Security Weekly Podcast Network (Audio)-Logo

Wissenschaft & Technik

Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!

Jetzt anhören
  • im Online-Player
  • im phonostar-Player
  • Was ist das?
    Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X

Folgen von Security Weekly Podcast Network (Audio)

999 Folgen
  • Folge vom 05.11.2025
    Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
    What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together. So why is it so hard to properly configure your systems? Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss Defense Against Configurations and how ThreatLocker can automatically identify misconfigurations and map them to your environment’s compliance and security requirements. Rob will discuss how ThreatLocker Defense Against Configurations dashboard can: Identify misconfigurations before they become exploited vulnerabilities Monitor configuration compliance with major frameworks Receive clear, actionable remediation guidance and more! This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In the leadership and communications segment, Cybersecurity management for boards: Metrics that matter, The Emotional Architecture of Leadership: Why Energy, Not Strategy, Builds Great Teams, Your Transformation Can’t Succeed Without a Talent Strategy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-420
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 04.11.2025
    Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
    Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 04.11.2025
    Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
    Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits, and working with repo owners to improve their security. Their work highlights the challenges in maintaining good security guidance, figuring out secure defaults, and how so many orgs still struggle with triaging external security reports -- something that's becoming even more challenging when orgs are being flooded with low-quality reports from LLMs. Segment Resources: https://orca.security/resources/blog/pull-request-nightmare-github-actions-rce/ https://orca.security/resources/blog/pull-request-nightmare-part-2-exploits/ Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-355
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X
  • Folge vom 03.11.2025
    Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
    Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, highlighting why passwordless authentication is emerging as a game-changer for frontline access to shared devices. Joel Burleson-Davis, Chief Technology Officer of Imprivata, will share how organizations can adopt frictionless and secure access management to improve both security and frontline efficiency at scale. Segment Resources: Putting Complex Passwords to Work For You This segment is sponsored by Imprivata. Visit https://securityweekly.com/imprivata to learn more about them! Topic Segment: The Economics of AI Agents Vendors are finding, after integrating agents into their processes, that agentic AI can get expensive very quickly. Of course, this isn't surprising when your goal is "review all my third party contracts and fill out questionnaires for me" and the pricing is X DOLLARS for 1M TOKENS blah blah context window, max model thinking model blah blah. No one knows what the conversion is from "review my contracts" to millions of tokens, so everyone is left to just test it out and see what the bill is at the end of the month. As we saw with Cloud when adoption started increasing in the early 2010s, we are naturally entering the era of AI cost optimization. In this segment, we'll discuss what that means, how it affects the market, and how it affects the use of AI in cybersecurity. Jackie mentions this story from Wired in the segment: https://www.wired.com/story/ai-bubble-will-burst/ News Segment Finally, in the enterprise security news, we’ve got funding and acquisitions 7 red flags you’re doing cloud wrong security standards for open source projects post mortems of attacks on open source supply chain some analysis on current and historic AWS outages a deep dive some dumpster fires and how much would you pay for a robot that puts away the dishes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-431
    Jetzt anhören
    • im Online-Player
    • im phonostar-Player
    • Was ist das?
      Radio hören mit phonostar Help layer phonostarplayer Um Radio anzuhören, stehen dir bei phonostar zwei Möglichkeiten zur Verfügung: Entweder hörst du mit dem Online-Player direkt in deinem Browser, oder du nutzt den phonostar-Player. Der phonostar-Player ist eine kostenlose Software für PC und Mac, mit der du Radio unabhängig von deinem Browser finden, hören und sogar aufnehmen kannst. ›››› phonostar-Player gratis herunterladen X