This interview features Pete Aller discussing the evolution and future of vulnerability management, including CVE, and the efforts to improve transparency and collaboration within the cybersecurity ecosystem. He shares insights into the challenges, governance, and strategic initiatives behind the CVE Foundation and its role in global cybersecurity efforts.
Category: Youtube
This conversation discusses a memorable scene from Star Trek: The Next Generation, where a planet’s strict laws lead to extreme punishments, and humorously touches on Will Weaton’s role in the series. The participants express their opinions on whether to introduce Bill to Star Trek, favoring The Next Generation over the original series.
This video explores a recent cybersecurity incident involving a CEO’s arrest related to malware installation in a hospital. It highlights the challenges of physical access and potential insider threats within the context of ongoing criminal investigations.
This video demonstrates how hackers can find and access IP cameras on local networks using scanning and brute-force techniques. It emphasizes the importance of strong passwords, two-factor authentication, and secure network practices to prevent unauthorized access.
This video provides a comprehensive guide for developers on evaluating and selecting large language models, covering proprietary and open-source options, benchmarks, and real-world demos. It also showcases practical use cases like model testing, data retrieval, and AI-powered coding within local environments.
This video covers recent cybersecurity news, including a Lockbit website hack, the Meta vs. NSO group lawsuit, and the launch of the EU Vulnerability Database by the EU. It also provides a personal update from Alli Diamond about her career situation and ongoing projects.
This episode of Security Now covers recent security news, including new laws on social media age restrictions, dangerous malicious packages in open repositories, and the security flaws in messaging apps like Tele Message and WhatsApp. Steve Gibson also discusses concepts of end-to-end encryption, how misused terms impact security, and proposes a secure method for long-term message archiving.
This podcast features a discussion on TSA’s cybersecurity initiatives for critical infrastructure, particularly pipelines and railways, following incidents like Colonial Pipeline. Experts share insights on regulatory developments, industry compliance, and the importance of resilience in operational technology environments.
This week’s web content explores cybersecurity leadership strategies, risk communication, and industry trends, including AI investment shifts and skills-based hiring. It features insights from RSAC 2025 interviews, reports on vulnerabilities, and practical approaches for security professionals to adapt in a rapidly evolving threat landscape.
This video advocates for a phased blanket ban on ransomware, emphasizing that stopping its profitability is key to ending attacks. It outlines a multi-year plan involving stricter reporting, sector-specific bans, and comprehensive support for cybersecurity improvement.
This episode of Security Weekly News covers recent cybersecurity incidents, AI developments, and industry updates, with insights into threats like deep fake porn, data breaches, and botnet dismantling. It also discusses the societal perceptions of AI use and the importance of integrating security practices into organizational culture.
This video discusses a critical security vulnerability patched by Cisco in iOS XE for wireless controllers, which can be exploited remotely. It highlights the risks of unauthorized access through Wi-Fi networks and potential malicious activities that could compromise network devices.
This video demonstrates practical techniques for testing and bypassing Windows Defender using various payload staging methods, including SMB and HTTP. The presenter walks through setting up virtual machines, creating payloads, and executing evasive operations step-by-step in a live environment.
This video explains a malicious clipboard monitoring tool that tracks your clipboard content, specifically targeting crypto wallet addresses. It demonstrates how such tools can secretly replace legitimate crypto addresses with malicious ones without your knowledge.
This video discusses the often overlooked contribution of CFOs and their teams to a company’s revenue and profitability. It emphasizes the importance of CFOs demonstrating their value as profit centers rather than just cost centers to gain strategic influence.