Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape.
Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Incident Response in 3.08 MB - Always nice to see folks, like our good friend and Stogie Geeks co-host Tim Mugherini, writing about tools that work. This product just sounds useful: The idea behind C…
Interview Dan Kuykendall
Dan manages NT OBJECTives’ software development and has an extensive background in web application development and security and is co-host of "An Information Security Place"…
Guest Tech Segment: Charlie Eriksen on Wordpress plugin security
In this technical segment, we will look at Charlie Eriksens research into Wordpress plugin security. By searching large amounts of co…
Interview Daniel Suarez
Daemon and Freedom were fairly epic. How difficult was it to begin Kill Decision knowing that you had a gang of fans with such high expectations for your next book? Tell us a…
Paul's Stories
A Guide To Network Vulnerability Management - Dark Reading - If you want the "training wheels" approach to vulnerability management, then you should read this article. However, the pr…
Interview with Jason Lam
Jason is the head of global threat management at a major financial institution based in Canada. Jason specializes in Web application security, and shares his research findin…
Show Notes: http://securityweekly.com/wiki/index.php/Episode301
Answers to Allison's Puzzle Contest, Paul's Stories:
100,000 Vulnerabilities - Security vulnerabilities measured in numbers is someti…
Interview with Marc Maiffret
Marc Maiffret is the Chief Technology Officer at BeyondTrust, a leading vulnerability and compliance management company, and was a co-founder of eEye Digital Security.
…
Hack your Car with CANBUS
A little into in a few minutes. yes, as implied, it is a BUS and you can gain access to it from the ODB-II port. Think a hub. All messages on a segment go to all devices on…
Guests: Ed Skoudis, Alex Horan, Ron Gula, Weasel
Once upon a time a big bad pen tester gets a contract with 3 little pigs, Inc. On the first test, he huffs, and he puffs and blows down the network m…
Automating Wifi Attacks by John Strand - In this Tech Segment we will talk about one of the easiest ways to create an evil access point to steal credentials. We will be using the very cool utility ca…
Guests: Wendy Nather, Iftach Amit, David Mortman, Dan Crowley, RSnake, David Maynor
"We have a firewall". "All of our systems use Anti-Virus software" "We've implemented the latest web application f…
Data Mining ETW - In this technical segment we will look at how to tap into the vast amounts of data logged by Windows Communication Foundation (WCF) and fed to Event Tracing for Windows (ETW). ETW P…