1,998 episodes

This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!

Security Weekly Podcast Network (Video‪)‬ Security Weekly

    • Technology

This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!

    • video
    AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354

    AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354

    In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey of 125 executives across three regions, targeting the decision-makers typically tasked with helming those efforts at companies:
    CSOs/CISOs for their focus on security CTOs for their focus on innovation CIOs for their focus on operational efficiency Bhawna Singh, Chief Technology Officer at Okta, is here to discuss the results.
    Segment Resources: Where the report will live that will be discussed during the session. Will be live June 25th: www.okta.com/resources/whitepaper-ai-at-work-report/
    Blog post by Bhawna that will be live on June 25th: www.okta.com/blog/2024/06/ai-at-work-2024-a-view-from-the-c-suite/
    This segment is sponsored by Okta. Visit https://www.securityweekly.com/okta to learn more about them!
    Show Notes: https://securityweekly.com/bsw-354

    • 32 min
    • video
    Building a Successful API Security Strategy - Luke Babarinde - BSW #354

    Building a Successful API Security Strategy - Luke Babarinde - BSW #354

    With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy.
    This segment is sponsored by Imperva. Visit https://www.securityweekly.com/imperva to learn more about them!
    Show Notes: https://securityweekly.com/bsw-354

    • 32 min
    • video
    Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

    Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

    Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor.
    Tim will describe the importance of implementing a Zero Trust framework that evaluates each command, query, and configuration change in real-time, and how that delivers the most effective and complete security solution. Doing so involves the application of fine-grained authorization policies that adapt to the context of the user, the sensitivity of the action, and the prevailing threat landscape.
    Segment Resources: https://www.strongdm.com/blog/pam-was-dead-strongdm-just-brought-it-back-to-life https://www.strongdm.com/whitepaper/technical-overview
    This segment is sponsored by StrongDM. Visit https://securityweekly.com/strongdmidv to learn more about them!
    Traditional IGA solutions are not risk-focused by design, and as audit and compliance focus continues to expand beyond core ERP systems and into line of business apps and point solutions, organizations must plan holistically how to address risk across their application landscape. It’s never too late to start kicking off your risk reduction journey, and utilizing an innovative, unified platform for both identity and access risk governance has significant, compounding benefits and helps organizations realize faster time to value, lower TCO and longer term consistent risk exposure reduction. Ensuring access to all of your business-critical applications is provisioned seamlessly, efficiently, and cost-effectively while meeting risk, audit and compliance requirements should be the primary goal of any identity and access risk governance solution implementation.
    Segment Resources: https://get.pathlock.com/demo-sem-kuppingercole-access-control-tools-multi-vendor-lob https://pathlock.com/learn/access-provisioning/ https://pathlock.com/compliant-provisioning-copy/ https://pathlock.com/learn/what-is-identity-governance-and-administration/ https://pathlock.com/distressed-iga-deployments/
    This segment is sponsored by Pathlock. Visit https://securityweekly.com/pathlockidv to learn more about them!
    Remote identity verification is one of the biggest challenges in the digital age, especially with the use of AI-generated deepfakes which are now impossible to distinguish from real imagery with the human eye. AI-powered biometrics have emerged as the most robust defense against deepfakes - and therefore, the only reliable method for remote identity verification.
    Segment Resources: iProov.com https://www.iproov.com/ iProov Threat Intelligence Report 2024: The Impact of AI on Remote Identity Verification - https://www.iproov.com/reports/iproov-threat-intelligence-report-2024
    This segment is sponsored by iProov. Visit https://securityweekly.com/iproovidv to learn more about them!
    The criminal opportunity shaping the landscape today and how authoritative, accurate and automated processes are helping others increase their conversion rates by 20% while preventing 99% of all fraudulent attempts. What is the Criminal Opportunity facing us all right now? Data breaches and mail theft have resulted in a record level of available compromised Identity Information, payment information, and login information and even stolen checks. It has been said that ’At this point, all of our information is out on the dark web and it's now just a matter of when is it going to be used against us.’ Combined with inadequate fraud strategies, fraudsters have the key to the castle, it’s a perfect scenario of having the answers to the quiz ahead of time.
    This segment is sponsored by Intellicheck. Visit https://securityweekly.com/intellicheckidv to learn more about them!
    Show Notes: https://securityweekly.com/vault-esw-12

    • 58 min
    • video
    Cybersecurity In College - SWN Vault

    Cybersecurity In College - SWN Vault

    Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018.
    This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer Science, gaining experience vs. book learning, and more on this episode of Secure Digital Life!
    Show Notes: https://securityweekly.com/vault-swn-16

    • 38 min
    • video
    iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

    iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

    FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market.
    Segment Resources: Video "Swissbit iShield Key Pro: Protecting Digital Identities" https://www.youtube.com/watch?v=kxtqOyZ6e80
    This segment is sponsored by Swissbit. Visit https://securityweekly.com/swissbitidv to learn more about them!
    While AI artificial intelligence is up-and-coming, automating your organization's PKI infrastructure is very much a reality, and can help save your IT team on hardware costs and employee costs in the long term. Additionally, a powerful PKI-as-a-Service solution provides the cryptoagility your organization can rely on as artificial intelligence, post-quantum computing, and shortened certificate validity periods become reality.
    This segment is sponsored by HID. Visit https://securityweekly.com/hididv to learn more about them!
    Cyberattacks, fraud and breaches, we’ve all studied them, and we are all aware that identity is under attack. And if we thought it was bad up until now, we haven't fully seen the impact of GenAI based identity attacks. Going beyond just Deepfakes, GenAI-powered malicious services such as FraudGPT, lets novices craft targeted and sophisticated attacks that bypass common IAM and security controls. Identity and security leaders must brace themselves for an increase in the volume, velocity and variety of attacks ("the three V's:). In this talk, former Gartner analyst David Mahdi and CIO of Transmit Security cover what you need to know about GenAI these attacks, and what you can do about it. Specifically, the types of attacks fraudsters are conducting across the identity lifecycle, insight into their tactics and services, and finally recommendations for a path forward.
    This segment is sponsored by Transmit Security. Visit https://securityweekly.com/transmitidv to learn more about them!
    Show Notes: https://securityweekly.com/vault-esw-12

    • 44 min
    • video
    Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

    Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

    Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are:
    -40 years old, with little innovation
    -Haven’t solved the problem.
    In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the approach is different:
    -Prove bugs, rather than trying to list all of them.
    -Zero false positives, which leads to better autonomy.
    Segment Resources:
    Article on competition: https://www.darpa.mil/about-us/timeline/cyber-grand-challenge
    Technical article on approach: https://spectrum.ieee.org/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them
    Example vulns discovered:
    https://forallsecure.com/blog/forallsecure-uncovers-critical-vulnerabilities-in-das-u-boot
    https://github.com/forallsecure/vulnerabilitieslab
    Show Notes: https://securityweekly.com/vault-esw-12

    • 32 min

Top Podcasts In Technology

Barış Özcan ile 111 Hz
Podbee Media
Haftalık Gündem Değerlendirmesi
TeknoSeyir
Zihnimin Kıvrımları
M. Serdar Kuzuloğlu
Farklı Düşün
Seyfeddin Başsaraç, Mert Bulan
Lex Fridman Podcast
Lex Fridman
TED Radio Hour
NPR

You Might Also Like

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Risky Business
Patrick Gray