www.scworld.com
Open in
urlscan Pro
2606:4700:20::681a:546
Public Scan
Submitted URL: https://go.cyberriskalliance.com/dc/-vMdw_6ux1ia6WSIpe-Hq30hCxHBfdN2BEOFBJGyeD2z_CcJPV7ewYkONK8lsn0WD-UU9nJCTVXY8UkP59BnSBZ25VRKy...
Effective URL: https://www.scworld.com/security-weekly?utm_source=marketing-campaign&utm_medium=email&utm_campaign=sw-user-engagement&n...
Submission: On October 31 via api from US — Scanned from US
Effective URL: https://www.scworld.com/security-weekly?utm_source=marketing-campaign&utm_medium=email&utm_campaign=sw-user-engagement&n...
Submission: On October 31 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Log inRegister CISO Stories Topics Topic Hubs Events Podcasts Research Recognition About Open Search Bar THE CYBERSECURITY PODCAST NETWORK - SECURITY WEEKLY | SC MEDIA ADVERTISEMENT SUBSCRIBEHOSTSPARTNERSLISTENER INTEREST LISTPARTNER WITH USSUGGEST A GUEST FEATURED PODCAST IoT EDR IS DEAD, EDR IS NOT DEAD – PSW #849 RECENT PODCASTS * Vulnerability Management HALLOWEEN, TIKTOK, TELCOS, WIN 11, FIVE EYES, AWS, FRANCE, CHATGPT, AND MORE… – SWN #426 * Application security PROTECTING IDENTITY OF AI AGENTS & STANDARDIZING IDENTITY SECURITY FOR SAAS APPS – SHIVEN RAMJI, ARNAB BOSE – ASW #305 * Leadership THE CISO MINDSET, TOP STRATEGIES, AND MANDATING OFFICE PRESENCE WITHOUT PURPOSE – BSW #370 ADVERTISEMENT ADVERTISEMENT SHOWS PAUL'S SECURITY WEEKLYSUBSCRIBECONTACT * Vulnerability Management NOT THE VULNERABILITIES YOU’RE LOOKING FOR – PSW #848 * Cloud Security SECURE BY DEFAULT – HOW DO WE GET THERE? – ANDY SYREWICZE – PSW #848 * Vulnerability Management EVERYTHING IS OVERRATED – PSW #847 * Vulnerability Management EFFECTIVE OPERATIONAL OUTCOMES – KEN DUNHAM – PSW #847 * Vulnerability Management THE SAGA CONTINUES – PSW #846 ENTERPRISE SECURITY WEEKLYSUBSCRIBECONTACT * Leadership ERA OF BOT BATTLERS & SECURITY FOCUSED COMPANY CULTURE – ESW #381 * Breach TRANSFORMING THE DEFENDER’S DILEMMA INTO THE DEFENDER’S ADVANTAGE – LENNY ZELTSER – ESW #381 * Security Program Controls/Technologies CYBER SECURITY AWARENESS FOR ELECTION AND POLL WORKERS – KIRSTEN DAVIES – ESW #381 * Leadership ALTERNATIVE CISO CAREER PATHS, BUDGET PLANNING, AND ONE EASY TRICK TO BYPASS EDR! – ESW #380 * Security Program Controls/Technologies CYBERSECURITY SUCCESS IS BUSINESS SUCCESS – THERESA LANOWITZ – ESW #380 BUSINESS SECURITY WEEKLYSUBSCRIBECONTACT * Leadership STAY AHEAD OF IDENTITY THREATS & ADDRESSING CYBERSECURITY DISPARITIES – DAVID BRADBURY, ERIN BAUDO FELTER – BSW #370 * Risk Assessments/Management ALIGNING TECH EXECS ON CYBER RESILIENCE – THERESA LANOWITZ – BSW #369 * Leadership CEO ACCOUNTABILITY AS CISOS CONCERNED OVER DEMANDS AND MEASURED BY PROFIT/COST – BSW #369 * Leadership BUDGET PLANNING GUIDE 2025: SECURITY AND RISK – JEFF POLLARD – BSW #368 * Leadership SETTING THE TONE AT THE TOP AS CISOS AND C-SUITE REMAIN AT ODDS – BSW #368 APPLICATION SECURITY WEEKLYSUBSCRIBECONTACT * Application security MAKING TLS MORE SECURE, LESSONS FROM IPV6, LLMS FINDING VULNS – ASW #305 * Application security JSON PARSING, EMAIL PARSING, CISA’S BAD PRACTICES GUIDE, ABUSING DISCLOSURE POLICIES – ASW #304 * Cloud Security THE COMPLEXITIES, CONFIGURATIONS, AND CHALLENGES IN CLOUD SECURITY – SCOTT PIPER – ASW #304 * Application security PERL & PHP VULNS, FUZZING & PARSERS, PROTECTING MULTI-HOSTED TENANTS, SECURE DESIGN – ASW #303 * Application security RCE FROM ICONV + PHP, FUZZING A CODEC, FUZZING LLMS, REVISITING RECALL – ASW #302 SECURITY WEEKLY NEWSSUBSCRIBECONTACT * Vulnerability Management TOURISTS, FORTIS, APPS, TLP, AWS, GOOGLE, CHATBOTS, AARAN LEYLAND, AND MORE… – SWN #425 * Vulnerability Management DOOM BRAIN, E2EE, OT, ADLOAD, CISCO, VMWARE, INTERNET ARCHIVE, JOSH MARPET … – SWN #424 * Vulnerability Management STEALING, KUBERNETES, PASSKEYS, SOLARWINDS, INTEL, SEXTORTION, AND… – SWN #423 * Vulnerability Management STEGO, UBLOCK, PPTP, LOG4J, COMMAND JACKING, WINDOWS 10, FEET, JOSH MARPET, AND MORE. – SWN #422 * Vulnerability Management CYBERCAB, GOLDEN JACKAL, MAMBA 2FA, MICROSOFT, IPHONE THIEVES, ESIMS, AARAN LEYLAND.. – SWN #421 PODCAST SERIES BELOW THE SURFACE: THE SUPPLY CHAIN SECURITY PODCASTSUBSCRIBECONTACT * Supply chain SUPPLY CHAIN POLICIES – STEWART SCOTT, TREY HERR – BTS #36 * Vulnerability Management THE KNOWN EXPLOITED VULNERABILITY CATALOGUE, AKA THE KEV – TOD BEARDSLEY – BTS #35 * Vulnerability Management EPSS – THE EXPLOIT PREDICTION SCORING SYSTEM – JAY JACOBS, WADE BAKER – BTS #34 * Critical Infrastructure Security SECURING OT ENVIRONMENTS – DR. ED HARRIS – BTS #33 * Supply chain MITRE ATT&CK – ADAM PENNINGTON – BTS #32 ARCHIVED SHOWS SECURE DIGITAL LIFESUBSCRIBECONTACT * MOCK INTERVIEW, Q&A – * MOCK INTERVIEW, Q&A – SECURE DIGITAL LIFE #114 * PRODUCING A PODCAST – * PRODUCING A PODCAST – SECURE DIGITAL LIFE #113 * GAME CONSOLES – SECURITY & COMPLIANCE WEEKLYSUBSCRIBECONTACT * Compliance Management THE SECURITY HIPPIE, PART 1 – BARAK ENGEL – SCW #99 * Compliance Management THE SECURITY HIPPIE, PART 2 – BARAK ENGEL – SCW #99 * Compliance Management EVERYTHING YOU WANTED TO KNOW ABOUT CISOS BUT WERE AFRAID TO ASK, PART 1 – BEN CARR – SCW #98 * Leadership EVERYTHING YOU WANTED TO KNOW ABOUT CISOS BUT WERE AFRAID TO ASK, PART 2 – BEN CARR – SCW #98 * HACKER SITUATIONAL AWARENESS, PART 1 – JOHN THREAT – SCW #97 TRADECRAFT SECURITY WEEKLYSUBSCRIBECONTACT * EVILGINX2 MAN-IN-THE-MIDDLE ATTACKS – TRADECRAFT SECURITY WEEKLY #29 * GOOGLE EVENT INJECTION – TRADECRAFT SECURITY WEEKLY #20 * DISSECTING XXE ATTACKS – TRADECRAFT SECURITY WEEKLY #19 * PIVOTING TOOLS THROUGH METERPRETER – TRADECRAFT SECURITY WEEKLY #16 * BLACK HAT & DEF CON 2017 – TRADECRAFT SECURITY WEEKLY #13 ARCHIVED SERIES GETTING THE REAL WORK DONE IN CYBERSECURITYSUBSCRIBE * PURPLE TEAMING – PTMS #1 * Vulnerability Management RED TEAMING – PTMS #2 * BLUE TEAMING – PTMS #3 * DEMOING PLEXTRAC: THE PURPLE TEAMING PLATFORM – PTMS #4 BLOG POSTS * INTRODUCING ‘CYBER FOR HIRE,’ A PODCAST THAT PLAYS MARRIAGE COUNSELOR BETWEEN MSSPS AND CLIENTS Bradley Barth January 3, 2023 * INCIDENT RESPONSE: PRACTICE LIKE YOU PLAY Bill Brenner August 1, 2022 * USER EXPERIENCE: A KEY TO EFFECTIVE VULNERABILITY MANAGEMENT Paul Asadoorian May 25, 2022 * FORENSIC CHALLENGES FOR SECURITY PROFESSIONALS Bill Brenner April 19, 2022 * CISA’S SHIELDS UP: WHAT IT IS, HOW TO USE IT Bill Brenner April 12, 2022 * SHADOW CODE: A THIRD-PARTY BLIND SPOT Bill Brenner April 5, 2022 * SECURITY HYGIENE, DOING ALL THE LITTLE THINGS RIGHT (ALL THE TIME) Bill Brenner March 21, 2022 * SUCCESSFUL DEVOPS IN THE AGE OF SERVERLESS Bill Brenner March 15, 2022 * THE UNIQUE CHALLENGES OF COMPANIES BORN IN THE CLOUD Bill Brenner March 9, 2022 * RANSOMWARE DAMAGE CLAIMS DRIVING INSURANCE HIKES Deb Radcliff January 12, 2022 All Blog Posts -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms of Use. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies