Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.

http://securityweekly.com

Eine durchschnittliche Folge dieses Podcasts dauert 34m. Bisher sind 2711 Folge(n) erschienen. Dies ist ein täglich erscheinender Podcast
subscribe
share





Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667


Following the release of our detection engine, Elastic opened up a new GitHub repo of our public detection rules. See: https://github.com/elastic/detection-rules. This is where our security intelligence and analytics team develops rules, creates...


share







   56m
 
 

Key Findings From The Newly Released BSIMM11 Report - Mike Ware - PSW #667


BSIMM11, the latest version of the Building Security In Maturity Model (BSIMM), was created to help organizations plan, execute, measure, and improve their Application Security program/initiatives. BSIMM11 reflects the software security practices...


share







   49m
 
 

Securing Enterprise Digital Transformations - Jimmy Mesta - ESW #199


The drivers behind transformation, or roadbloacks, come in different forms. Mergers and acquisitions present both security challenges and opportunities for growth. Legacy technology always presents unique challenges, especially when it comes to...


share







   29m
 
 

Current Security Needs Of Modern Enterprise Companies - Ferruh Mavituna - ESW #199


As organizations grow and get more mature, they are looking for ways to achieve more with less. Join this ESW segment to learn how mature organizations approach web application security at scale, how they achieve greater visibility, shift security...


share







   38m
 
 

Zscaler Zero Trust Exchange, Gravwell Data Fusion, & CrowdStrike Falcon - ESW #199


Acunetix new data retention policies, 5 Things to Ask Your Web App Pen Test Provider, Microsoft's open source tool for sniffing out Windows 10 bugs, Datadog unveils support for distributed tracing for AWS Step Functions via AWS X-Ray, Gravwell's Data...


share







   24m
 
 

How We Lost the Cybersecurity War (and What Happens Next) - Part 2 - David King - SCW #43


David asserts that, from a consumer data and SMB perspective, we've already lost the Cybersecurity War on 2 major fronts. 1) Cybercriminals already have our unalterable PII, yet we're still driving regulations and developing tools to protect it. 2)...


share







   33m
 
 

How We Lost the Cybersecurity War (and What Happens Next) - Part 1 - David King - SCW #43


David asserts that, from a consumer data and SMB perspective, we've already lost the Cybersecurity War on 2 major fronts. 1) Cybercriminals already have our unalterable PII, yet we're still driving regulations and developing tools to protect it. 2)...


share







   34m
 
 

Cyber Risks, C-Suite Supporting CISOs, & Cybersecurity Spending - BSW #187


In the Leadership and Communications section, we're playing 3 questions - Does Your Board Really Understand Your Cyber Risks?, How can the C-suite support CISOs in improving cybersecurity?, Think You're Spending Enough on Security?, and more!  ...


share







   23m
 
 

Cracks in the Foundation: Understanding the New Endpoint Challenge - John Loucaides - BSW #187


Cyber adversaries have mastered the art of staying one step ahead of our controls. As endpoint protections grow stronger, attackers have adapted by going further down the stack - targeting firmware, hardware and device-level vulnerabilities....


share







   39m
 
 

RCE via BACKBLAZE, Microsoft Patch Tuesday, & CRYLOGGER - ASW #121


BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys, Microsoft Patch Tuesday, Sept. 2020 Edition, XSS->Fix->Bypass: 10000$ bounty in Google Maps, Academics find crypto bugs in 306 popular Android apps, none get...


share







   36m