Security Weekly Podcast Network (Audio)-Logo

Wissenschaft & Technik

Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!

Jetzt anhören
  • im Online-Player
  • im phonostar-Player
  • Was ist das?
    Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X

Folgen von Security Weekly Podcast Network (Audio)

999 Folgen
  • Folge vom 22.10.2025
    Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
    As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Security, share why human risk management is the next frontier for security—and how platforms like Fable Security deliver personalized nudges that help employees build safer habits and stay ahead of threats. Solving human risk starts by changing human behavior. Learn how advancements in Artificial Intelligence (AI) and the application of adtech principles (targeted, personalized, A/B-tested messages delivered when they’re most relevant) are delivering faster, more effective behavior change that lasts. Segment Resources: Five must-haves of modern human risk management: https://fablesecurity.com/ebook-five-must-haves/ Starter RFP for modern human risk management: https://fablesecurity.com/starter-rfp-for-modern-hrm/ This segment is sponsored by Fable Security. Visit https://securityweekly.com/fable to learn more about them! In the leadership and communications segment, Inside the CISO Mind: How Security Leaders Choose Solutions, 2026 Leadership Strategy: Mastering Agility and Anticipation for Better Decisions, The Most Human, Strategic, Sought-After Tool in Leadership, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-418
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 21.10.2025
    The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
    The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 21.10.2025
    Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
    Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it more secure. And too few software makers are embracing secure by default, let alone secure by design. In the news, passively monitoring geosynchronous satellite communications on the cheap, successful LLM poisoning of any size model with a single size dose, security engineering lessons from Signal's post-quantum crypto work, improving security for JavaScript in the browser, and more! This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-353
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 20.10.2025
    Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
    Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s AI security team has surveyed dozens of AI applications, exploited their most common risks, and discovered a set of practical architectural patterns and input validation strategies that completely mitigate natural language injection attacks. David's talk aimed at helping security pros and developers understand how to design/test complex agentic systems and how to model trust flows in agentic environments. He also provided information about what architectural decisions can mitigate prompt injection and other model manipulation risks, even when AI systems are exposed to untrusted sources of data. More about David's Black Hat talk: Video of the talk and accompanying slides: https://www.nccgroup.com/research-blog/when-guardrails-arent-enough-reinventing-agentic-ai-security-with-architectural-controls/ Talk abstract: https://www.blackhat.com/us-25/briefings/schedule/#when-guardrails-arent-enough-reinventing-agentic-ai-security-with-architectural-controls-46112 Slide presentation only: https://i.blackhat.com/BH-USA-25/Presentations/USA-25-Brauchler-When-Guardrails-Arent-Enough.pdf Additional blogs by David about AI security: Analyzing Secure AI Architectures: https://www.nccgroup.com/research-blog/analyzing-secure-ai-architectures/ Analyzing Secure AI Design Principles: https://www.nccgroup.com/research-blog/analyzing-secure-ai-design-principles/ Analyzing AI Application Threat Models: https://www.nccgroup.com/research-blog/analyzing-ai-application-threat-models/ Building Security‑First AI Applications: A Best Practices Guide for CISOs: https://www.nccgroup.com/building-security-first-ai-applications-a-best-practices-guide-for-cisos/ Building Trust by Design for Secure AI Applications: Tips for CISOs: https://www.nccgroup.com/building-trust-by-design-for-secure-ai-applications-tips-for-cisos/ AI and Cyber Security: New Vulnerabilities CISOs Must Address: https://www.nccgroup.com/ai-and-cyber-security-new-vulnerabilities-cisos-must-address/ Segment 2: Should we replace the CIA triad? An op-ed on CSO Online made us think - should we consider the CIA triad 'dead' and replace it? We discuss the value and longevity of security frameworks, as well as the author's proposed replacement. Segment 3: The Weekly Enterprise News Finally, in the enterprise security news, Slow week for funding, older companies raising via debt financing A useful AI framework from the Cloud Security Alliance two interesting essays, one of which is wrong Folks are out here blasting unencrypted data to and from Satellites, while anyone can sniff and capture it getting hacked during a job interview LLM poisoning is far easier than previously thought F5 got breached Be careful when patching your Jeep (’s software) All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-429
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X