Podcasts
BTS #15 – Reverse Engineering BMCs and Other Firmware – Vladyslav Babkin
Show Notes The post BTS #15 - Reverse Engineering BMCs and Other Firmware - Vladyslav Babkin appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Crowdsourced Security-as-a-Service
TechSpective Podcast Episode 119 If you want to prevent threat actors from infiltrating or compromising your environment, it helps to see things from the threat actor perspective. This concept has been ...
Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development
Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again
In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with ...
BTS #14 – Protecting The Federal Supply Chain – John Loucaides
Show Notes: https://securityweekly.com/bts-14 Watch Subscribe The post BTS #14 - Protecting The Federal Supply Chain - John Loucaides appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...
Visibility Without Context Is Just Noise
TechSpective Podcast Episode 117 “You can’t protect what you can’t see.” The first time someone said that, I am sure it was very profound. It is an obvious statement, but also ...
Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge
In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing ...
Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount
APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...
Driving Security Culture and Best Practices
TechSpective Podcast Episode 117 Cybersecurity used to be more of a mystical dark art, but over time, businesses and individuals have come to understand just how critical cybersecurity is, and cybersecurity ...