loader from loading.io
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran   - SWN #491 show art North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Security Weekly Podcast Network (Video)

North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Show Notes:

info_outline
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881 show art Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881

Security Weekly Podcast Network (Video)

This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. We break down the available hardware, walk you through firmware installation, and share real-world use cases of LoRa to create decentralized, encrypted networks. Whether you’re a hacker, a prepper, or just curious about the future of resilient...

info_outline
The Value of Zero Trust - Rob Allen - BSW #402 show art The Value of Zero Trust - Rob Allen - BSW #402

Security Weekly Podcast Network (Video)

New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected reduction of up to $465 billion in global annual total economic losses. But Zero Trust projects have struggled due to complexity. Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss the simplicity of Zero...

info_outline
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490 show art Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490

Security Weekly Podcast Network (Video)

Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Show Notes:

info_outline
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337 show art Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337

Security Weekly Podcast Network (Video)

Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from an LLM assistant, and then applies that understanding to a search for developer patterns that lead to common mistakes like mishandling data, not enforcing a control flow, or not defending against unexpected application states. He explains how finding...

info_outline
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413 show art The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413

Security Weekly Podcast Network (Video)

Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organizations expect. Talk about the critical weaknesses in traditional SSO implementations, how shadow IT thrives under the radar, and why enterprises continue to experience data breaches despite security investments. Can cover real-world examples of...

info_outline
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik,  Russ Beauchemin, and more... - SWN #489 show art Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489

Security Weekly Podcast Network (Video)

Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Show Notes:

info_outline
Is Vuln Management Dead? - HD Moore - PSW #880 show art Is Vuln Management Dead? - HD Moore - PSW #880

Security Weekly Podcast Network (Video)

This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integration of open source tools in enhancing security measures. The conversation delves into various aspects of cybersecurity, focusing on aircraft tracking, data filtering, the evolution of vulnerability management, and the role of AI in enhancing security...

info_outline
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401 show art Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401

Security Weekly Podcast Network (Video)

In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they...

info_outline
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488 show art The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488

Security Weekly Podcast Network (Video)

In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak and the evolving landscape of password security, including the rise of passkeys and the challenges posed by AI in misinformation and social engineering. Show Notes:

info_outline
 
More Episodes

Segment 1

CTG Interview

Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure.

Cyber Resilience in Action: A Guide for Mid-Market Firms

This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them!

Nightwing Interview

Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today’s threat landscape.

This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them!

Segment 2

Libraesva Interview

Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message.

This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them!

IRONSCALES Interview

Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception.

  • Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking
  • Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people
  • Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images

IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes.

This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them!

Segment 3

Illumio Interview

In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph.

Segment Resources:

This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview!

ESET Interview

The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats.

Segment Resources:

This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them!

Show Notes: https://securityweekly.com/esw-409