The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Technical interviews about software topics.
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
…
continue reading
Linux “Off The Cuff”
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
…
continue reading
Spreading awarness about data privacy, cybersecurity tips and how you should become an alert citizen by protecting your privacy
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
…
continue reading
Talking about the newest tech, such as phones, computers, and more!
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading

1
DEF CON's Next Chapter and New Browser Security Frontiers | Jeff Moss, Founder of DEF CON/Black Hat
1:22:14
1:22:14
Play later
Play later
Lists
Like
Liked
1:22:14Jeff Moss, founder of the famed DEF CON and Black Hat conferences, joins Vivek Ramachandran for another episode of the Be Fearless Podcast. Jeff reveals how DEF CON’s new one-roof strategy at the Las Vegas Convention Center has transformed the conference experience, while preserving its unique hacker culture that has endured for decades. He explain…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Hed Kovetz, Vivek Ramachandran, Rob Allen, Jason Mical, Alex Pinto, Lori Robinson - ESW #405
1:42:44
1:42:44
Play later
Play later
Lists
Like
Liked
1:42:44Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
E6 - Browser extensions are everywhere - but are they safe for enterprise use?
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43In this episode, we explore the hidden risks posed by one of the most overlooked elements of the modern enterprise tech stack: browser extensions. In this episode we will unpack key insights from the newly released Enterprise Browser Extension Security Report 2025 - a data-driven look into how widely-used browser extensions are impacting enterprise…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Browser Security Unveiled: John Carse on SquareX & Cyber Career Insights
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares: The Browser Security Gap: Why 85% of user time in browsers is a growing risk fo…
…
continue reading

1
S17 E01 (VIDEO) Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
…
continue reading

1
Anthropic and the Model Context Protocol with David Soria Parra
51:02
51:02
Play later
Play later
Lists
Like
Liked
51:02The Model Context Protocol, or MCP, is a new open standard that connects AI assistants to arbitrary data sources and tools, such as codebases, APIs, and content repositories. Instead of building bespoke integrations for each system, developers can use MCP to establish secure, scalable connections between AI models and the data they need. By standar…
…
continue reading

1
Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330
1:09:38
1:09:38
Play later
Play later
Lists
Like
Liked
1:09:38Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
…
continue reading

1
Stuck in Stack Switching: How Do You Commit to One?
5:14
5:14
Play later
Play later
Lists
Like
Liked
5:14In this recording, I talk about a recurring challenge I face when building proprietary solutions—constantly switching between frameworks like Next.js, React Router, and TanStack. I tend to shift tools when I hit roadblocks (like authentication issues), which makes it hard to commit and go deep with one tech stack. I’m reaching out to ask Kent for a…
…
continue reading

1
AI-first Fail, MCP Appium Gestures, Playwright, K6, and more TGNS157
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Do you know the latest MCP for Gestures in Appium What AI first company failed and started hiring people again Have you heard of the Functional Page Model for Playwright? Find out in this episode of the Test Guild New Shows for the week of May 11. So, grab your favorite cup of coffee or tea, and let's do this. 0:17 ZAPTEST.AI https://testguild.me/Z…
…
continue reading

1
Cyber Resilience and Global Adoption From Josh Chitwood, Senior Sales Engineer’s POV
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14In this episode, our Talent Delivery Consultant Rosie Larter sits down with Josh Chitwood, a seasoned Senior Sales Engineer, to explore the everything cyber resilience. Together, they dive into the global adoption of cybersecurity practices, what it really takes to build lasting resilience, and how to navigate the inevitable dips that come with inn…
…
continue reading
Almost exactly two years ago, “Five Eyes” intelligence agencies discovered a successful and ongoing cyber attack on critical US infrastructure by a state-sponsored actor based in China. This group, associated with the People’s Liberation Army and known as Volt Typhoon, was tasked with quietly gaining persistent remote access to critical systems inc…
…
continue reading

1
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
2:14:05
2:14:05
Play later
Play later
Lists
Like
Liked
2:14:05Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
…
continue reading

1
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
2:14:05
2:14:05
Play later
Play later
Lists
Like
Liked
2:14:05Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
…
continue reading

1
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
2:14:05
2:14:05
Play later
Play later
Lists
Like
Liked
2:14:05Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
…
continue reading

1
Does innovation have to come at the expense of ethics?
45:54
45:54
Play later
Play later
Lists
Like
Liked
45:54Oliver Cronk is joined by Scott Logic’s Sophia Ashley and Alix Dunn from the ‘Computer Says Maybe’ podcast for a wide-ranging discussion which poses ethical questions that are frequently ignored in the race for technological innovation. Together, they explore the intersection of technology and power, and examine whether society is unwittingly allow…
…
continue reading

1
E7 - Where SSE Falls Short: A Deep Dive into Last-Mile Security Gaps
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02🔍 Are SSEs Really Securing the Last Mile? In this episode, we break down the hidden architectural gaps in Security Service Edge (SSE) platforms—specifically where they fall short in protecting the browser, where today’s real threats unfold. 📉 Despite vendor claims, SSEs are blind to: Copy/paste data leakage Malicious browser extensions Shadow SaaS …
…
continue reading

1
Socvel intel threat quiz, Pearson Breached, nintendo bricking stuff, and kevintel.com
1:24:40
1:24:40
Play later
Play later
Lists
Like
Liked
1:24:40socvel.com/quiz if you want to play along! Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec join the Discord: https://bit.ly/brakesecDiscord Music: Music provided by Chillhop Music: https://chillhop.ffm.to/creatorcred "Flex" by Jeremy Blake Courtesy of Youtube media libraryBy Bryan Brake
…
continue reading

1
Sudo watch, AI Dreams, Kickidler, Powershool, Old Man Router, PSMU, Aaran Leyland... - SWN #475
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
…
continue reading

1
Scatterd Spider Weaves Another Attack- 2025-05-05
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42Register for Free, Live webcasts & summits: https://poweredbybhis.com 00:00 - PreShow Banter™ — Double Coffee 05:04 - BHIS - Talkin’ Bout [infosec] News 2025-05-05 06:05 - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day 11:15 - Story # 2: M&S cyber-attack linked to hacking group…
…
continue reading

1
Wide World of Cyber: How state adversaries attack security vendors
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
…
continue reading
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
…
continue reading

1
Grand Theft Auto III on the Dreamcast with Falco Girgis and Stef Kornilios Mitsis Poiitidis
47:40
47:40
Play later
Play later
Lists
Like
Liked
47:40Grand Theft Auto III is a 2001 an open-world action-adventure game developed by Rockstar Games and it had a profound impact on both gaming and popular culture. Its success cemented video games as a dominant form of entertainment and storytelling, and paved the way for future blockbuster franchises. The game was also a technological milestone that r…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
When Past Security Doesn't Predict Future Threats | Yu Long (Tyler) Tang, Director, softScheck APAC
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08In this episode of the Be Fearless Podcast, Yu Long (Tyler) Tang, Director of Enterprise Information Security Strategy at softScheck APAC, joins us to share his journey from martial arts to cybersecurity and how the protection mindset carried over. A highly qualified speaker and Secretary and Certified Mentor with the ISC2 Singapore Chapter, Yu Lon…
…
continue reading

1
SE Radio 667: Ashley Peacock on Cloudflare
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31Ashley Peacock, the author of Serverless Apps on Cloudflare, speaks with host Jeremy Jung about content delivery networks (CDNs). Along the way, they examine dependency injection with bindings, local development, serverless, cold starts, the V8 runtime, AWS Lambda vs Cloudflare workers, WebAssembly limitations, and core services such as R2, D1, KV,…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweek…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Agent management updates | Copilot Control System
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02Manage the rise of generative AI across your organization using the Copilot Control System in Microsoft 365. Control who can find, use, and create agents, define permissions, approve or block agent deployments, and configure billing models including pay-as-you-go or prepaid options. Get detailed visibility into how agents are used, which users and …
…
continue reading

1
Data security for agents and 3rd party AI in Microsoft Purview
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46Stay in control as GenAI adoption accelerates across your organization using Data Security Posture Management for AI in Microsoft Purview. With built-in visibility into how AI apps and agents interact with sensitive data—whether inside Microsoft 365 or across unmanaged consumer tools—you can detect risks early, take decisive action, and enforce the…
…
continue reading
Polypane is a specialized web development browser that simplifies creating and testing modern websites. A key feature is that it provides multiple screen sizes at once, with synchronized scrolling and interactions, so developers can test different layouts and breakpoints simultaneously. Polypane also focuses on accessibility tools, real-time previe…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Idan Plotnik, Vishal Gupta - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading