PodcastsActualitésSecurity Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

Security Weekly Productions
Security Weekly Podcast Network (Video)
Dernier épisode

4748 épisodes

  • Security Weekly Podcast Network (Video)

    Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432

    28/1/2026 | 1 h 3 min
    The top social engineering attacks involve manipulating human psychology to gain access to sensitive information or systems. The most prevalent methods include various forms of phishing, pretexting, and baiting, which are often used as initial entry points for more complex attacks like business email compromise (BEC) and ransomware deployment. How do you control what users click on?
    Even with integrated email solutions, like Microsoft 365, you can't control what they click on. They see a convincing email, are in a rush, or are simply distracted. Next thing you know, they enter their credentials, approve the MFA prompt—and just like that, the cybercriminals get in with full access to users' accounts. Is there anyway to stop this?
    Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss how ThreatLocker Cloud Control leverages built-in intelligence to assess whether a connection from a protected device originates from a trusted network. By only allowing users from IP addresses and networks deemed trusted by ThreatLocker to get in—phishing and token theft attacks are rendered useless. So, no matter how successful cybercriminals are with their phishing attacks and token thefts—all their efforts are useless now.
    This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
    In the leadership and communications segment, Finance and security leaders are at odds over cyber priorities, and it's harming enterprises, The Importance of Strong Leadership in IT and Cybersecurity Teams, How CIOs [and CISOs] can retain talent as pay growth slows, and more!
    Show Notes: https://securityweekly.com/bsw-432
  • Security Weekly Podcast Network (Video)

    Doombuds, Office, Telnetd, Chrome, Vishing, Ralph, PeckBirdy, The Boss, Aaran Leyland - SWN #550

    27/1/2026 | 39 min
    Doombuds, Office 1.0, Telnetd, Chrome, Vishing, Cursed Ralph, PeckBirdy, The Boss, Aaran Leyland, and More on the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-550
  • Security Weekly Podcast Network (Video)

    Building proactive defenses that reflect the true nature of modern software risk - Paul Davis - ASW #367

    27/1/2026 | 1 h 13 min
    Supply chain security remains one of the biggest time sinks for appsec teams and developers, even making it onto the latest iteration of the OWASP Top 10 list. Paul Davis joins us to talk about strategies to proactively defend your environment from the different types of attacks that target supply chains and package dependencies. We also discuss how to gain some of the time back by being smarter about how to manage packages and even where the responsibility for managing the security of packages should be.
    Show Notes: https://securityweekly.com/asw-367
  • Security Weekly Podcast Network (Video)

    The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443

    26/1/2026 | 1 h 35 min
    Segment 1: Interview with Thyaga Vasudevan
    Hybrid by Design: Zero Trust, AI, and the Future of Data Control
    AI is reshaping how work gets done, accelerating decision-making and introducing new ways for data to be created, accessed, and shared. As a result, organizations must evolve Zero Trust beyond an access-only model into an inline data governance approach that continuously protects sensitive information wherever it moves. Securing access alone is no longer enough in an AI-driven world.
    In this episode, we'll unpack why real-time visibility and control over data usage are now essential for safe AI adoption, accurate outcomes, and regulatory compliance. From preventing data leakage to governing how data is used by AI systems, security teams need controls that operate in the moment - across cloud, browser, SaaS, and on-prem environments - without slowing the business.
    We'll also explore how growing data sovereignty and regulatory pressures are driving renewed interest in hybrid architectures. By combining cloud agility with local control, organizations can keep sensitive data protected, governed, and compliant, regardless of where it resides or how AI is applied.
    This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighsecurity to learn more about them!
    Segment 2: Why detection fails
    Caleb Sima put together a nice roundup of the issues around detection engineering struggles that I thought worth discussing. Amélie Koran also shared some interesting thoughts and experiences.
    Segment 3: Weekly Enterprise News
    Finally, in the enterprise security news,
    Fundings and acquisitions are going strong
    can cyber insurance be profitable?
    some new free tools shared by the community
    RSAC gets a new CEO
    Large-scale enterprise AI initiatives aren't going well
    LLM impacts on exploit development
    AI vulnerabilities
    global risk reports
    floppies are still used daily, but not for long?
    All that and more, on this episode of Enterprise Security Weekly.
    Show Notes: https://securityweekly.com/esw-443
  • Security Weekly Podcast Network (Video)

    AI Cage Match, Fortinet, Cisco, DVWA, Polonium, Small Town AIs, LastPass, Josh Marpet - SWN #549

    23/1/2026 | 30 min
    AI Cage Match, Fortinet, Cisco, DVWA, Polonium, Small Town AIs, LastPass, Josh Marpet, and More on this episode of the Security Weekly News.
    Show Notes: https://securityweekly.com/swn-549

Plus de podcasts Actualités

À propos de Security Weekly Podcast Network (Video)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Site web du podcast

Écoutez Security Weekly Podcast Network (Video), HugoDécrypte - Actus et interviews ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités

Security Weekly Podcast Network (Video): Podcasts du groupe

Applications
Réseaux sociaux
v8.3.1 | © 2007-2026 radio.de GmbH
Generated: 1/28/2026 - 7:14:21 PM