Paul's Security Weekly (Audio) cover image

Paul's Security Weekly (Audio)

Latest episodes

undefined
Feb 20, 2025 • 1h 3min

Live from ZTW - PSW #862

The discussion kicks off with excitement around the return of in-person conferences and insights from Zero Trust World. Listeners learn about current cybersecurity threats and the significance of Managed Service Providers. Humorous anecdotes about aging tech and personal experiences keep it lively. There's a deep dive into firmware security vulnerabilities and the challenges of timely updates. Plus, the exploration of access risks associated with AI tools offers a thought-provoking look at evolving security needs.
undefined
Feb 13, 2025 • 2h 5min

Prompt Injection, CISA, Patch Tuesday - PSW #861

This week, tune in to hear about the intriguing possibility of installing Linux in PDFs and the serious security measures taken by TP-Link. The discussion dives into the latest Patch Tuesday updates affecting major companies like Intel and Microsoft. Ever thought of hacking your space heater for kicks? They cover it! Explore the quirks of smart homes and the security risks tied to them. Plus, get insights on prompt injection attacks and vulnerabilities associated with medical devices, all while balancing humor and critical cybersecurity themes.
undefined
14 snips
Feb 6, 2025 • 2h 7min

Deepseek, AMD, and Forgotten Buckets - PSW #860

Discover the challenges of Deepseek and the latest in AI model security. Explore AMD's microcode vulnerabilities and the risks posed by abandoned AWS S3 buckets. Dive into the world of 3D printing with innovative tips and tricks. Learn about password management weaknesses and the hidden dangers of cheap USB-to-Ethernet adapters. The discussion also highlights the evolving landscape of cybersecurity and the importance of data privacy in AI development.
undefined
Jan 30, 2025 • 2h 6min

Cred Vaults, Cheap AI, and Hacking Devices - Matt Bishop - PSW #859

Matt Bishop is the Principal Architect at Bitwarden, specializing in password management and security solutions. He discusses the evolution of password vaults, emphasizing their expanded use beyond mere password storage, including SSH key management for developers. The conversation also covers the latest cybersecurity threats, from vulnerabilities in Palo Alto networks to the implications of AI in security. Bishop highlights the importance of multi-factor authentication and the benefits of open-source solutions in ensuring data security.
undefined
Jan 23, 2025 • 2h 19min

Vulnerability Prioritization In The Real World - Andy Jaquith - PSW #858

Andy Jaquith, Managing Director at MarkerBench and seasoned CISO, dives into the challenges of vulnerability prioritization and real-world asset management. He shares insights on the complexities of navigating cybersecurity in large organizations, emphasizing the need for a risk-based approach. The discussion also touches on the political implications of cybersecurity policies, the struggles of hardware security detection, and the unexpected role of adult platforms in education. With humor and expertise, Jaquith paints a vivid picture of today’s cybersecurity landscape.
undefined
4 snips
Jan 16, 2025 • 2h 34min

Stopping The Bad Things - Rob Allen - PSW #857

Rob from ThreatLocker discusses innovative strategies to disrupt attacker techniques, including zero trust and privilege escalation. The conversation highlights the security risks of unmanaged devices, particularly in home networks filled with unpatched smart gadgets. Humorous anecdotes from events like SchmooCon capture the camaraderie within the hacking community. The episode also delves into the importance of logging, automation in threat detection, and the vulnerabilities posed by outdated technology, all while reflecting on the necessity for continuous improvement in cybersecurity practices.
undefined
8 snips
Jan 9, 2025 • 2h 7min

Threat Actors With A Thousand Names - PSW #856

Discover the vulnerabilities lurking in DNA sequencers and the urgent need for better security measures. The complexities of naming threat actors reveal both chaos and confusion in cybersecurity. Reflecting on a CEO's unexpected passing adds a emotional layer to industry discussions. Explore how stolen bicycles link to social media accountability. A peculiar bug causes printing woes on Tuesdays, while hackers continue to exploit weaknesses in technologies like Bitlocker and Bluetooth. Plus, get hype for ShmooCon and hear about the latest tech threats!
undefined
Dec 25, 2024 • 1h 17min

Hacker Heroes - Haroon Meer - PSW Vault

Haroon Meer, founder of Thinkst Applied Research, brings a wealth of cybersecurity knowledge to the discussion. He reflects on his journey from South Africa's tech landscape post-apartheid to innovative product development in security. The conversation explores the practical applications of honeypots, the need for a customer-centric culture, and the shortcomings of current EDR solutions. With humorous anecdotes from his university days, Haroon emphasizes simplifying cybersecurity processes and enhancing user experiences through tools like Canary Tokens.
undefined
7 snips
Dec 19, 2024 • 2h 47min

When Public Payphones Become Smart Phones - Inbar Raz - PSW #855

Inbar Raz, VP of Research at Zenity and retrocomputing enthusiast, dives into the security world of smart payphones. He reveals how attackers could exploit these devices, diving into VoIP vulnerabilities and AI's role in cybersecurity. The conversation takes a nostalgic turn as Inbar shares his journey from hacking childhood curiosities to restoring vintage hardware. With insights on firmware challenges and tales of overcoming tech troubles, this chat is both enlightening and fun, merging humor with the serious business of security.
undefined
Dec 12, 2024 • 2h 43min

Navigating Regulations in Supply Chain Security - Eric Greenwald - PSW #854

Eric Greenwald, General Counsel for Finite State, brings over 20 years of expertise in law and technology to the discussion on supply chain security and regulatory navigation. He delves into the complexities of cybersecurity compliance, emphasizing the challenges companies face with firmware vulnerabilities. The conversation also highlights the implications of SOC 2 certification and recent legal standards, while reflecting on notable cybersecurity breaches. Additionally, they explore the evolving landscape of telecom security and the need for more effective risk management strategies.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app