PodcastsNewsSecurity Weekly Podcast Network (Audio)

Security Weekly Podcast Network (Audio)

Security Weekly Productions
Security Weekly Podcast Network (Audio)
Latest episode

3359 episodes

  • Security Weekly Podcast Network (Audio)

    Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - Alexandre Sieira, Lenny Zeltser, Helen Patton - ESW #452

    2026/03/30 | 1h 50 mins.
    Interview with Helen Patton about her new book, Switching to Cyber
    Helen joins us to discuss her second book, "Switching to Cyber." Her first book discussed strategies for handling various stages of the cybersecurity career, while this one, co-written with Josiah Dykstra, provides a guide for switching to cyber mid-career.
    Check out her book, Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career:
    on Amazon
    on Barnes & Noble
    and on the publisher's website
    Interview with Lenny Zeltzer: Reflections on Being a CISO
    After a cybersecurity career in various roles, doing everything from product management to malware analysis training, Lenny spent 6 years in the CISO seat at Axonius, from near the inception of the company through its growth from its modest Series A stage in 2019 to the present, with nearly a billion in funding today.
    Lenny's CISO Essays:
    What Being a CISO Taught Me About Security Leadership
    As a CISO, Are You a Builder, Fixer, or Scale Operator?
    The Chief Insecurity Officer
    Interview with Alexandre Sieira: The state of TPCRM is shifting
    The gold standard for third party cyber risk management has long been the humble questionnaire. While we've seen security rating services companies generate scores by scanning a company's external resources. Both approaches are widely considered inaccurate for either creating trust relationships or determining the true risk of doing business with a third party.
    Every analysis of this problem comes to the same conclusion: without internal data about the state of systems and the security program, TPCRM can't improve substantially. Most this believe this to be an impossible problem: third parties would never share data this sensitive with a customer and first parties assume the same.
    What if they did?
    That's exactly the premise behind Tenchi Security, and Alexandre joins us to talk about how they've accomplished the 'impossible' in Brazil and aim to expand their success to the US.
    Resources:
    Thoughts from a panel discussion at a recent FS-ISAC event, shared on LinkedIn
    Predicts 2026: Third-Party Cybersecurity Risk Management Evolves for the AI Era (Gartner Subscribers only, sorry)
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-452
  • Security Weekly Podcast Network (Audio)

    Scam Baiting, AI, and the New Grift Economy, Part 2 - Rinoa Poison - SWN #567

    2026/03/27 | 34 mins.
    In this two-part interview, Rinoa Poison explores the mechanics of modern scams, the role of AI in making them more convincing, and the growing world of scam baiting. She also discusses the tactics, technical setups, and safety considerations behind wasting scammers’ time.
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-567
  • Security Weekly Podcast Network (Audio)

    Scanning The Internet with Linux Tools - PSW #919

    2026/03/26 | 1h 3 mins.
    In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include:
    Shodan | Passive recon — query existing scan data for exposed devices, services, and vulns | Passive (API) | Instant (no packets sent)
    ZMap | Host discovery — find live hosts with open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets/sec
    ZGrab2 | Application-layer handshakes — grab banners, certs, headers | L7 (30+ protocol modules) | Thousands of hosts/sec
    Nerva | Service fingerprinting — identify 140+ protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP, SCTP) | Fast, concurrent
    Nuclei | Template-based vulnerability scanning — default creds, exposed panels, known CVEs | L7 (HTTP, network) | Hundreds of targets/min
    Shannon | Vulnerability exploitation — AI-powered whitebox pentesting of web apps | Application | ~1-1.5 hrs per target
    edgescan.py | Automated pipeline — orchestrates all tools above into a single command | Orchestration | End-to-end
    Visit https://www.securityweekly.com/psw for all the latest episodes!
    Show Notes: https://securityweekly.com/psw-919
  • Security Weekly Podcast Network (Audio)

    Say Easy, Do Hard - Crypto-Agility - BSW #440

    2026/03/25 | 52 mins.
    With Q-day getting closer, regulatory guidance pushing firms to migrate to quantum security in the next five years, and an extensive remediation backlog waiting to be discovered, security leaders must start their quantum security migration today. Easier said than done. In this Say Easy, Do Hard segment, we discuss the quantum-safe journey using a framework for crypto-agility.
    In part 1, we define cryptographic agility, or crypto-agility for short, and why it's important. Crypto-agility is not just about transitioning to quantum-safe cryptography in the nimblest way possible, and it’s not something that can be achieved merely by updating encryption algorithms and protocols. Instead, you need to adapt your organization’s cryptographic architecture, automation, and governance to allow for greater control and flexibility.
    In part 2, we discuss a framework for discovery, prioritization, and remediation while keeping crypto-agility in mind. A quantum-safe journey requires:
    Inventory of Systems With Non-Quantum-Safe Algorithms And Protocols
    System Prioritization, Leading To A Migration Roadmap
    Remediation, Including Vendors And Partners
    Once a distant possibility, Q-Day is quickly approaching. Are you ready for 2030?
    Segment Resources:
    https://pqcc.org/wp-content/uploads/2025/05/PQC-Migration-Roadmap-PQCC-2.pdf
    https://pqcc.org/wp-content/uploads/2025/06/PQCC-Inventory-Workbook.xlsx
    https://qramm.org/learn/cryptoscan-guide.html
    https://research.ibm.com/blog/quantum-safe-cbomkit
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://securityweekly.com/bsw-440
  • Security Weekly Podcast Network (Audio)

    Scam Baiting, AI, and the New Grift Economy, Part 1 - Rinoa Poison - SWN #566

    2026/03/24 | 35 mins.
    Rinoa Poison joins Security Weekly News to break down the world of scam baiting, how modern scams are evolving, and why AI is making fraud harder to spot. In this two-part conversation, she shares how scam baiters operate, the risks involved, and what everyday people should know.
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-566

More News podcasts

About Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Podcast website

Listen to Security Weekly Podcast Network (Audio), The Intelligence from The Economist and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Security Weekly Podcast Network (Audio): Podcasts in Family