Novinky Magazín Security
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
Podcasts on security, militancy, conflict, International Relations, and more.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Learn how to think not what to think.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
In Gesprächen mit unabhängigen Experten aus allen Bereichen der IT-Security klärt unser Host Sandra Arcodia alle Fragen – von Cyberangriffen, Ethical Hacking und Cybersecurity über Künstliche Intelligenz bis hin zu rechtlichen Grundlagen & Tipps von erfolgreichen IT-Unternehmen. Der Cyber Heroes IT-Security Talk ist ein Podcast der Infinigate Deutschland GmbH.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
The Future of Security Operations Podcast is dedicated to empowering SecOps leaders to reimagine how their teams work so they can scale their security efforts and build a team that achieves more with less.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Eric solves a printing problem with money, Jon follows a band and gardens. Google uses ART to attack Gemini, o2 fixes an oopsie, genetically modified spiders produce red fluorescent silk, and Harvard's copy of the Magna Carta isn't what they originally thought. 0:00 - Introduction 9:56 - Attacking Gemini 14:36 - o2 Data Leak 21:28 - Gene Edited Spi…
…
continue reading
Chinese ‘kill switches’ found hidden in US solar farms저자 Carl Franklin
…
continue reading

1
EP2119: Forensic Day - I set up an SSH honeypot, and the internet is a scary place
9:30
9:30
나중에 재생
나중에 재생
리스트
좋아요
좋아요
9:30Sponsor by SEC Playground
…
continue reading

1
Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
24:49
24:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:49Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest George Finney, CISO, The University of Texas System – check out George’s new book plus all his other achievements at his website, WellAwareSecurity. Thanks to our show sponsor, Conveyor Still spending hours maintaining a massive sprea…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
25:57
25:57
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:57A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
…
continue reading

1
PODCAST | Regional chessboard and Pakistan | Ep # 440 (Urdu)
13:36
13:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:36PODCAST | Regional chessboard and Pakistan | Ep # 440 (Urdu)
…
continue reading
Helpful episodes to listen to first Unique Email Addresses Troy Hunt Phished Troy Hunt Part 2 Questions we answer in this episode Why is Makani sharing his story? What is a domain name registrar? What is whois data? How can it help me stay safe online? Episode summary A domain name is what we think of as a website - facebook.com or makanimason.com.…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
나중에 재생
나중에 재생
리스트
좋아요
좋아요
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading
This week, Scott sat down with a particularly baritone cast of Lawfare colleagues—co-host emeritus Benjamin Wittes, Foreign Policy Editor Dana Stuster, and Senior Editor (aka Legal Correspondent) Roger Parloff—to discuss the week’s biggest national security news stories, including: “Let’s Sheikh On It.” President Trump completed a surprisingly hist…
…
continue reading

1
S17 E04 (VIDEO) Adapting to AI & Rethinking What We Protect
53:22
53:22
나중에 재생
나중에 재생
리스트
좋아요
좋아요
53:22Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
…
continue reading

1
William F. Owen, "Euclid's Army: Preparing Land Forces for Warfare Today" (Howgate Publishing, 2024)
1:44:44
1:44:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:44:44Rejecting much of the conventional wisdom to what makes up a modern Army, William F. Owen's Euclid's Army: Preparing Land Forces for Warfare Today (Howgate Publishing Limited, 2025) massacres fields sacred cows to challenge many of the mainstream ideas about the future of land warfare and how it should be conducted. Based on his experience working …
…
continue reading

1
Under Fire: Supporting Navy Operations During the Red Sea Crisis
36:27
36:27
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:27Two CNA field analysts discuss their work assisting operations to ensure freedom of navigation in the Red Sea. Guest Biographies Dr. Keith Zirkle is a research scientist in CNA’s Fleet Operations and Assessments Program. He is CNA’s field representative at Naval Forces Central Command. Kevin O'Connell is a research analyst in CNA’s Fleet Operations…
…
continue reading

1
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
18:02
18:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:02In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Yash Shahani, a seasoned AppSec engineer and vulnerability hunter, to dive into the nuances of manual code review and the limitations of automated security tools. They explore the evolving role of AI in AppSec, its promise and pitfalls, and why human intuition still plays …
…
continue reading

1
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
1:17:08
1:17:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:17:08In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
…
continue reading

1
SN 1026: Rogue Comms Tech Found in US Power Grid - Is AI Replicating Itself?
2:47:03
2:47:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:47:03Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's re…
…
continue reading

1
Making Security Decisions in an Unstable or Chaotic Environment
15:54
15:54
나중에 재생
나중에 재생
리스트
좋아요
좋아요
15:54Dave Coxe, CEO and Co-Founder of ID Dataweb, discusses how leaders can make security decisions in unstable or chaotic environments.
…
continue reading

1
RegScale’s Travis Howerton on taking the pain out of compliance in highly-regulated industries
47:37
47:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:37In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficien…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into Microsoft's new feature, Security Exposure Management (XSPM). They discuss the evolution of vulnerability management, the importance of understanding exposure management, and the five phases of continuous threat exposure management. The conversation also covers lic…
…
continue reading
In this episode, Brian interviews Doug Landoll, a cybersecurity expert and assessment specialist with over 30 years of experience. They discuss the nuances of cybersecurity assessments versus compliance, the importance of continuous improvement in security practices, and common mistakes organizations make. Doug shares insights on navigating maturit…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Charlotte Wylie, Rami Saas - ASW #331
1:01:48
1:01:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading
Was genau versteht man unter einem modernen MSP? Wie hat sich dieses Rollenbild in den letzten Jahren verändert? Wie schafft man den Spagat zwischen Effizienz und echter Sicherheit? Diese Fragen werden in dieser Podcast Folge zum Thema MSPs von Anita van de Meulenhof, MSP Channel Account Executive – Sophos, beantwortet. Cyber Heroes ist der deutsch…
…
continue reading

1
E2EE Storage Done Right with Matilda Backendal Jonas Hofmann and Kien Tuong Trong
1:02:25
1:02:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:02:25It seems like everyone that tries to deploy end-to-end encrypted cloud storage seems to mess it up, often in new and creative ways. Our special guests Matilda Backendal, Jonas Hofmann, and Kien Tuong Trong give us a tour through the breakage and discuss a new formal model of how to actually build a secure E2EE storage system. Watch on YouTube: http…
…
continue reading
Unauthorized site access remains a significant security concern for organizations. But why does this issue persist, and how can it be effectively addressed? In this episode, Rob Allen, chief product officer at ThreatLocker, discusses the core functionality of ThreatLocker's Web Control solution: blocking access to unauthorized sites without meddlin…
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - Bri Frost, David Aviv, Marshall Erwin - ESW #407
2:12:42
2:12:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading
Send us a text저자 mnemonic
…
continue reading
I recently had a chat with Kairo about a project he maintains called Repository Service for TUF (RSTUF). We explain why TUF is tough (har har har), what RSTUF can do, and some of the challenges around securing repositories. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2025/2025-05-rstuf-with-kairo-de-a…
…
continue reading
ベライゾンが毎年発行しているDBIRの2025年度版が 今年もリリースされました。 18年目の今年は、どんな内容になっているのでしょうか。 マークさんが最速解説いたします。 DBIR2025(英語版) https://www.verizon.com/business/ja-jp/resources/reports/dbir/ DBIR2024解説 https://audee.jp/voice/show/82416저자 ベライゾンジャパン
…
continue reading
In this episode, Michael, Sarah, and Mark talk to Craig Nelson, VP of the Microsoft Red Team about how the Red Team works to help secure Microsoft and its customers. In life, there are things you know you know, things you know you don't know, and finally, things you don't know you don't know. This episode is full of the latter. We also cover securi…
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-477
…
continue reading
Hey friends! Today Joe “The Machine” Skeen and I tackled GOAD (Game of Active Directory) again – this time covering: SQL link abuse between two domains Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local! Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!…
…
continue reading
On this episode of SecurityDNA, Steve Lasky invites International SOS Senior Security Advisor Rich Davis to the discussion table. Davis brings his extensive background in aviation security to the podium today to discuss the long-awaited REAL ID implementation and how it will impact airport security, operations, and the traveler experience. Rich Dav…
…
continue reading

1
024 - Minimize What Can Be Known with the OSINT Defense & Security Framework (OSDF)
42:19
42:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:19In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating s…
…
continue reading
In this episode, Jerry and Andrew discuss the importance of data security, phishing attacks targeting hiring managers, the implications of paying ransoms, and the recent Disney data breach incident. They emphasize the need for better training for employees and the challenges of managing software supply chains. The conversation highlights the evolvi…
…
continue reading

1
E7 - Where SSE Falls Short: A Deep Dive into Last-Mile Security Gaps
23:02
23:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:02🔍 Are SSEs Really Securing the Last Mile? In this episode, we break down the hidden architectural gaps in Security Service Edge (SSE) platforms—specifically where they fall short in protecting the browser, where today’s real threats unfold. 📉 Despite vendor claims, SSEs are blind to: Copy/paste data leakage Malicious browser extensions Shadow SaaS …
…
continue reading