Security Weekly Podcast Network (@secweekly) 's Twitter Profile
Security Weekly Podcast Network

@secweekly

A CyberRisk Alliance Production

For Security Professionals, By Security Professionals.

#InfoSec #CyberSec #Podcast #Livestream

ID: 1166772071617224704

linkhttps://linktr.ee/securityweekly calendar_today28-08-2019 17:58:52

8,8K Tweet

4,4K Followers

1,1K Following

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Security Weekly Podcast Network @[email protected] While LLMs can catch "~50% under the bell curve" problems, they struggle with novel threats outside their training data—creating both opportunity and risk for AppSec teams. youtu.be/zn3LT4BqOJo?si…

SC Media (@scmagazine) 's Twitter Profile Photo

.Tines's Matt Muller discussed the evolution from legacy SOAR tools to the next-gen solutions transforming the industry on a recent Security Weekly Podcast Network podcast. Hear more about vulnerability management here: bit.ly/4l7YOZl #cybersecurity #infosec #ITsecurity

SolidityScan (@solidityscan) 's Twitter Profile Photo

Smart contract security takes center stage! Shashank | CredShields joined Security Weekly Podcast Network with Mike Shema to explore the OWASP Smart Contract Top 10, key vulnerabilities, and the role of AI in security automation. 🎙️ Watch the full discussion: youtube.com/watch?v=0GlIbG… 📘 Read the ASW March

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Day 3 at #RSAC2025: Our Security Weekly team is broadcasting live today from the CyberRiskTV Studio in Broadcast Alley at Moscone West! Join us in person at #RSAC or virtually at scmagazine.com/rsac

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like #EDR, #MDR, and #XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

This is an intro into Apiiro and it's CEO & Co-Founder, Idan Plotnik. We talk about the AI problem in #AppSec. youtu.be/lvUt-6jtQKY?si…

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Identity has long been the soft underbelly of cybersecurity—but with #AI, non-human identities (NHIs), and autonomous agents on the rise, it’s now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren’t just hacking systems anymore—they’re

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Gen AI is being adopted faster than company’s policy and data security can keep up, and as #LLMs become more integrated into company systems and uses leverage more #AI enabled applications, they essentially become unintentional data exfiltration points. These tools do not

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management,

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the

Security Weekly Podcast Network (@secweekly) 's Twitter Profile Photo

🚨 Compliance is NOT risk management. 🚨 In this clip from Business Security Weekly, Forrester's Alla Valente challenges the outdated belief that being compliant means being secure. 📉 84% of Fortune 500 companies would get a D in cybersecurity compliance — and 43% would fail