Continue Reading... Artificial Intelligence and Compliance, Part 1 – SCW #5
Posted in Cyber Security

Artificial Intelligence and Compliance, Part 1 – SCW #5

This week, we discuss part 1 on how Artificial Intelligence and Machine Learning can be used for Compliance, including: –…

Continue Reading... Credential Delegation – Security Now 740
Posted in Cyber Security

Credential Delegation – Security Now 740

Checkrain and Delegation • CheckM8 & Checkra.in moves to first public beta • The case of the misbehaving transducer •…

Continue Reading... Security and Compliance News – SCW #3
Posted in Cyber Security

Security and Compliance News – SCW #3

PwC’s 2019 Annual Corporate Directors Survey, What is the Board’s Role in Effective Risk Management?, CEOs could get jail time…

Continue Reading... 2019 NACD Blue Ribbon Commission Initiative – SCW #3
Posted in Cyber Security

2019 NACD Blue Ribbon Commission Initiative – SCW #3

Josh Marpet and Scott Lyons perform interviews at 2019 NACD Blue Ribbon Commission Initiative. Visit https://www.securityweekly.com/scw for all the latest…

Continue Reading... HRC President Alphonso David Speaks at HBCU Leadership Summit
Posted in Privacy and Data Rights

HRC President Alphonso David Speaks at HBCU Leadership Summit

Continue Reading... IAPP Privacy Core E-Learning Deep Dive
Posted in Privacy and Data Rights

IAPP Privacy Core E-Learning Deep Dive

Continue Reading... Communicating Vulnerabilities – HNN #241
Posted in Cyber Security

Communicating Vulnerabilities – HNN #241

This week, BlueKeep freakout had little impact on patching, Experts warn of spike in TCP DDoS reflection attacks targeting Amazon…

Continue Reading... Security Testing – ASW #84
Posted in Cyber Security

Security Testing – ASW #84

Mike, Matt, and John talk about security testing. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ASWEpisode84

Continue Reading... Application News – ASW #84
Posted in Cyber Security

Application News – ASW #84

Pwn2Own Tokyo Roundup: Amazon Echo, Routers, Smart TVs Fall to Hackers, Robinhood Traders Discovered a Glitch That Gave Them ‘Infinite…

Continue Reading... Malwarebytes 4 Review | Tested vs Malware
Posted in Software Security

Malwarebytes 4 Review | Tested vs Malware

Malwarebytes 4 has been redesigned inside and out. In this review, it is tested vs over 1500 malware samples including…

Continue Reading... Alphonso David on the Anti-LGBTQ Actions of the Trump-Pence Administration
Posted in Privacy and Data Rights

Alphonso David on the Anti-LGBTQ Actions of the Trump-Pence Administration

HRC President Alphonso David joined HilllTV to discuss the Trump-Pence administration’s shameful and discriminatory proposals to license discrimination.

Continue Reading... “We sent a message that’s going to echo in the White House.”
Posted in Privacy and Data Rights

“We sent a message that’s going to echo in the White House.”

Now that the 2019 elections are over, join us as we gear up for 2020.

Continue Reading... Leadership Articles – BSW #151
Posted in Cyber Security

Leadership Articles – BSW #151

5 questions with Cisco’s CISO, The CIO role, from IT operator to business strategist, Making the case for integrated risk…

Continue Reading... Developing an Effective AppSec Security Program – Brendon Macaraeg – BSW #151
Posted in Cyber Security

Developing an Effective AppSec Security Program – Brendon Macaraeg – BSW #151

Brendon Macaraeg is the Sr. Director of Product Marketing of Signal Sciences. Focus on the people, processes and tools a…

Continue Reading... Bridging Compliance pt 2 – Ron Ross – SCW #4
Posted in Cyber Security

Bridging Compliance pt 2 – Ron Ross – SCW #4

Ron Ross is a Fellow at the National Institute of Standards and Technology. His focus areas include cybersecurity, systems security…

Continue Reading... Bridging Compliance pt 1 – Ron Ross – SCW #4
Posted in Cyber Security

Bridging Compliance pt 1 – Ron Ross – SCW #4

Ron Ross is a Fellow at the National Institute of Standards and Technology. His focus areas include cybersecurity, systems security…

Continue Reading... Peter Smith, Edgewise – Peter Smith – PSW #626
Posted in Cyber Security

Peter Smith, Edgewise – Peter Smith – PSW #626

Peter Smith is the Founder & CEO of Edgewise. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode626

Continue Reading... Arcade Hustle – PSW #626
Posted in Cyber Security

Arcade Hustle – PSW #626

Kevin Finisterre is a Co-founder of Arcade Hustle. Josh Valentine is a Co-founder of Arcade Hustle. Josh and Kevin have…

Continue Reading... Security News: November 7, 2019 – PSW #626
Posted in Cyber Security

Security News: November 7, 2019 – PSW #626

In the Security News, Who is responsible for Active Directory security within your organization?, Apple publishes new technical details on…

Continue Reading... How to get ISC2 CISSP CPEs by Hacking HackTheBox Machines!
Posted in Software Security

How to get ISC2 CISSP CPEs by Hacking HackTheBox Machines!

Hack your isc2 CISSP CPEs by hacking htb machines! How cool!

Continue Reading... Pokemon Go parental controls how-to guide | Internet Matters
Posted in Online Safety

Pokemon Go parental controls how-to guide | Internet Matters

Pokemon GO safety features on the app include pop up warnings to users to encourage safe play and a reporting…