Security Weekly Podcast Network (Audio)-Logo

Wissenschaft & Technik

Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!

Jetzt anhören
  • im Online-Player
  • im phonostar-Player
  • Was ist das?
    Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X

Folgen von Security Weekly Podcast Network (Audio)

999 Folgen
  • Folge vom 03.12.2025
    Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
    While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, Mike will explore how bad actors are focusing their attacks on SaaS applications, hijacking tokens and how misconfigured integrations are used to bypass traditional defenses. Mike will also discuss how IT leaders can rethink protecting their essential SaaS business applications with tools that go beyond endpoint and MFA strategies to secure the modern user. This segment is sponsored by Kaseya 365 User. Visit https://securityweekly.com/k365 to learn more about them! In the leadership and communications segment, The rise of the chief trust officer: Where does the CISO fit?, When Another Company’s Crisis Hurts Your Reputation, Effective Workplace Communication Tips, and more!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-424
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 02.12.2025
    AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
    AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 02.12.2025
    Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
    For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 01.12.2025
    From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435
    Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, this special edition captures the most influential conversations from this year’s conference. In this episode: -You Don’t Need a Hacker When You Have Misconfigurations — Rob Allen, Chief Product Officer at ThreatLocker®, discusses how overlooked settings and weak controls continue to be one of the most common causes of breaches. He explains how Defense Against Configurations (DAC) helps organizations identify, map, and remediate configuration risks before attackers can exploit them. -Security Challenges for Mid-Sized Companies — Perry Schumacher, Chief Strategy Officer & Partner at Ridge IT Cyber, explores the evolving security challenges facing mid-sized organizations. He discusses how AI is becoming a competitive advantage, how mobility and third-party reliance complicate defenses, and what steps these organizations can take to improve resilience and efficiency. -The Rise of Security Control Management: Secure by Design, Not by Chance — Marene Allison, former CISO of Johnson & Johnson, introduces Security Control Management (SCM), a new software category that unifies control selection, mapping, validation, and enforcement. She explains how SCM transforms fragmented compliance programs into proactive, embedded defense. -Engineered for Protection: The Rise of Security Control Management — Ryan Heritage, Advisor at Sicura, continues the discussion on SCM, explaining how organizations can operationalize this approach to move from reactive reporting to proactive, data-driven defense. He highlights how automation and integration enable security decisions to be made at “the speed of relevance.” -The AI Threat: Protecting Your Email from AI-Generated Attacks — Patricia Titus, Field CISO at Abnormal Security, explores how cybercriminals are weaponizing generative AI to create sophisticated phishing and social engineering attacks. She shares practical strategies for defending against AI-generated threats and emphasizes why AI-based protections are now essential for modern enterprises. -Igniting Change: A Conversation with Dr. Ron Ross — Dr. Ron Ross, CEO at RONROSSECURE, LLC, shares insights from decades of pioneering work in cybersecurity, including the Risk Management Framework and Systems Security Engineering Guidelines. He discusses how leaders can apply these principles to strengthen resilience, foster innovation, and drive meaningful change across the cybersecurity landscape.   Segment Resources ThreatLocker® Defense Against Configurations (DAC): https://www.threatlocker.com/platform/defense-against-configurations Book a demo to see DAC in action. Visit https://securityweekly.com/threatlockerisw to learn more! This segment is sponsored by Ridge IT Cyber. Visit https://securityweekly.com/ridgeisw to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-435
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X