Player FM - Internet Radio Done Right
Checked 4d ago
Ditambah four tahun yang lalu
Kandungan disediakan oleh Security Weekly Productions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Security Weekly Productions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !
Pergi ke luar talian dengan aplikasi Player FM !
Podcast Berbaloi untuk Didengar
DITAJA
E
Exile


1 Episode 21: The Heiress Who Helped End School Segregation 35:10
35:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai35:10
Hilde Mosse comes from one of the wealthiest families in Berlin and stands to inherit an enormous fortune. But she longs for something more meaningful than the luxurious lifestyle her family provides. So Hilde decides to pursue her dream of becoming a doctor. As the Nazis take power in Germany and the Mosse family is forced to flee, Dr. Hilde Mosse lands in New York having nearly lost everything.. She finds her calling treating the mental health of Black youth – and the symptoms of a racist system. In addition to photographs, school records, and correspondence spanning Hilde Mosse’s entire lifetime, the Mosse Family Collection in the LBI Archives includes the diaries she kept between 1928 and 1934, from the ages of 16-22. Hilde’s papers are just part of the extensive holdings related to the Mosse Family at LBI. Learn more at lbi.org/hilde . Exile is a production of the Leo Baeck Institute, New York and Antica Productions. It’s narrated by Mandy Patinkin. This episode was written by Lauren Armstrong-Carter. Our executive producers are Laura Regehr, Rami Tzabar, Stuart Coxe, and Bernie Blum. Our producer is Emily Morantz. Research and translation by Isabella Kempf. Voice acting by Hannah Gelman. Sound design and audio mix by Philip Wilson. Theme music by Oliver Wickham. Please consider supporting the work of the Leo Baeck Institute with a tax-deductible contribution by visiting lbi.org/exile2025 . The entire team at Antica Productions and Leo Baeck Institute is deeply saddened by the passing of our Executive Producer, Bernie Blum. We would not have been able to tell these stories without Bernie's generous support. Bernie was also President Emeritus of LBI and Exile would not exist without his energetic and visionary leadership. We extend our condolences to his entire family. May his memory be a blessing. This episode of Exile is made possible in part by a grant from the Conference on Jewish Material Claims Against Germany, which is supported by the German Federal Ministry of Finance and the Foundation Remembrance, Responsibility and Future.…
Enterprise Security Weekly (Video)
Tandakan semua sebagai (belum) dimainkan
Manage series 2794678
Kandungan disediakan oleh Security Weekly Productions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Security Weekly Productions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
1056 episod
Tandakan semua sebagai (belum) dimainkan
Manage series 2794678
Kandungan disediakan oleh Security Weekly Productions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Security Weekly Productions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
1056 episod
Tutti gli episodi
×E
Enterprise Security Weekly (Video)

1 The dark side of security leadership, will agentic be a thing, OWASP AI resources - ESW #394 51:13
51:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai51:13
In this week's enterprise security news, we've got 5 acquisitions Tines gets funding new tools and DFIR reports to check out A legal precedent that could hurt AI companies AI garbage is in your code repos the dark side of security leadership HIPAA fines are broken Salt Typhoon is having a great time Don't use ChatGPT for legal advice!!!!! All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-394…
E
Enterprise Security Weekly (Video)

1 A SecOps Medley: we talk automation, AI, data management, and EDR evaluations - Allie Mellen - ESW #394 32:08
32:08
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai32:08
We couldn't decide what to talk to Allie about, so we're going with a bit of everything. Don't worry - it's all related and ties together nicely. First, we'll discuss AI and automation in the SOC - Allie is covering this trend closely, and we want to know if she's seeing any results yet here. Next, we'll discover SecOps data management - the blood that delivers oxygen to the SOC muscles. Finally, we'll discuss MITRE's recent EDR evaluations - there was some contention around some vendors claiming to ace the test and we're going to get the tea on what's really going on here! For each of these three topics, these are the blog posts they correspond with if you want to learn more: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) If You’re Not Using Data Pipeline Management For Security And IT, You Need To Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes Show Notes: https://securityweekly.com/esw-394…
E
Enterprise Security Weekly (Video)

1 Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Tim MalcomVetter - ESW #394 31:58
31:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai31:58
We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without the use of generative AI . Not only that, but he intends to back it up by tracking the quality of this automated work with an ISO standard unknown to cybersecurity. I've often found useful lessons and wisdom outside security, so I get excited when someone borrows from another, more mature industry to help solve problems in cyber. In this case, we'll be talking about Acceptable Quality Limits (AQL), an ISO standard quality assurance framework that's never been used in cyber. Segment Resources: Introducing AQL for cyber. AQL - How we do it An AQL 'calculator' you can play around with Show Notes: https://securityweekly.com/esw-394…
E
Enterprise Security Weekly (Video)

1 Breach details need to be transparent and kids need cybersecurity education - ESW #393 48:10
48:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai48:10
This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-393…
E
Enterprise Security Weekly (Video)

1 Inside look and lessons from a Recent APT Attack on a U.S. Aerospace Company - John Dwyer - ESW #393 31:32
31:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai31:32
Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B or C team? They seemed to be having a hard time Their target was a blind spot for both the defender AND the attacker Segment Resources: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ https://www.theregister.com/2024/09/18/chinese spies found on us hq firm_network/ Show Notes: https://securityweekly.com/esw-393…
E
Enterprise Security Weekly (Video)

1 The groundbreaking technology addressing employment scams and deepfakes - Aaron Painter - ESW #393 30:04
30:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai30:04
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was a no-brainer for Nametag to build a solution around mobile devices to address employment scams. Segment Resources: Company website Aaron's book, Loyal Show Notes: https://securityweekly.com/esw-393…
E
Enterprise Security Weekly (Video)

1 Semgrep non-drama, Facebook hates Linux - Vulns in Cars, Cell Towers, M365, and more - ESW #392 56:54
56:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai56:54
This week in the enterprise security weekly news, we discuss funding and acquisitions Understanding the Semgrep license drama Ridiculous vulnerabilities everywhere: vulns to take down your entire city’s cell service vulns to mess with your Subarus vulns in Microsoft 365 authentication cybersecurity regulations are worthless Facebook is banning people for mentioning Linux Vigilantes on Github Mastercard DNS error Qubes OS Turning a "No" into a conversation All that and more, on this episode of Enterprise Security Weekly! Show Notes: https://securityweekly.com/esw-392…
E
Enterprise Security Weekly (Video)

1 Special Breaking AI News - there's too much AI news, can we please stop - ESW #392 41:44
41:44
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai41:44
This week, we've added an extra news segment just on AI. Not because we wanted to, but because the news cycle has bludgeoned us into it. My mom is asking about Chinese AI, my neighbor wants to know why his stocks tanked, my clients want to know how to prevent their employees from using DeepSeek, it's a mess. First, a DeepSeek primer, so we can make sure all Enterprise Security Weekly listeners know what they need to know. Then we get into some other AI news stories. DeepSeek Primer I think the most interesting aspect of the DeepSeek announcements is the business/market impact, which isn't really security-related, but could have some impact on security teams. By introducing models that are cheaper to train, sell access to, and less demanding to run on systems, DeepSeek has opened up more market opportunities. That means we'll see generative AI used in markets and ways that didn't make sense before, because it was too expensive. Another aspect that's really confusing is what DeepSeek is or does. For the most part, when someone says "DeepSeek", they could be referring to: the company the open source models released by the company the SaaS service ( https://chat.deepseek.com ) the mobile app (which is effectively just a front end for #3) the API (which is what the mobile app and SaaS service are built on top of) From a security perspective, there's little to no operational risk around downloading and using the models, though they're likely to get banned, so companies could get in trouble for using them. As for the app, API, or SaaS service, assume everything you type into them is getting collected by China (so, significantly less safe, probably no US companies should do this). But because these services are crazy cheap right now, I wouldn't be surprised if some suppliers and third parties will start using DeepSeek - if your third party service provider is using DeepSeek behind the scenes with your data, you still have problem #2, so best to ensure they're not doing this through updated contract language and call to confirm that they're not currently doing it (can take a while to get a new contract in place). Show Notes: https://securityweekly.com/esw-392…
E
Enterprise Security Weekly (Video)

1 The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392 33:13
33:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai33:13
Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in the cybersecurity field, as well as the progress made in recent years. Women bring exceptional skills and knowledge to cybersecurity; however, it is estimated that they make up only 20% to 25% of the cybersecurity workforce—a percentage that has remained stagnant for years. Even more concerning, women often hit a glass ceiling just six to ten years into their cybersecurity careers. Lynn Dohm sheds light on these issues and emphasizes what the industry needs to focus on to continue celebrating and elevating women in cyber. Segment Resources: 2023 State of Inclusion Benchmark in Cybersecurity 2024 Cyber Talent Study by N2K and WiCyS WiCyS Programs Show Notes: https://securityweekly.com/esw-392…
E
Enterprise Security Weekly (Video)

1 IPOs are back, AI jumps the shark, NGFWs have some serious security issues - ESW #391 1:01:02
1:01:02
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai1:01:02
In this week's enterprise security news, the first cybersecurity IPO in 3.5 years! new companies new tools the fate of CISA and the cyber safety review board things we learned about AI in 2024 is the humanless SOC possible? NGFWs have some surprising vulnerabilities what did generative music sound like in 1996? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-391…
E
Enterprise Security Weekly (Video)

1 Guiding an Open Source-Based Business Through Troubled Times - Francis Dinha - ESW #391 32:53
32:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai32:53
This interview is a bit different from our norm. We talk to the founder and CEO of OpenVPN about what it is like to operate a business based on open source, particularly through trying times like the recent pandemic. How do you compete when your competitors are free to build products using your software and IP? It seems like an oxymoron, but an open source-based business actually has some significant advantages over the closed source commercial approach. Show Notes: https://securityweekly.com/esw-391…
E
Enterprise Security Weekly (Video)

1 AI Red Teaming Comes to Bug Bounties - Michiel Prins - ESW #391 33:31
33:31
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai33:31
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for assistance with scaling this work, though, as we'll discuss on this episode, it is unlike anything bug hunters have ever tackled before. Segment Resources: https://www.hackerone.com/ai/snap-ai-red-teaming https://www.hackerone.com/thought-leadership/ai-safety-red-teaming Show Notes: https://securityweekly.com/esw-391…
E
Enterprise Security Weekly (Video)

This week in the enterprise news - Cymulate acquires CYNC Secure, Tidal Cyber acquires Zero-Shot, Amazon ransomware attack, and more! Show Notes: https://securityweekly.com/esw-390
E
Enterprise Security Weekly (Video)

1 50,000 critical exposures + one of the most vulnerable IT environments: our schools - Kiran Chinnagangannagari, Jeff Smith - ESW #390 33:34
33:34
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai33:34
I've been so excited to see the external attack surface management (EASM) market take off in the past few years. This market category focuses exclusively on security issues exposed to the public Internet - issues ANYONE can see. All organizations have exposure management problems, but industries that are traditionally underfunded when it comes to cybersecurity and IT are particularly worse off. We see breaches in these industries every day - industries like manufacturing, healthcare, and education. Of course, exposure issues don't stop at the network boundary - all organizations have internal exposures to worry about as well. With all the breaches we see every week, we've become somewhat desensitized to them. Is it possible to address even just the most critical exposures (a fraction of 1% of all vulnerabilities) in one of the most underfunded industries? In this episode, we dive into how a small school system in New Mexico took on this challenge. Show Notes: https://securityweekly.com/esw-390…
E
Enterprise Security Weekly (Video)

1 The Next Era of Data Security: AI, Cloud, & Compliance - Dimitri Sirota - ESW #390 32:26
32:26
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai32:26
Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigID's CEO and Co-Founder, Dimitri Sirota, to learn how organizations can adopt a holistic approach to their data security and compliance strategy to keep up with the revolution in data, transforming their data into a competitive advantage. This segment is sponsored by BigID! Start protecting your sensitive data wherever your data lives at https://securityweekly.com/bigid . Show Notes: https://securityweekly.com/esw-390…
Selamat datang ke Player FM
Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.