight the agility private equity brings in the current market and economic environment and discuss the opportunitie…
…
continue reading

1
Embracing Change in Corporate Security: Strategies for Modernization with Ryan Schonfeld of HiveWatch
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52On this episode of the Ontic Connected Intelligence Podcast, Ryan Schoenfeld explores his transition from law enforcement to founding Hivewatch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from public…
…
continue reading

1
Modern Work in 2025 with Karoliina Kettukari
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading
The views and opinions of the speaker do not represent the views and opinions of the FDIC. From ISACA Middle Tennessee Conference March 2025. Linda Finck was hired by the FDIC in December 1989 and currently serves as a Senior IT Examiner in the FDIC Dallas Region. She has: - 30+ years experience in the financial services industry (working for a nat…
…
continue reading
David Kim (DK) is a trusted advisor as an AI, GRC, cybersecurity, and PCI DSS consultant and currently sits on Technical Advisory Boards, Governance Boards. He has centered his entire career around IT topics such as telecommunications, data networking, VoIP, unified communications, network management, information systems security, regulatory compli…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
S34 Ep1: Threat Horizon 2027: Grasping for Control
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
…
continue reading

1
The reason for Zoom's outage is crazy, huge funding amounts before RSA - ESW #404
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37In this week's enterprise security news, Lots of funding announcements as we approach RSA New products The M-Trends also rudely dropped their report the same day as Verizon Supply chain threats Windows Recall is making another attempt MCP server challenges Non-human identities A startup post mortem Remember that Zoom outage a week or two ago? The c…
…
continue reading

1
Energy Rate Hikes and Procurement with Dispatch Energy’s Richard Dovere
13:15
13:15
Play later
Play later
Lists
Like
Liked
13:15Commercial real estate owners are experiencing a moment of truth with energy procurement. Energy rate hikes are in the double digits in some areas. Learn what’s causing this—and what we can do about the problem.By Endeavor Business Media
…
continue reading

1
OMB preaches patience, flexibility as acquisition reforms take off
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10Kevin Rhodes, a senior advisor at OMB, says the team rewriting the Federal Acquisition Regulation will be transparent and consider all comments as they slim down the 2,000 page document. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.…
…
continue reading

1
Reviewing the Verizon 2025 Data Breach Investigations Report - ESW #404
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR. You can grab your own copy of the report at https://verizon.com/dbir Show Notes: https://securityweekly.com/esw-404
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
From Peacetime to Wartime: Is Your Cloud Secure?
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
…
continue reading