Security Weekly Podcast Network (Video)

Security Weekly Productions
undefined
Jun 29, 2020 • 32min

Using IaC to Establish & Analyze Secure Environments - Cesar Rodriguez - ASW #112

Teams building Infrastructure as Code still need to ensure that the infrastructure deployed matches the code they created. Not only can IaC help establish secure environments, analyzing that code can help identify when environments have drifted from security baselines or even highlight when misconfigurations lead to exploitable vulns. To learn more about Accurics, visit: https://securityweekly.com/accurics Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode112
undefined
Jun 19, 2020 • 37min

Emerging Security Threats to Your Digital Supply Chain - Jason Fruge - ESW #188

Despite running the mission-critical applications that power your business, ERP applications, such as SAP and Oracle E-Business Suite, and their custom code are often a cybersecurity blind spot. In this podcast, we'll be discussing how missing patches, misconfigurations, issues with custom code and other vulnerabilities are leaving your most important data and applications unprotected—and what to do about it. To request a complimentary assessment, visit https://securityweekly.com/onapsis Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode188
undefined
Jun 19, 2020 • 31min

Debunking DAST Myths & Short-Term Strategies to Fixing Vulnerablities - Ferruh Mavituna - ESW #188

Paul, Matt, and Ferruh discuss the differences between DAST and other approaches such as SAST and IAST! They will debunk some common DAST myths and then follow-up on their last conversation and discuss Short-Term Vulnerability Management Tools! To learn more about Netsparker, visit https://securityweekly.com/netsparker Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode188
undefined
Jun 18, 2020 • 31min

STELKS 6, CyberArk Alero, & CheckPoint CloudGuard - ESW #188

BeyondTrust Announces Integration with the SailPoint Predictive Identity Platform, Check Point Launches CloudGuard Cloud Native Security, CyberArk Alero enhancements provide secure privileged access for remote users, Digital Shadows announces new capabilities to identify and remediate unwanted code exposure, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode188
undefined
Jun 18, 2020 • 27min

How to Become an InfoSec Professional With Limited Resources - SCW #32

Jeff, Matt, Scott, and Josh continue the conversation and talk "How to Become an InfoSec Professional With Limited Resources"! Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode32
undefined
Jun 17, 2020 • 34min

What Is an InfoSec Professional? - SCW #32

Jeff, Matt, Scott, and Josh talk "What Is An InfoSec Professional?"! Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode32
undefined
Jun 17, 2020 • 24min

Virtual CISO, How to Negotiate Virtually, & Endpoint Security - BSW #177

In the Leadership and Communications section, Five signs a virtual CISO makes sense for your organization, How to Negotiate — Virtually, Why Securing Endpoints Is The Future Of Cybersecurity, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode177
undefined
Jun 16, 2020 • 30min

How CISOs Can Best Prioritize Security With a Decreased Budget - Lewie Dunsworth - BSW #177

The recent pandemic has been a financial burden across the country while also forcing businesses to transition to a work from home environment where IT and security departments were tasked with making sure their security infrastructure were prepared. As the country slowly begins to reopen, organizations may not have the necessary funds to spend on areas of their business, including security. Knowing what security best practices to prioritize can help organizations reduce risks, while getting back to work, without breaking the bank. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode177
undefined
Jun 16, 2020 • 31min

CallStranger, SMBleedingGhost, & Misconfigured Kubeflow - ASW #111

CallStranger hits the horror trope where the call is coming from inside the house, SMBleedingGhost Writeup expands on prior SMB flaws that exposed kernel memory, Misconfigured Kubeflow workloads are a security risk, Verizon Data Breach Investigations Report, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode111
undefined
Jun 15, 2020 • 37min

Data Mapping & Data Value Journey - Michelle Dennedy - ASW #111

Data management can transform a company. This digital transformation is about more than changing the way users relate to their data. It is about revolutionizing how we work with and think about data. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode111

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app