1,999 episodes

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.

Paul's Security Weekly TV Security Weekly

    • Technology
    • 4.6 • 29 Ratings

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.

    • video
    Your Title Doesn't Make You a Leader, The New 9 to 5, & Say "Thanks" - BSW #198

    Your Title Doesn't Make You a Leader, The New 9 to 5, & Say "Thanks" - BSW #198

    In the leadership and communications section, Your Title Doesn't Make You a Leader, The New Nine to Five: How Traditional Hours Are Holding Your Business Back, Building a Better Workplace Starts with Saying “Thanks”, and more!
     
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://securityweekly.com/bsw198

    • 31 min
    • video
    Where's your data? Who Cares! - Jeff Capone - BSW #198

    Where's your data? Who Cares! - Jeff Capone - BSW #198

    App, User, and Data, but it's all about the data! Discovering and classifying data to protect it is tough. What if you can protect all of your data? Jeff Capone, CEO and Co-founder at SecureCircle, joins us to discuss how to protect all of your data and stop asking "Where's your data?". If we can protect everything, who cares where it is, as you continue to maintain control!
     
    This segment is sponsored by SecureCircle. Visit https://securityweekly.com/securecircle to learn more about them!
     
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://securityweekly.com/bsw198

    • 31 min
    • video
    Top CyberSec Skills for 2021, Xbox Gamertag Bug, & MobileIron RCE Flaw - ASW #132

    Top CyberSec Skills for 2021, Xbox Gamertag Bug, & MobileIron RCE Flaw - ASW #132

    Xbox bug exposed email identities, focusing on prevention for your cloud security strategies, Amazon looking to hire more Rust developers, KubeCon continues push for security, and a DevOps reading list!
     
    Visit https://www.securityweekly.com/asw for all the latest episodes!
    Show Notes: https://securityweekly.com/asw132

    • 30 min
    • video
    Security Decisions During Application Development - Tim Mackey - ASW #132

    Security Decisions During Application Development - Tim Mackey - ASW #132

    The security of any application is a function of the decisions made during development. Measuring the risk of those decisions isn't something contained within a single tool, but instead requires a set of perspectives on how a "bad decision" can manifest itself in the security of the app.
     
    This segment is sponsored by Synopsys. Visit https://securityweekly.com/synopsys to learn more about them!
     
    Visit https://www.securityweekly.com/asw for all the latest episodes!
    Show Notes: https://securityweekly.com/asw132

    • 37 min
    • video
    Beyond Subjectivity: Sharpening CVSS with Asset Context - Clayton Fields, Michael Assraf - ESW #208

    Beyond Subjectivity: Sharpening CVSS with Asset Context - Clayton Fields, Michael Assraf - ESW #208

    Vulnerability prioritization has traditionally relied on CVSS scores and other subjective measurements (e.g. asset tagging) that don't factor in internal context. A new approach integrates asset context and application activity to derive rich, internal data.
     
    This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them!
     
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw208

    • 33 min
    • video
    Which Multifactor Authentication is the Right One? - Matt Barnett - ESW #208

    Which Multifactor Authentication is the Right One? - Matt Barnett - ESW #208

    It's widely-accepted that multifactor is a best practice for authentication, but there are a variety of implementations (e.g., smart cards, push notifications, OTPs). We'll talk through the benefits and drawbacks of each and explore why Microsoft's director of identity security just published a blog post about abandoning text messages for Office365/Azure authentication.
     
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw208

    • 24 min

Customer Reviews

4.6 out of 5
29 Ratings

29 Ratings

ggiaquin16 ,

Awesome!

Love your shows! Good to meet you all at DefCon 22 :)

Ian Smith ,

Excellance

I listen to the podcasts religiously and theese videos only make the experiance even better

Monty671 ,

Great video

The video part of this podcast is a great way for them to show the details from the information that they give on the audio podcast. Keep up the good work. Please show us even more examples. Monty - Germantown, Md.

Top Podcasts In Technology

Listeners Also Subscribed To