For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Hosted by Paul Asadoorian and John Strand.
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Hosted by Paul Asadoorian, Matt Alderman and John Strand.
The latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
The straight up security news in 20 minutes or less! Links to all news articles are included here.
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
A
Application Security Weekly (Audio)


1
Application Security Weekly (Audio)
Mike Shema, John Kinsella, Matt Alderman - Security Weekly
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
Geeks Kickin' Ash! Tune into the Stogie Geeks show for interviews, cigar reviews, and how-to segments!
The show all about cigars and cigar smoking! Cigar reviews, including every price range, from new to vintage. Paul and Joe Hozempa talk about the latest cigar news, cigars we've smoked, and how-to segments. Its all about cigars! Geeks Kickin' Ash!
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
G
Getting the Real Work Done in Cybersecurity (Video)


1
Getting the Real Work Done in Cybersecurity (Video)
Security Weekly
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
G
Getting the Real Work Done in Cybersecurity (Audio)


1
Getting the Real Work Done in Cybersecurity (Audio)
Security Weekly
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
P
Paul's Security Weekly TV


1
Evil Encryption, CyberSec Funding, Market Downturns, & Crypto Muggings - ESW #274
39:35
39:35
Play later
Play later
Lists
Like
Liked
39:35
In the Enterprise Security News: The latest cybersecurity fundraising, We discuss the impact of the market downturn on the cybersecurity startup industry, Crypto muggings, Security researchers researching researchers simulating attackers, & Evil Encryption! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://se…
P
Paul's Security Weekly TV


1
Windows GPU Display Vulns, NFT Discord Hack, Costa Rica Vs. Hackers, & Initial Access - PSW #741
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01
In the Security News for this week: Singapore launches safety rating system for e-commerce sites, Watch Out for Zyxel Firewalls RCE Vulnerability, New Bluetooth hack that can unlock your Tesla, Hackers Compromise a String of NFT Discord Channels, a pentester’s attempt to be ‘as realistic as possible’ backfires, & more! Visit https://www.securitywee…
P
Paul's Security Weekly TV


1
Where to Start Your Passwordless Journey? - Jackie Comp, Rolf Lindermann - ESW #274
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06
Migrating off passwords and legacy authentication is a journey. Nok Nok has worked with global brands to incorporate passwordless, next-generation authentication into their consumer apps leading to significant improvements in onboarding, authentication success, speed and reduction in fraud among many other benefits. Learn how these organizations ha…
P
Paul's Security Weekly TV


1
Attack Intelligence, Collective Defense, & Trends to Watch - Michael Ehrlich - ESW #274
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
Attack intelligence delivers customers actionable, relevant, and timely information. Learn why Collective Defense is an integral aspect of attack intelligence and hear about the cyber trends you need to watch. Segment Resources: https://www.ironnet.com/blog/what-is-attack-intelligence-and-why-do-you-need-it Visit https://www.securityweekly.com/esw …
E
Enterprise Security Weekly (Video)


1
Evil Encryption, CyberSec Funding, Market Downturns, & Crypto Muggings - ESW #274
39:35
39:35
Play later
Play later
Lists
Like
Liked
39:35
In the Enterprise Security News: The latest cybersecurity fundraising, We discuss the impact of the market downturn on the cybersecurity startup industry, Crypto muggings, Security researchers researching researchers simulating attackers, & Evil Encryption! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://se…
This week, in the first segment, Brian Glas answers the questions surrounding the next generations of AppSec professionals: What does it look like to try teaching cybersecurity at an undergraduate level? What are the goals and challenges faced when trying to help future generations learn what they need to know to contribute to this industry? Then, …
This week, in the first segment, Brian Glas answers the questions surrounding the next generations of AppSec professionals: What does it look like to try teaching cybersecurity at an undergraduate level? What are the goals and challenges faced when trying to help future generations learn what they need to know to contribute to this industry? Then, …
P
Paul's Security Weekly (Video-Only)


1
Windows GPU Display Vulns, NFT Discord Hack, Costa Rica Vs. Hackers, & Initial Access - PSW #741
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01
In the Security News for this week: Singapore launches safety rating system for e-commerce sites, Watch Out for Zyxel Firewalls RCE Vulnerability, New Bluetooth hack that can unlock your Tesla, Hackers Compromise a String of NFT Discord Channels, a pentester’s attempt to be ‘as realistic as possible’ backfires, & more! Visit https://www.securitywee…
P
Paul's Security Weekly TV


1
Firmware Security - Saumil Shah - PSW #741
59:24
59:24
Play later
Play later
Lists
Like
Liked
59:24
In this segment Saumil Shah joins us for a discussion on Firmware Security, complete with a fascinating first-hand demonstration! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw741
E
Enterprise Security Weekly (Video)


1
Where to Start Your Passwordless Journey? - Jackie Comp, Rolf Lindermann - ESW #274
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06
Migrating off passwords and legacy authentication is a journey. Nok Nok has worked with global brands to incorporate passwordless, next-generation authentication into their consumer apps leading to significant improvements in onboarding, authentication success, speed and reduction in fraud among many other benefits. Learn how these organizations ha…
P
Paul's Security Weekly TV


1
Year in Cyber Review 2021 - Robert Lee - PSW #741
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21
The past year has been filled with incredible changes in the cyber security landscape from ICS, Mobile, Cloud, and increased threats from Ransomware. This discussion will focus on crucial and quick discussions surrounding the cyber landscape that has changed quickly and forced organizations to consider revamping many of their policies and preparati…
E
Enterprise Security Weekly (Video)


1
Attack Intelligence, Collective Defense, & Trends to Watch - Michael Ehrlich - ESW #274
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
Attack intelligence delivers customers actionable, relevant, and timely information. Learn why Collective Defense is an integral aspect of attack intelligence and hear about the cyber trends you need to watch. Segment Resources: https://www.ironnet.com/blog/what-is-attack-intelligence-and-why-do-you-need-it Visit https://www.securityweekly.com/esw …
P
Paul's Security Weekly (Video-Only)


1
Firmware Security - Saumil Shah - PSW #741
59:24
59:24
Play later
Play later
Lists
Like
Liked
59:24
In this segment Saumil Shah joins us for a discussion on Firmware Security, complete with a fascinating first-hand demonstration! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw741
P
Paul's Security Weekly (Video-Only)


1
Year in Cyber Review 2021 - Robert Lee - PSW #741
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21
The past year has been filled with incredible changes in the cyber security landscape from ICS, Mobile, Cloud, and increased threats from Ransomware. This discussion will focus on crucial and quick discussions surrounding the cyber landscape that has changed quickly and forced organizations to consider revamping many of their policies and preparati…
P
Paul's Security Weekly TV


1
Typosquatting, Curl's Security Update, & OpenSSF's 10 Point Mobilization Plan - ASW #197
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22
This week in the AppSec News: Typosquatting spreads to Rust, curl fixes flaws in mishandling dots and slashes, OpenSSF invests in a mobilization plan for open source, interesting appsec from Black Hat Asia. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw197…
P
Paul's Security Weekly TV


1
Developing Future Cybersecurity Contributors - Brian Glas - ASW #197
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26
What does it look like to try teaching cybersecurity at an undergraduate level? What are the goals and challenges faced when trying to help future generations learn what they need to know to contribute to this industry? Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw197…
A
Application Security Weekly (Video)


1
Developing Future Cybersecurity Contributors - Brian Glas - ASW #197
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26
What does it look like to try teaching cybersecurity at an undergraduate level? What are the goals and challenges faced when trying to help future generations learn what they need to know to contribute to this industry? Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw197…
A
Application Security Weekly (Video)


1
Typosquatting, Curl's Security Update, & OpenSSF's 10 Point Mobilization Plan - ASW #197
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22
This week in the AppSec News: Typosquatting spreads to Rust, curl fixes flaws in mishandling dots and slashes, OpenSSF invests in a mobilization plan for open source, interesting appsec from Black Hat Asia. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw197…
P
Paul's Security Weekly


1
SWN #213 - "Brushing", CISA, Nebuchadnezzar, Lianjia, iPhone, Leaky Sites, & Elon Balks
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31
Dr. Doug talks: Elon balking, CISA, Nebuchadnezzar, Lianjia, iPhone hacks leaky sites, the EU, and Chinese fraud reports, along with Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://w…
S
Security Weekly News (Audio)


1
SWN #213 - "Brushing", CISA, Nebuchadnezzar, Lianjia, iPhone, Leaky Sites, & Elon Balks
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31
Dr. Doug talks: Elon balking, CISA, Nebuchadnezzar, Lianjia, iPhone hacks leaky sites, the EU, and Chinese fraud reports, along with Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://w…
S
Security Weekly News (Video)


1
Elon Balks, CISA, Nebuchadnezzar, Lianjia, iPhone, Leaky Sites, & "Brushing" - SWN #213
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31
Dr. Doug talks: Elon balking, CISA, Nebuchadnezzar, Lianjia, iPhone hacks leaky sites, the EU, and Chinese fraud reports, along with Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn213…
T
The Social-Engineer Podcast


1
Ep. 170 - Security Awareness Series - Rapport is the key to security with Adam Glick
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54
This month, Chris Hadnagy and Ryan MacDougall are joined by Adam Glick. Adam is currently the Chief Information Security Officer for SimpliSafe in Boston, MA. In this position and his previous jobs, Adam has had the responsibility of managing all matters pertaining to information security, risk, policy, and procedures. Adam is currently an adjunct …
P
Paul's Security Weekly TV


1
Becoming a Year Younger, Material Security, Tailscale, Radiflow, & Artic Wolf - ESW #273
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59
In the Enterprise News for this week: Funding announcements from Material Security, Abnormal, Teleport, Tailscale, Smallsetp, Phylum and more. Acquisitions include HDiv Security, and Radiflow. New product announcements from Siren, Corelight, Artic Wolf, Onapsis and Aqua. And, in other news, all South Koreans are about to become one year younger, & …
P
Paul's Security Weekly TV


1
Overcoming Challenges in Multinational Phishing Simulations - Omer Taran - ESW #273
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
According to CybeReady, during such turbulent times, one should regard all emails with extra caution and double-check the sender’s address carefully. Beware of requests that ask for technical assistance such as running software or helping to take down websites. These might not only be illegal but may also be used to hack systems on the corporate ne…