PodcastsNewsSecurity Weekly Podcast Network (Audio)

Security Weekly Podcast Network (Audio)

Security Weekly Productions
Security Weekly Podcast Network (Audio)
Latest episode

3370 episodes

  • Security Weekly Podcast Network (Audio)

    Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet. - SWN #571

    2026/04/10 | 30 mins.
    Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet, and More on this episode of the Security Weekly News.
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-571
  • Security Weekly Podcast Network (Audio)

    AI Makes All Bug Shallow? - PSW #921

    2026/04/09 | 2h 5 mins.
    This week:
    Rage dropping 0-Day
    Claude Mythos, things are different now
    From UART to root, on a device made in China, where's the FCC?
    More CUPS vulnerabilities
    Russians are hacking routers, FCC ban doesn't stop them
    Mongoose vulnerabilities, and FCC still does nothing
    Renting virtual phones
    Iran's cyber attacks
    SHA-256 almost broken?
    Catching Axios
    New Rowhammer, dubbed GPUBreach, gives you root
    Windows 11 has sudo! (And SSH...)
    And Inside a Kubernetes Scanning Fleet
    Visit https://www.securityweekly.com/psw for all the latest episodes!
    Show Notes: https://securityweekly.com/psw-921
  • Security Weekly Podcast Network (Audio)

    Zero Trust Readiness and Two RSAC 2026 Interviews from Fenix24 and Absolute Security - John Bruggeman, Christy Wyatt, John Anthony Smith - BSW #442

    2026/04/08 | 1h 7 mins.
    Autonomous AI agents are creating a new attack surface for enterprise security teams, particularly as organizations deploy agents for operational tasks such as customer support automation, data analysis, and incident response. How can we align our Zero Trust initiatives to also address the emerging Agentic AI risks?
    John Bruggeman, Consulting CISO at CBTS, joins Business Security Weekly to discuss how your Zero Trust readiness can also prepare you for Agentic AI deployments. Organizations are granting agents access to sensitive systems without the security controls typically required for other Zero Trust initiatives. John will help educate CISOs on what they should be doing now to get ahead of the risk, including:
    Agent inventory
    Data security controls, including data model poisoning
    Agent identity controls, including authorization and access levels
    Infrastructure security controls, including MCP servers
    Why More Technology Hasn’t Made Us More Secure Despite massive investment in cybersecurity tools, organizations remain vulnerable because their existing technologies are often misconfigured, poorly integrated, and disconnected from real operational risk. This keynote argues that complexity, human decision‑making, and gaps in execution—not a lack of products—are what truly empower attackers, especially as modern environments like cloud and SaaS expand the attack surface. Real security comes from simplifying, aligning, and expertly orchestrating what organizations already own, shifting the focus from buying tools to achieving disciplined, resilient outcomes grounded in breach reality.
    This segment is sponsored by Fenix24. Visit https://securityweekly.com/fenix24rsac to learn more about them!
    Downtime: The New Economic Threat Downtime is costing global enterprises hundreds of billions of dollars in losses annually. Caused by cyber incidents and software failures, enterprise CISOs are searching for strategies and solutions that will accelerate recovery and restoration of business operations after cyber disruptions render systems inoperable.
    This segment is sponsored by Absolute Security. Visit https://securityweekly.com/absolutersac to join The Resilient CISO Inner Circle!
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://securityweekly.com/bsw-442
  • Security Weekly Podcast Network (Audio)

    Cthullu, BlueHammer, NK, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland - SWN #570

    2026/04/07 | 32 mins.
    Radioactive Twinkies, Cthullu, BlueHammer, North Korea, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland, and More on the Security Weekly News.
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-570
  • Security Weekly Podcast Network (Audio)

    AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - Idan Plotnik, Raj Mallempati - ASW #377

    2026/04/07 | 1h 8 mins.
    Security problems aren't changing very much even though security teams are. We catch up on the implications of the Claude Code source leak, the very human lessons from the axios NPM compromise, and what secure design looks like when it involves agents, humans, or both.
    AppSec has always celebrated interesting and impactful vulns. And LLMs are now a favored tool for finding flaws. We shouldn't forget the success and effectiveness of fuzzers like OSS-Fuzz, which has improved security for over 1,000 projects and found over 50,000 bugs. But we can't ignore the ease of prompting an agent to go find -- and exploit -- a vuln when the UX and overhead of doing so is hardly more than writing some markdown.
    The SDLC Blind Spot: Why Breaches Start with Identity, Not Code
    Developers have access to source code, CI/CD pipelines, and cloud infrastructure — and attackers know it. Target lost 860GB of source code through a single compromised credential. Recruitment fraud campaigns have pivoted from a compromised developer to cloud admin in under 10 minutes. As agents join human developers, contractors, and service accounts in the SDLC, the attack surface is expanding faster than static security tools can track. Security teams need real-time visibility beyond code and into who has access and what they're actually doing.
    This segment is sponsored by Apiiro. To lean more, visit https://securityweekly.com/apiirorsac.
    How AI-Driven Development is Reshaping the Application Risk Landscape
    Agent coding assistants are accelerating software development, generating more code and more change than security teams were built to handle. In this interview, Idan Plotnik discusses how AI-driven development is reshaping the application risk landscape and why traditional vulnerability management models can’t keep up.
    Make sure to schedule a free SDLC Risk Assessment with BlueFlag Security - 30 minutes to deploy. 48 hours to results. Please visit https://securityweekly.com/blueflagrsac.
    Visit https://www.securityweekly.com/asw for all the latest episodes!
    Show Notes: https://securityweekly.com/asw-377

More News podcasts

About Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Podcast website

Listen to Security Weekly Podcast Network (Audio), Global News Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Security Weekly Podcast Network (Audio): Podcasts in Family