The Wisdom Journey with Stephen Davey is a three-year journey through the entire Bible, Genesis to Revelation, with one 10-minute lesson each weekday. The Wisdom Journey will help you understand the truth of God’s Word and apply that truth to your life. Follow along and learn to know God, think biblically and live wisely.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
In James 2:14-26, the apostle delivers a powerful challenge to every believer: real faith produces real action. James tackles the relationship between faith and works, asking, “What good is it if someone says he has faith but does not have works?” He uses illustrations from everyday life and examples from Scripture to highlight the truth that faith…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
In James 2:1-13, the apostle challenges the early believers—and us today—to confront the issue of favoritism in the church and our personal lives. Favoritism, or partiality, contradicts the gospel message of Jesus Christ, who treated everyone with equal love and grace. James warns that treating people differently based on wealth, appearance, or sta…
…
continue reading
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
Have you ever wondered why the sacrificial system in the Old Testament had to be repeated year after year? Hebrews 10 reveals that it was never meant to be the final answer to humanity’s sin problem. In this episode, we dive into the profound truth that Jesus’ one sacrifice on the cross didn’t just temporarily cleanse sin—it permanently removed it.…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
Hebrews 13 offers profound insights on how our faith shapes the way we relate to others. From brotherly love and hospitality to marriage and finances, this chapter calls believers to live out their faith in practical, everyday ways. In this episode, we dive into the first six verses of the chapter, which highlight the importance of loving one anoth…
…
continue reading
Hebrews 12 encourages believers to run the race of faith with endurance, casting aside every weight and the sin that so easily entangles. This episode dives into the powerful imagery of Hebrews 12:1-2, where the Christian life is likened to a long-distance race. Surrounded by a cloud of witnesses, we’re called to fix our eyes on Jesus, who endured …
…
continue reading
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
In this episode, we journey through Hebrews 11, often called the “Hall of Faith.” This chapter highlights the lives of men and women from Scripture who trusted in God despite their imperfections, uncertainties, and challenges. These biographies teach us powerful lessons about what it means to live by faith. We see Noah’s obedience in the face of ri…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
In this episode, we explore Hebrews 10:19-39, where the writer moves from theological truths to practical instructions for the Christian life. We’re reminded of two great truths: Jesus has opened the way for us to enter the presence of God, and He serves as our eternal high priest. Because of these truths, we are called to draw near to God in praye…
…
continue reading
In this episode, we dive into Hebrews 10:1-18 to explore the powerful truth that Jesus Christ finished the work of salvation once and for all. Under the old covenant, sacrifices were made continuously, yet they could never fully remove sin. Hebrews 10 reveals that these sacrifices were just a shadow of what was to come—God’s perfect plan in Christ.…
…
continue reading
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
Have you ever wondered why the temple in Jerusalem, with all its grandeur, is no longer central to the Christian faith? In this episode, we dive into Hebrews 9 to explore the dramatic shift from the earthly temple system to the eternal glory found in Christ’s sacrifice. The Jewish believers of that day marveled at the beauty of the temple, but the …
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
Why would anyone cling to old rituals when a better promise has been given? In this episode, we’ll dive into Hebrews 8, where the writer explains why the Old Covenant—based on the law and temple rituals—was always meant to be temporary. Jesus Christ, our perfect High Priest, brings a new and better covenant built on grace and eternal promises. You’…
…
continue reading
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
What does it mean for Jesus to be your eternal High Priest? How does that role impact your life today? In this episode, we explore Hebrews 7 and the significance of Jesus’ priesthood after the order of Melchizedek. You’ll discover how Jesus’ priesthood is different from any other, and why He is uniquely qualified to be both King and Priest. His ete…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
What would you do if you thought you could lose your salvation? Many believers wrestle with this fear. But today, we’re tackling the question head-on. Hebrews 6 gives us both a strong warning and an incredible promise. Yes, there are real dangers in drifting away from faith. But here’s the good news: your salvation doesn’t rest on your perfection. …
…
continue reading
Who do you turn to when life gets tough? In this episode, discover why Jesus Christ is more than just a religious figure—He’s the One and Only High Priest. Hebrews 4:14-5:10 reveals why Jesus is greater than all the priests of Israel, offering believers direct access to God. While earthly high priests could only approach God once a year, trembling …
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
In this episode, we explore Hebrews 4:11-13, focusing on the importance of striving for rest through obedience to God’s Word. The writer of Hebrews warns us not to fall into the disobedience that kept the Israelites from entering the promised land. Instead, we’re called to follow the path of obedience, which leads to spiritual rest and peace. We’ll…
…
continue reading
In this episode, we explore the powerful comparison between Jesus and Moses as presented in Hebrews chapter 3. While Moses was the great leader who led Israel out of Egypt and gave them the law, Hebrews reveals that Jesus is far superior. The writer of Hebrews shows how Jesus surpasses Moses in His person, performance, and promise. We’ll discuss ho…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
Reproducir más Tarde
Reproducir más Tarde
Listas
Me gusta
Me gusta
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading