Whispers from the Void is an immersive audio drama that plunges listeners into a world where the boundaries between reality and the supernatural are blurred. Follow the gripping tale of Richard Harrison and Jason Vasquez as they unravel the dark secrets hidden within their city, confronting eldritch horrors and ancient cults that threaten their sanity and existence. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
…
continue reading
In this grimly humorous audio drama, the afterlife isn’t as restful as you’d hope. When corpses are brought back to life with a little bit of love (and necrophilia), they find themselves alone, confused, and in a world that has moved on without them. WAKERS follows the newly undead as they stumble through their second chance at life. From mandatory group therapy to barely functioning government programs, they will find that life wasn’t quite ready for them. Not to mention the anxiety, depres ...
…
continue reading
Brock Wilbur (@brockwilbur) and pals try to find the silver lining in the darkness that threatens to consume us constantly, there is no escape but here we are. Bite-sized weekly shows allow an opportunity to take a break and find the dark shining heart that hides in the void. Keep your teeth sharp and many, and your hearts dark and true.
…
continue reading
Henny & Halos. The platform discusses a variety of different topics, from politics to the bedroom. Add a couple of shots in the mix and there’s no telling what could happen!
…
continue reading
What was meant to be music "Radio without the radio" has morphed into a mostly commentary yet fun but serious talk show. Commentary, music, popular culture and lots of random babbling is always on the menu. Tony B, speaking into the void trying to engage and interact in civil discourse to advance the conversations of the day. All ideas are open for discussion within reason. Please interact via sound files, comments, or just participating in quizzes.
…
continue reading
After an anomaly seperates Rebel Captain Elyss Glasse from her team, she finds herself in an unknown place with an incomplete mission and a damaged scout ship. Desperate to find her way home, but unable to stop herself reflecting, the Void may not be as desolate as it first appears. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Comic News, Reviews, and the general Seduction of the Innocent
…
continue reading
Welcome to the Happy Place podcast, where we’re going to discover the essence of lasting satisfaction in life. I'm your host, Rina, and, together, we'll explore the elusive concept of happiness. Professionally I’m known as a shibari artist, tantric bodyworker, former professional Domme, extreme sports athlete - I call myself a Vulnerability guide - I create safe spaces for healing, self-discovery and spiritual explorations. I first encountered the term Happy Place while pursuing freediving. ...
…
continue reading
Headphones are highly recommended for this immersive, psychological, sci-fi thriller! John Boyega (STAR WARS: THE FORCE AWAKENS) stars as Jack Locke, a mysterious conman with a vendetta who infiltrates NextCorp, a Silicon Valley body-hacking startup run by enigmatic CEO Max Fuller, played by Emmy winner Darren Criss (AMERICAN CRIME STORY: THE ASSASSINATION OF GIANNI VERSACE). Nextcorp has secretly been developing a revolutionary new mind app that promises to amplify the human brain in incred ...
…
continue reading
Full Stack Whatever is a series of conversations with creatives and technologists about the work behind the work. Technology, design, and art are all subjects powered by an immeasurable amount of time invested by humans. And too often, we find ourselves only talking about the superficial aspects; job titles, launches, campaigns, etc. With these conversations, I want to dig deeper and uncover the lessons, insights, and motivations of some of the best and brightest in our industries. I hope to ...
…
continue reading
Born amidst salt and smoke... Just off the Long Island Expressway... Beneath a bleeding star... The Princes That Were Promised discuss the History of Westeros and The Known World. Join John and Seannie-Wan as they share their thoughts and observations for beginners and novices to #GRRM's 'A Song of Ice and Fire,' including analysis of the TV adaptation 'Game of Thrones' and all production news for HBO's Earth-shattering series. Any update to the break-neck speed of #GRRM's writing that trick ...
…
continue reading
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
When an anticipated meeting doesn’t go as planned, Nora tries to cheer up Arnold. But that can’t keep him from making a desperate move. FEATURING: Kevar Maffit – Arnold Kelly Ashley Trevathan – Nora Allen Gabby Calvert - Kim Novak Keegan Riley - Narrator Katie Houston - Kate Densmore Six Carolino - Frederick Diana Chabot - Debbie Schlotzky ADDITION…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
Arnold looks up an old flame. FEATURING: Kevar Maffit – Arnold Kelly Ashley Trevathan – Nora Allen Michael Gault – Ted Abi Wiggins - Megan Gabby Calvert - Kim Novak John Manness - Reverend Nolan Jordan Epperson – Seth Keegan Riley - Narrator Katie Houston - Kate Densmore ADDITIONAL VOICES: Garrett Atkinson, Dalton Sides, Jesse Hearn, Christina Hend…
…
continue reading
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
"Ever wondered what it's like to stand on the edge of a cliff, staring into the void, where a single mistake could cost your life? In this episode, I take you to that edge, sharing the raw, visceral experience of BASE jumping and the profound insights it brings. With many friends lost to the sport, the stakes are real, and life takes on a new persp…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
In this episode, we delve into the Tantric path of desire, pleasure, and bliss, exploring how these experiences can be harnessed for spiritual awakening rather than mere sensory gratification. Tantra views desire and pleasure not as something to be suppressed but as a powerful force that can be transformed and utilized for spiritual growth. Tantra …
…
continue reading
Nora gives Arnold a glimpse of her personal life and then goes on a hunt for his missing appendage. FEATURING: Kevar Maffit – Arnold Kelly Ashley Trevathan – Nora Allen Jordan Epperson – Tony Gabby Calvert - Kim Novak Keegan Riley - Narrator ADDITIONAL VOICES: Garrett Atkinson, Dalton Sides, Jesse Hearn, Christina Hendricks, Lucas Rayborn, Jason Es…
…
continue reading
Now with a roof over his head, Arnold must get accustomed to the life of a Revived citizen. Thankfully, he has Nora to show him the ropes – for as long as she can stand him anyways. FEATURING: Kevar Maffit – Arnold Kelly Ashley Trevathan – Nora Allen Michael Gault – Ted Jordan Epperson – Seth Gabby Calvert - Kim Novak Keegan Riley - Narrator John M…
…
continue reading
Arnold Kelly wakes to find himself one of the undead. Alone and confused, he looks for answers on what to do next. He just didn’t think there would be so much paperwork. FEATURING: Kevar Maffit – Arnold Kelly Ashley Trevathan – Nora Allen Michael Gault – Ted Jordan Epperson – Seth Diana Chabot – Debbie Schlotsky Keegan Riley - Narrator ADDITIONAL V…
…
continue reading
In this grimly humorous audio drama, the afterlife isn’t as restful as you’d hope. When corpses are brought back to life with a little bit of love (and necrophilia), they find themselves alone, confused, and in a world that has moved on without them. WAKERS follows the newly undead as they stumble through their second chance at life. From mandatory…
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
2:14:57
2:14:57
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:14:57
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
1:12:35
1:12:35
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:12:35
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading
1
AI, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet... - SWN #420
30:10
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-420
…
continue reading
1
Run Your Security Program Like an Election Campaign - Kush Sharma - BSW #367
1:05:11
1:05:11
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:05:11
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
…
continue reading
1
Perfctl, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland... - SWN #419
32:36
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
…
continue reading
1
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378
2:14:25
2:14:25
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:14:25
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
3:07:23
3:07:23
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
3:07:23
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - Farshad Abasi - ASW #301
45:57
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
…
continue reading
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-418
…
continue reading
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
…
continue reading
Jason gets a short visit... Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker... - Rob Allen - SWN #417
33:04
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
…
continue reading
1
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377
1:59:45
1:59:45
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:59:45
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
…
continue reading
1
AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844
2:59:14
2:59:14
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:59:14
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
…
continue reading
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
1:07:51
1:07:51
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:51
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
1:06:53
1:06:53
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:06:53
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
1:02:26
1:02:26
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:02:26
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
1:00:54
1:00:54
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:00:54
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Craig Campbell: One-man Wrecking Crew
1:23:13
1:23:13
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:23:13
Links: PastmapsCraig Campbell, Maykel Loomans
…
continue reading
1
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
31:12
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
…
continue reading