Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of... more
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build... more
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training... more
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the... more
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests.... more
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security... more
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec.... more
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by... more
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024... more
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Visit... more
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization... more
To claim this podcast, you must confirm your ownership via the email address located in your podcast’s RSS feed (sw_****@cyberriskalliance.com). If you cannot access this email, please contact your hosting provider.