Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
IPB174: How Enterprise IPv6 Requirements Are Shaping Microsoft Windows
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and…
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
D2DO271: Public Vs. Private Cloud In 2025
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark... Read mor…
…
continue reading

1
D2DO271: Public Vs. Private Cloud In 2025
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark... Read mor…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading
AI can impact an enterprise in several ways: making individuals more productive, making products and services more effective, and making it easier for customers and partners to do business. IT plays a critical role in enabling AI to have these impacts. On today’s sponsored Heavy Strategy, Cisco CIO Fletcher Previn explains how to locate AI use... R…
…
continue reading

1
HW051: How Wi-Fi Devices Handle Roaming On 2.4, 5, and 6 GHz Bands
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Today on Heavy Wireless we welcome Jerry Olla to give us details from his talk “Roaming Wars: How Wi-Fi Devices Handle 2.4, 5, and 6 GHz”. Jerry tested the roaming behavior of popular Wi-Fi clients across 2.4, 5, and 6 GHz. He explains his testing protocol and results, and answers questions such as whether tri-band... Read more »…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
13: As Healthcare Cyberattacks Rise, AnMed Reduces Its Tech Debt with Tanium
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26“When I got there, they had over 200,000 critical, high and medium vulnerabilities. Since bringing in Tanium, we've just had another security assessment done and we only had 30,000.” Reducing serious vulnerabilities by 170,000 is just one of the ways CISO Scott Dickinson has utilized Tanium to reduce the attack surface since arriving at AnMed, a no…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading

1
HN778: Understanding Model Context Protocol (MCP) with Selector (Sponsored)
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Model Context Protocol (MCP) is a very new protocol that provides a standard way to link AI models to a variety of data sources and tools. As the industry heads toward agentic AI–in which an AI agent interacts with disparate applications, data sources, and other agents to achieve a task–MCP provides the protocol glue. On... Read more »…
…
continue reading

1
HN778: Understanding Model Context Protocol (MCP) with Selector (Sponsored)
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Model Context Protocol (MCP) is a very new protocol that provides a standard way to link AI models to a variety of data sources and tools. As the industry heads toward agentic AI–in which an AI agent interacts with disparate applications, data sources, and other agents to achieve a task–MCP provides the protocol glue. On... Read more »…
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
TL012: Weighing the Cost of Team Interventions
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31On this episode of Technically Leadership, Chris Leonard joins to talk about the costs of intervention in a team discussion, whether that’s to bring a team back to a topic or to make a decision that needs to be made. We discuss hero culture (both in the team and as the leader), imposter syndrome, and... Read more »…
…
continue reading

1
TL012: Weighing the Cost of Team Interventions
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31On this episode of Technically Leadership, Chris Leonard joins to talk about the costs of intervention in a team discussion, whether that’s to bring a team back to a topic or to make a decision that needs to be made. We discuss hero culture (both in the team and as the leader), imposter syndrome, and... Read more »…
…
continue reading
The Domain Name System (DNS) keeps the Internet running. On today’s N Is For Networking podcast, we talk about how DNS transforms human-readable host names into IP addresses so that Internet traffic can be sent to the right place. We talk about root name servers, Top Level Domains (TLDs), and other elements of the DNS... Read more »…
…
continue reading
The Domain Name System (DNS) keeps the Internet running. On today’s N Is For Networking podcast, we talk about how DNS transforms human-readable host names into IP addresses so that Internet traffic can be sent to the right place. We talk about root name servers, Top Level Domains (TLDs), and other elements of the DNS... Read more »…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
NAN090: Examining Network Automation’s Present and Future With Chris Grundemann
45:16
45:16
Play later
Play later
Lists
Like
Liked
45:16Today we explore the current state of network automation with Chris Grundemann, a co-founder of Network Automation Forum. Chris gives the history of the Network Automation Forum and AutoCon conference, which aims to blend technology and community. He shares ideas for advancing network automation, and invites other network engineers to participate i…
…
continue reading

1
NAN090: Examining Network Automation’s Present and Future With Chris Grundemann
45:16
45:16
Play later
Play later
Lists
Like
Liked
45:16Today we explore the current state of network automation with Chris Grundemann, a co-founder of Network Automation Forum. Chris gives the history of the Network Automation Forum and AutoCon conference, which aims to blend technology and community. He shares ideas for advancing network automation, and invites other network engineers to participate i…
…
continue reading

1
12: Accenture’s Stephen Harper Uses Tanium’s Certificate Manager to Speed Quantum Compliance
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01“We have a bit of a branding issue when we talk about post-quantum cryptography because it sounds a lot more complicated than it is.” Accenture’s Stephen Harper wants federal agencies to take data provided by Tanium Certificate Manager and modify it to meet new quantum reporting requirements – before today’s methods of encryption are completely unl…
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
D2DO270: Spacelift Is Your Infrastructure Glue (Sponsored)
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Working with multiple Infrastructure as Code (IAC) tools can be painful. Spacelift provides a platform that operates on top of disparate IaC tools, including Ansible, Kubernetes, Pulumi, Terraform, and OpenTofu. Spacelift helps build the automation with and between these tools, creating graphs of graphs that make your dependencies just work. On tod…
…
continue reading

1
D2DO270: Spacelift Is Your Infrastructure Glue (Sponsored)
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Working with multiple Infrastructure as Code (IAC) tools can be painful. Spacelift provides a platform that operates on top of disparate IaC tools, including Ansible, Kubernetes, Pulumi, Terraform, and OpenTofu. Spacelift helps build the automation with and between these tools, creating graphs of graphs that make your dependencies just work. On tod…
…
continue reading

1
Brains, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet - SWN #470
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Brains, Scams, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-470
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
HS101: Time for a Cybersecurity Spring Cleaning?
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Most organizations have a long list of security holes in the form of unpatched systems and other known but unresolved vulnerabilities. Is it time to hit the big PAUSE button and fix, patch, or mitigate all of that before we resume deploying new systems (and their accompanying risks)? Join us as we tear into whether... Read more »…
…
continue reading