1,998 episodes

This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!

Security Weekly Podcast Network (Video‪)‬ Security Weekly

    • Technology

This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!

    • video
    iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

    iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

    FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market.
    Segment Resources: Video "Swissbit iShield Key Pro: Protecting Digital Identities" https://www.youtube.com/watch?v=kxtqOyZ6e80
    This segment is sponsored by Swissbit. Visit https://securityweekly.com/swissbitidv to learn more about them!
    While AI artificial intelligence is up-and-coming, automating your organization's PKI infrastructure is very much a reality, and can help save your IT team on hardware costs and employee costs in the long term. Additionally, a powerful PKI-as-a-Service solution provides the cryptoagility your organization can rely on as artificial intelligence, post-quantum computing, and shortened certificate validity periods become reality.
    This segment is sponsored by HID. Visit https://securityweekly.com/hididv to learn more about them!
    Cyberattacks, fraud and breaches, we’ve all studied them, and we are all aware that identity is under attack. And if we thought it was bad up until now, we haven't fully seen the impact of GenAI based identity attacks. Going beyond just Deepfakes, GenAI-powered malicious services such as FraudGPT, lets novices craft targeted and sophisticated attacks that bypass common IAM and security controls. Identity and security leaders must brace themselves for an increase in the volume, velocity and variety of attacks ("the three V's:). In this talk, former Gartner analyst David Mahdi and CIO of Transmit Security cover what you need to know about GenAI these attacks, and what you can do about it. Specifically, the types of attacks fraudsters are conducting across the identity lifecycle, insight into their tactics and services, and finally recommendations for a path forward.
    This segment is sponsored by Transmit Security. Visit https://securityweekly.com/transmitidv to learn more about them!
    Show Notes: https://securityweekly.com/vault-esw-12

    • 44 min
    • video
    Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

    Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

    Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are:
    -40 years old, with little innovation
    -Haven’t solved the problem.
    In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the approach is different:
    -Prove bugs, rather than trying to list all of them.
    -Zero false positives, which leads to better autonomy.
    Segment Resources:
    Article on competition: https://www.darpa.mil/about-us/timeline/cyber-grand-challenge
    Technical article on approach: https://spectrum.ieee.org/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them
    Example vulns discovered:
    https://forallsecure.com/blog/forallsecure-uncovers-critical-vulnerabilities-in-das-u-boot
    https://github.com/forallsecure/vulnerabilitieslab
    Show Notes: https://securityweekly.com/vault-esw-12

    • 32 min
    • video
    Hacker Heroes - Dave Aitel - PSW Vault

    Hacker Heroes - Dave Aitel - PSW Vault

    Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel
    Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth of knowledge and strategic insights to our discussion.
    As the Founder and CEO of Immunity Inc., a leading cybersecurity company, Dave has played a pivotal role in shaping the cybersecurity landscape. Join us as we delve into his journey, from his early experiences in cybersecurity to the strategic decisions that have defined his role as a thought leader in the field.
    In this episode, we explore Dave's perspectives on the ever-evolving threat landscape, offensive security strategies, and the intricate balance between security and privacy. Gain valuable insights into the methodologies and philosophies that underpin his approach to addressing the challenges posed by cyber threats.
    Dave Aitel's expertise extends beyond technical domains; he is also recognized for his contributions to policy discussions on cybersecurity. Discover how his experiences and viewpoints contribute to the broader discourse on cybersecurity policy, technology, and the future of digital defense.
    Whether you're a cybersecurity professional, an industry enthusiast, or someone keen on understanding the strategic dimensions of cybersecurity, this podcast episode with Dave Aitel is bound to offer thought-provoking perspectives and strategic insights.
    Tune in to explore the intersection of technology, security, and strategy with one of the industry's strategic minds, Dave Aitel.
    Show Notes: https://securityweekly.com/vault-psw-10

    • 1 hr 29 min
    • video
    Back To School: Networking 101 - SWN Vault

    Back To School: Networking 101 - SWN Vault

    Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018.
    This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses, IP Addressing (Private/Public), DHCP, routing, and DNS.
    Show Notes: https://securityweekly.com/vault-swn-15

    • 26 min
    • video
    Learning EBPF - Liz Rice - ASW Vault

    Learning EBPF - Liz Rice - ASW Vault

    Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023.
    Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of infrastructure tools for networking, observability, and security. Let's explore eBPF and understand its value for security, and how it's used to secure network connectivity in the Cilium project, and for runtime security observability and enforcement in Cilium's sub-project, Tetragon.
    Segment Resources:
    Download "Learning eBPF": https://isovalent.com/learning-ebpf Buy "Learning eBPF" from Amazon: https://www.amazon.com/Learning-eBPF-Programming-Observability-Networking/dp/1098135121 Cilium project: https://cilium.io Tetragon project: https://tetragon.cilium.io/
    Show Notes: https://securityweekly.com/vault-asw-11

    • 37 min
    • video
    Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault

    Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault

    Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022.
    Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying they enable Zero Trust. The problem is this: you can’t buy zero trust. It’s an approach, an architecture, and a journey, not software, hardware, or a service to deploy. Zero Trust also provides a rare opportunity in security - to reduce cost, improve security AND enhance end-user and customer experience.
    Show Notes: https://securityweekly.com/vault-bsw-11

    • 32 min

Top Podcasts In Technology

Elixir Mix
Charles M Wood
Elixir Wizards
SmartLogic LLC
Go Time: Golang, Software Engineering
Changelog Media
The Brave Technologist
Brave Software
Lenny's Podcast: Product | Growth | Career
Lenny Rachitsky
FT Tech Tonic
Financial Times

You Might Also Like

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Risky Business
Patrick Gray
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC