Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecuri
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the
The SIEM market has undergone some significant changes this summer. This is a great opportunity to t
Kayla Williams, Chief Security Information Officer at Devo, discussed the role of AI in cybersecurit
This week in the security news, Dr. Doug and Larry explore various technological advancements and th
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpe
APIs are essential to modern application architectures, driving rapid development, seamless integrat
AI is bringing productivity gains like we’ve never seen before -- with users, security teams and dev
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conv
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Week
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on t
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a ho
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episo
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS l
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft
When a conference positioned as a day of security for developers has to be canceled due to lack of i
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-S
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how