PodcastsActualitésSecurity Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

Security Weekly Productions
Security Weekly Podcast Network (Video)
Dernier épisode

4800 épisodes

  • Security Weekly Podcast Network (Video)

    Developing the Skills Needed for Modern Software Development - Keith Hoodlet, Ron Rasin, Shashwat Sehgal - ASW #376

    31/03/2026 | 1 h 15 min
    The future of secure software is going through a mix of skills expected of humans and skills files created for LLMs. We might even posit that appsec as a discipline will fade (and that might not even be a bad thing!). Keith Hoodlet describes the skills he was looking for in building teams of security researchers and why there's still an emphasis on the ability to learn about and understand how software is built.
    But figuring out what skills will get you hired and what skills are valuable to invest in still feels daunting to new grads and others entering the security industry. We discuss where the role of appsec seems to be heading and a few of the security and software fundamentals that can help you follow that direction.
    Segment resources
    https://bsidessf2026.sched.com/event/2E1h4/we-pwn-the-night-growing-leading-an-31337-security-research-team?iframe=yes&w=100%&sidebar=yes&bg=no
    https://drive.google.com/file/d/1_zLH8vuHU1XOjEyk85WecQwSByDwxAmQ/view?pli=1
    https://securing.dev/posts/if-i-were-eighteen-again/
    https://research.nvidia.com/labs/lpr/slm-agents/
    Then, we rebroadcast two interviews from RSAC 2026.
    The Identity Crisis of Agentic AI
    Identity security is being stretched between legacy infrastructure that was never built to be secure and rapidly emerging AI agents and non-human identities that organizations are quickly adopting. As AI accelerates, identity risk grows alongside it, making agentic security fundamentally an identity challenge—because the more access AI has, the greater both its power and potential risk. In this session, Ron Rasin explores how past gaps in areas like Active Directory and machine identities created today's blind spots, and why identity must now act as the control plane for AI-driven enterprises, with real-time enforcement before access is granted. He also highlights new innovations and partnerships enabling embedded identity controls across human, non-human, and AI identities, emphasizing that at machine speed, reactive security is no longer enough.
    To learn more about Silverfort and their AI Agent product, visit https://securityweekly.com/silverfortrsac.
    Privileged by Design: AI Agents and the New Identity Risk to Production Systems
    At RSAC this year, the AI conversation is getting more practical. Less "look what agents can do" and more "who's actually in control when an autonomous system can take real actions across business apps and infrastructure."
    The Moltbook breach and the growing attention on OpenClaw-style agent vulnerabilities put real weight behind that question because they show how quickly agent ecosystems can scale past oversight.
    Today we're talking with Shashwath, CEO of P0 Security, about why identity and authorization are the quiet enablers of modern AI, where teams are losing control as non-human identities explode and what security leaders can do to keep innovation moving without turning access sprawl into enterprise risk.
    To learn more about P0 Security, visit: https://securityweekly.com/p0rsac.
    Show Notes: https://securityweekly.com/asw-376
  • Security Weekly Podcast Network (Video)

    Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - Lenny Zeltser, Helen Patton, Alexandre Sieira - ESW #452

    30/03/2026 | 1 h 49 min
    Interview with Helen Patton about her new book, Switching to Cyber
    Helen joins us to discuss her second book, "Switching to Cyber." Her first book discussed strategies for handling various stages of the cybersecurity career, while this one, co-written with Josiah Dykstra, provides a guide for switching to cyber mid-career.
    Check out her book, Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career:
    on Amazon
    on Barnes & Noble
    and on the publisher's website
    Interview with Lenny Zeltzer: Reflections on Being a CISO
    After a cybersecurity career in various roles, doing everything from product management to malware analysis training, Lenny spent 6 years in the CISO seat at Axonius, from near the inception of the company through its growth from its modest Series A stage in 2019 to the present, with nearly a billion in funding today.
    Lenny's CISO Essays:
    What Being a CISO Taught Me About Security Leadership
    As a CISO, Are You a Builder, Fixer, or Scale Operator?
    The Chief Insecurity Officer
    Interview with Alexandre Sieira: The state of TPCRM is shifting
    The gold standard for third party cyber risk management has long been the humble questionnaire. While we've seen security rating services companies generate scores by scanning a company's external resources. Both approaches are widely considered inaccurate for either creating trust relationships or determining the true risk of doing business with a third party.
    Every analysis of this problem comes to the same conclusion: without internal data about the state of systems and the security program, TPCRM can't improve substantially. Most this believe this to be an impossible problem: third parties would never share data this sensitive with a customer and first parties assume the same.
    What if they did?
    That's exactly the premise behind Tenchi Security, and Alexandre joins us to talk about how they've accomplished the 'impossible' in Brazil and aim to expand their success to the US.
    Resources:
    Thoughts from a panel discussion at a recent FS-ISAC event, shared on LinkedIn
    Predicts 2026: Third-Party Cybersecurity Risk Management Evolves for the AI Era (Gartner Subscribers only, sorry)
    Show Notes: https://securityweekly.com/esw-452
  • Security Weekly Podcast Network (Video)

    Scam Baiting, AI, and the New Grift Economy, Part 2 - Rinoa Poison - SWN #567

    27/03/2026 | 34 min
    In this two-part interview, Rinoa Poison explores the mechanics of modern scams, the role of AI in making them more convincing, and the growing world of scam baiting. She also discusses the tactics, technical setups, and safety considerations behind wasting scammers' time.
    Show Notes: https://securityweekly.com/swn-567
  • Security Weekly Podcast Network (Video)

    Scanning The Internet with Linux Tools - PSW #919

    26/03/2026 | 1 h 3 min
    In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include:
    Shodan | Passive recon — query existing scan data for exposed devices, services, and vulns | Passive (API) | Instant (no packets sent)
    ZMap | Host discovery — find live hosts with open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets/sec
    ZGrab2 | Application-layer handshakes — grab banners, certs, headers | L7 (30+ protocol modules) | Thousands of hosts/sec
    Nerva | Service fingerprinting — identify 140+ protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP, SCTP) | Fast, concurrent
    Nuclei | Template-based vulnerability scanning — default creds, exposed panels, known CVEs | L7 (HTTP, network) | Hundreds of targets/min
    Shannon | Vulnerability exploitation — AI-powered whitebox pentesting of web apps | Application | ~1-1.5 hrs per target
    edgescan.py | Automated pipeline — orchestrates all tools above into a single command | Orchestration | End-to-end
    Show Notes: https://securityweekly.com/psw-919
  • Security Weekly Podcast Network (Video)

    Say Easy, Do Hard - Crypto-Agility - BSW #440

    25/03/2026 | 52 min
    With Q-day getting closer, regulatory guidance pushing firms to migrate to quantum security in the next five years, and an extensive remediation backlog waiting to be discovered, security leaders must start their quantum security migration today. Easier said than done. In this Say Easy, Do Hard segment, we discuss the quantum-safe journey using a framework for crypto-agility.
    In part 1, we define cryptographic agility, or crypto-agility for short, and why it's important. Crypto-agility is not just about transitioning to quantum-safe cryptography in the nimblest way possible, and it's not something that can be achieved merely by updating encryption algorithms and protocols. Instead, you need to adapt your organization's cryptographic architecture, automation, and governance to allow for greater control and flexibility.
    In part 2, we discuss a framework for discovery, prioritization, and remediation while keeping crypto-agility in mind. A quantum-safe journey requires:
    Inventory of Systems With Non-Quantum-Safe Algorithms And Protocols
    System Prioritization, Leading To A Migration Roadmap
    Remediation, Including Vendors And Partners
    Once a distant possibility, Q-Day is quickly approaching. Are you ready for 2030?
    Segment Resources:
    https://pqcc.org/wp-content/uploads/2025/05/PQC-Migration-Roadmap-PQCC-2.pdf
    https://pqcc.org/wp-content/uploads/2025/06/PQCC-Inventory-Workbook.xlsx
    https://qramm.org/learn/cryptoscan-guide.html
    https://research.ibm.com/blog/quantum-safe-cbomkit
    Show Notes: https://securityweekly.com/bsw-440

Plus de podcasts Actualités

À propos de Security Weekly Podcast Network (Video)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Site web du podcast

Écoutez Security Weekly Podcast Network (Video), LEGEND ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités

Security Weekly Podcast Network (Video): Podcasts du groupe

Applications
Réseaux sociaux
v8.8.5| © 2007-2026 radio.de GmbH
Generated: 3/31/2026 - 11:56:34 AM