Security Weekly Podcast Network (Audio)-Logo

Wissenschaft & Technik

Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!

Jetzt anhören
  • im Online-Player
  • im phonostar-Player
  • Was ist das?
    Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X

Folgen von Security Weekly Podcast Network (Audio)

999 Folgen
  • Folge vom 30.08.2022
    BSW #275 - Brad Thies
    In this segment, BARR Advisory founder and president Brad Thies will use real-world examples to discuss how cybersecurity scorecards and KPIs can help organizations measure and manage the effectiveness of their cybersecurity programs. Thies will also reveal which metrics he sees as most valuable in evaluating cybersecurity posture and discuss how to define accountability for security within an organization. This segment is sponsored by BARR Advisory. Visit https://securityweekly.com/barradvisory to learn more about them!   In the leadership and communications section, 7 Uniquely Personal Bits of Wisdom To Improve Your Leadership, 4 key areas cybersecurity leaders should focus on, Cybersecurity spending strategies in uncertain economic times, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw275
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 26.08.2022
    SWN #235 - Toxic Tats, Deep-Fakery, MagicWeb, Sliver, Twilio, OSPFv3, & Mudge – Wrap Up
    In this edition of the Security Weekly News, Dr. Doug discusses: Toxic Tats, Fakery, MagicWeb, Sliver, Twilio, OSPFv3, Mudge, X-Platform Ransomware as well as all the show Wrap Ups from this week!   Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/swn235
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 26.08.2022
    ESW #286 - Ragnar Sigurdsson, Roey Yaacovi
    The new category of Data Security Posture Management, what is it and why it's important. Discussing real customer stories where DSPM products played a critical role in helping companies secure their data.   Since the dawn of the internet, companies have been fighting cyber vulnerabilities with a myriad of traditional technologies. And assigning cybersecurity training to people without really knowing its effectiveness or being able to tell the difference between knowledge and behavior. This is why AwareGO created the Human Risk Assessment. Designed by behavioral and cybersecurity experts, it allows organizations to measure human risk and resilience across a number of critical cybersecurity threat vectors. It measures cyber risks connected to social media that are not only personal but can affect the workplace as well. It helps assess awareness of secure password handling with multiple interactive experiences and situations. And it allows you to discover how employees would deal with tricky situations around the workplace, such as tailgating and shouldersurfing …. and issues related to remote work. All in a safe and friendly environment. After completing the assessment employees get individualized results with an explanation of what they did right and what they could have done better. This offers guidance and a chance to learn. The overall results help organizations gather actionable insights and make informed decisions about their security strategy. The Human Risk Assessment works as a stand alone product but its flexibility allows integration into existing platforms. When combined with AwareGO’s live action training content it can bring your organization’s cyber resilience to the next level. Segment Resources: https://awarego.com/human-risk-assessment/ https://www.securityweekly.com/awaregoresource https://awarego.com/how-to-measure-human-cyber-risk-finally/ https://awarego.com/materials/the-human-side-of-cybersecurity/ This segment is sponsored by AwareGO. Visit https://securityweekly.com/awarego to learn more about them!   In the Enterprise Security News: We discuss Twitterpocalypse 2022! The Biggest Winner? Security startup Wiz reaches $100M ARR in 18 months??? Tons of funding we probably won’t get to, sorry in advance, we’ve got 2 weeks of news to catch up on! Awesome free tools, free training and DIY tips! Third party attacks and supply chain attacks continue to ramp up, John Deere’s security deficiencies get exposed again, Cyber insurers reduce coverage… again, ESPN8 the Ocho, explained, and more, on this episode of Enterprise Security Weekly!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw286
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 25.08.2022
    PSW #753 - Davi Ottenheimer, Daniel Niefeld, Zachary Stashis
    There's a lot of worry about "fakes" especially in a world rapidly adopting AI/ML, so it's time for solutions. "Solid" is the W3C open standard, extending HTTPS, to upgrade the Web with security paradigms that solve for data integrity. Distributed systems naturally break through digital moats, free control through proper ownership, thus helping expand and achieve the best of the Internet. Segment Resources: https://solidproject.org/ https://github.com/inrupt https://www.flyingpenguin.com/?p=29523 https://alltechishuman.org/davi-ottenheimer https://www.schneier.com/blog/archives/2020/02/inrupt_tim_bern.html https://events.inrupt.com/dublin   This week in the Security News: Crypto Miners Using Tox P2P Messenger as Command and Control Server, 8-year-old Linux Kernel flaw DirtyCred is nasty as Dirty Pipe, & Janet Jackson music video given CVE for crashing laptops, & more! Segment Resources: Use code "securityweekly" to save 10% off Hack Red Con tickets at https://www.hackredcon.com/   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/psw753
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X