Paul's Security Weekly TV

Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.

http://securityweekly.com

Eine durchschnittliche Folge dieses Podcasts dauert 34m. Bisher sind 3232 Folge(n) erschienen. Dies ist ein täglich erscheinender Podcast.

Gesamtlänge aller Episoden: 83 days 5 hours 52 minutes

subscribe
share





Dubious Drones, NSO Group, Apple's Bug Bounties, Ghostscript 0-Day, & IBM Server Bugs - PSW #710


This week in the Security News: Anonymous hacks Epik (with a K), Fuzzing Close-Source Javascript Engines, ForcedEntry, 8 Websites that can replace computer software, REvil decryptor key released, Microsoft fixes Critical vulnerability in Linux App,...


share







   1h38m
 
 

Brakeman - Justin Collins - PSW #710


Brakeman is a free static analysis security tool specifically designed for Ruby on Rails applications. It analyzes Rails application code to find security issues at any stage of development. Justin first released Brakeman in 2010. In 2018, the...


share







   47m
 
 

The State of Network Security in 2021 - Sinan Eren - PSW #710


Network breaches, ransomware attacks, and remote-work challenges highlight the need for cloud-native Secure Access Service Edge (SASE) deployments.   Show Notes: This segment is sponsored by Barracuda Networks. Visit to learn more about them!...


share







   52m
 
 

Palo Alto Goes IoT, Numbers Lose Their Meaning, BitSight, & Colossal Mammoths - ESW #242


This week in the Enterprise News: Adrian's first Enterprise News in the Captain's Seat, BitSight raises $250m on a $2.4bn valuation, Palo Alto Networks enters the consumer IoT market, Martin Roesch Joins Netography as CEO, the special "Squirrel of the...


share







   42m
 
 

The Device Security Divide - John Loucaides - ESW #242


Organizations are divided. Some will be able to lean into mitigations against catastrophic and cascading failures. Others will not. In this discussion, we will explore the risk tradeoffs in firmware security. This includes risks inherent in devices,...


share







   33m
 
 

Web Asset Discovery in Application Security - Tolga Kayas - ESW #242


Large organizations develop hundreds of new web applications every year. Some of those deployments are lost in time, and others go wild with high severity vulnerabilities. Forgotten and outdated web applications are a common culprit of successful hack...


share







   29m
 
 

Insider Threats Overview - Going Beyond The Norm, Part 2 - Jim Henderson - SCW #86


Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls) How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research) Creating An Insider Threat...


share







   40m
 
 

Insider Threats Overview - Going Beyond The Norm, Part 1 - Jim Henderson - SCW #86


Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls) How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research) Creating An Insider Threat...


share







   37m
 
 

SEC Is Serious, CISA's Bad Practices, & What Tech Workers Really Want - BSW #231


This Week, in the Leadership and Communications section, The SEC Is Serious About Cybersecurity. Is Your Company?, CISA Urges Organizations to Avoid Bad Security Practices, IT leaders facing backlash from remote workers over cybersecurity measures,...


share







   25m
 
 

Cyber Education Is the Key to Solving the Skills Gap - Kevin Nolten - BSW #231


Kevin Nolten, Director of Academic Outreach from Cyber.org, joins Business Security Weekly to discuss how cyber education is the key to solving the skills gap and developing the next generation of cybersecurity professionals. Kevin will share examples...


share







   31m