www.scworld.com Open in urlscan Pro
2606:4700:20::681a:546  Public Scan

Submitted URL: https://go.cyberriskalliance.com/dc/-vMdw_6ux1ia6WSIpe-Hq30hCxHBfdN2BEOFBJGyeD2z_CcJPV7ewYkONK8lsn0WD-UU9nJCTVXY8UkP59BnSBZ25VRKy...
Effective URL: https://www.scworld.com/security-weekly?utm_source=marketing-campaign&utm_medium=email&utm_campaign=sw-user-engagement&n...
Submission: On October 31 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
CISO Stories
Topics
Topic Hubs
Events
Podcasts
Research
Recognition
About
Open Search Bar


THE CYBERSECURITY PODCAST NETWORK - SECURITY WEEKLY | SC MEDIA

ADVERTISEMENT


SUBSCRIBEHOSTSPARTNERSLISTENER INTEREST LISTPARTNER WITH USSUGGEST A GUEST


FEATURED PODCAST

IoT

EDR IS DEAD, EDR IS NOT DEAD – PSW #849

RECENT PODCASTS

 * Vulnerability Management
   
   HALLOWEEN, TIKTOK, TELCOS, WIN 11, FIVE EYES, AWS, FRANCE, CHATGPT, AND MORE…
   – SWN #426

 * Application security
   
   PROTECTING IDENTITY OF AI AGENTS & STANDARDIZING IDENTITY SECURITY FOR SAAS
   APPS – SHIVEN RAMJI, ARNAB BOSE – ASW #305

 * Leadership
   
   THE CISO MINDSET, TOP STRATEGIES, AND MANDATING OFFICE PRESENCE WITHOUT
   PURPOSE – BSW #370

ADVERTISEMENT



ADVERTISEMENT




SHOWS

PAUL'S SECURITY WEEKLYSUBSCRIBECONTACT

 * Vulnerability Management
   
   NOT THE VULNERABILITIES YOU’RE LOOKING FOR – PSW #848

 * Cloud Security
   
   SECURE BY DEFAULT – HOW DO WE GET THERE? – ANDY SYREWICZE – PSW #848

 * Vulnerability Management
   
   EVERYTHING IS OVERRATED – PSW #847

 * Vulnerability Management
   
   EFFECTIVE OPERATIONAL OUTCOMES – KEN DUNHAM – PSW #847

 * Vulnerability Management
   
   THE SAGA CONTINUES – PSW #846

ENTERPRISE SECURITY WEEKLYSUBSCRIBECONTACT

 * Leadership
   
   ERA OF BOT BATTLERS & SECURITY FOCUSED COMPANY CULTURE – ESW #381

 * Breach
   
   TRANSFORMING THE DEFENDER’S DILEMMA INTO THE DEFENDER’S ADVANTAGE – LENNY
   ZELTSER – ESW #381

 * Security Program Controls/Technologies
   
   CYBER SECURITY AWARENESS FOR ELECTION AND POLL WORKERS – KIRSTEN DAVIES – ESW
   #381

 * Leadership
   
   ALTERNATIVE CISO CAREER PATHS, BUDGET PLANNING, AND ONE EASY TRICK TO BYPASS
   EDR! – ESW #380

 * Security Program Controls/Technologies
   
   CYBERSECURITY SUCCESS IS BUSINESS SUCCESS – THERESA LANOWITZ – ESW #380

BUSINESS SECURITY WEEKLYSUBSCRIBECONTACT

 * Leadership
   
   STAY AHEAD OF IDENTITY THREATS & ADDRESSING CYBERSECURITY DISPARITIES – DAVID
   BRADBURY, ERIN BAUDO FELTER – BSW #370

 * Risk Assessments/Management
   
   ALIGNING TECH EXECS ON CYBER RESILIENCE – THERESA LANOWITZ – BSW #369

 * Leadership
   
   CEO ACCOUNTABILITY AS CISOS CONCERNED OVER DEMANDS AND MEASURED BY
   PROFIT/COST – BSW #369

 * Leadership
   
   BUDGET PLANNING GUIDE 2025: SECURITY AND RISK – JEFF POLLARD – BSW #368

 * Leadership
   
   SETTING THE TONE AT THE TOP AS CISOS AND C-SUITE REMAIN AT ODDS – BSW #368

APPLICATION SECURITY WEEKLYSUBSCRIBECONTACT

 * Application security
   
   MAKING TLS MORE SECURE, LESSONS FROM IPV6, LLMS FINDING VULNS – ASW #305

 * Application security
   
   JSON PARSING, EMAIL PARSING, CISA’S BAD PRACTICES GUIDE, ABUSING DISCLOSURE
   POLICIES – ASW #304

 * Cloud Security
   
   THE COMPLEXITIES, CONFIGURATIONS, AND CHALLENGES IN CLOUD SECURITY – SCOTT
   PIPER – ASW #304

 * Application security
   
   PERL & PHP VULNS, FUZZING & PARSERS, PROTECTING MULTI-HOSTED TENANTS, SECURE
   DESIGN – ASW #303

 * Application security
   
   RCE FROM ICONV + PHP, FUZZING A CODEC, FUZZING LLMS, REVISITING RECALL – ASW
   #302

SECURITY WEEKLY NEWSSUBSCRIBECONTACT

 * Vulnerability Management
   
   TOURISTS, FORTIS, APPS, TLP, AWS, GOOGLE, CHATBOTS, AARAN LEYLAND, AND MORE…
   – SWN #425

 * Vulnerability Management
   
   DOOM BRAIN, E2EE, OT, ADLOAD, CISCO, VMWARE, INTERNET ARCHIVE, JOSH MARPET …
   – SWN #424

 * Vulnerability Management
   
   STEALING, KUBERNETES, PASSKEYS, SOLARWINDS, INTEL, SEXTORTION, AND… – SWN
   #423

 * Vulnerability Management
   
   STEGO, UBLOCK, PPTP, LOG4J, COMMAND JACKING, WINDOWS 10, FEET, JOSH MARPET,
   AND MORE. – SWN #422

 * Vulnerability Management
   
   CYBERCAB, GOLDEN JACKAL, MAMBA 2FA, MICROSOFT, IPHONE THIEVES, ESIMS, AARAN
   LEYLAND.. – SWN #421


PODCAST SERIES

BELOW THE SURFACE: THE SUPPLY CHAIN SECURITY PODCASTSUBSCRIBECONTACT

 * Supply chain
   
   SUPPLY CHAIN POLICIES – STEWART SCOTT, TREY HERR – BTS #36

 * Vulnerability Management
   
   THE KNOWN EXPLOITED VULNERABILITY CATALOGUE, AKA THE KEV – TOD BEARDSLEY –
   BTS #35

 * Vulnerability Management
   
   EPSS – THE EXPLOIT PREDICTION SCORING SYSTEM – JAY JACOBS, WADE BAKER – BTS
   #34

 * Critical Infrastructure Security
   
   SECURING OT ENVIRONMENTS – DR. ED HARRIS – BTS #33

 * Supply chain
   
   MITRE ATT&CK – ADAM PENNINGTON – BTS #32


ARCHIVED SHOWS

SECURE DIGITAL LIFESUBSCRIBECONTACT

 * MOCK INTERVIEW, Q&A –

 * MOCK INTERVIEW, Q&A – SECURE DIGITAL LIFE #114

 * PRODUCING A PODCAST –

 * PRODUCING A PODCAST – SECURE DIGITAL LIFE #113

 * GAME CONSOLES –

SECURITY & COMPLIANCE WEEKLYSUBSCRIBECONTACT

 * Compliance Management
   
   THE SECURITY HIPPIE, PART 1 – BARAK ENGEL – SCW #99

 * Compliance Management
   
   THE SECURITY HIPPIE, PART 2 – BARAK ENGEL – SCW #99

 * Compliance Management
   
   EVERYTHING YOU WANTED TO KNOW ABOUT CISOS BUT WERE AFRAID TO ASK, PART 1 –
   BEN CARR – SCW #98

 * Leadership
   
   EVERYTHING YOU WANTED TO KNOW ABOUT CISOS BUT WERE AFRAID TO ASK, PART 2 –
   BEN CARR – SCW #98

 * HACKER SITUATIONAL AWARENESS, PART 1 – JOHN THREAT – SCW #97

TRADECRAFT SECURITY WEEKLYSUBSCRIBECONTACT

 * EVILGINX2 MAN-IN-THE-MIDDLE ATTACKS – TRADECRAFT SECURITY WEEKLY #29

 * GOOGLE EVENT INJECTION – TRADECRAFT SECURITY WEEKLY #20

 * DISSECTING XXE ATTACKS – TRADECRAFT SECURITY WEEKLY #19

 * PIVOTING TOOLS THROUGH METERPRETER – TRADECRAFT SECURITY WEEKLY #16

 * BLACK HAT & DEF CON 2017 – TRADECRAFT SECURITY WEEKLY #13


ARCHIVED SERIES

GETTING THE REAL WORK DONE IN CYBERSECURITYSUBSCRIBE

 * PURPLE TEAMING – PTMS #1

 * Vulnerability Management
   
   RED TEAMING – PTMS #2

 * BLUE TEAMING – PTMS #3

 * DEMOING PLEXTRAC: THE PURPLE TEAMING PLATFORM – PTMS #4


BLOG POSTS

 * INTRODUCING ‘CYBER FOR HIRE,’ A PODCAST THAT PLAYS MARRIAGE COUNSELOR BETWEEN
   MSSPS AND CLIENTS 
   
   Bradley Barth
   
   January 3, 2023

 * INCIDENT RESPONSE: PRACTICE LIKE YOU PLAY 
   
   Bill Brenner
   
   August 1, 2022

 * USER EXPERIENCE: A KEY TO EFFECTIVE VULNERABILITY MANAGEMENT
   
   Paul Asadoorian
   
   May 25, 2022

 * FORENSIC CHALLENGES FOR SECURITY PROFESSIONALS
   
   Bill Brenner
   
   April 19, 2022

 * CISA’S SHIELDS UP: WHAT IT IS, HOW TO USE IT
   
   Bill Brenner
   
   April 12, 2022

 * SHADOW CODE: A THIRD-PARTY BLIND SPOT
   
   Bill Brenner
   
   April 5, 2022

 * SECURITY HYGIENE, DOING ALL THE LITTLE THINGS RIGHT (ALL THE TIME)
   
   Bill Brenner
   
   March 21, 2022

 * SUCCESSFUL DEVOPS IN THE AGE OF SERVERLESS
   
   Bill Brenner
   
   March 15, 2022

 * THE UNIQUE CHALLENGES OF COMPANIES BORN IN THE CLOUD
   
   Bill Brenner
   
   March 9, 2022

 * RANSOMWARE DAMAGE CLAIMS DRIVING INSURANCE HIKES
   
   Deb Radcliff
   
   January 12, 2022

All Blog Posts


--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies