This week, we welcome Ryan Benson, Director of Service Offerings at deepwatch, to discuss the State of the Managed...
58:24
This week, we welcome Ryan Benson, Director of Service Offerings at deepwatch, to discuss the State of the Managed...
58:24
This week, we welcome Parham Eftekhari, SVP & Executive Director of Cybersecurity Collaborative, to discuss The...
53:55
This week, we welcome back Dr. Mike Lloyd, CTO at RedSeal, to discuss Navigating Complexity: Orienting Your Security...
01:12:06
Canada in Danger of Becoming a Dystopian Country! (SE11EP11)
Canada understands that encryption is necessary and still wants to backdoor it, learn how this makes Canada yet...
06:44
This week, we welcome Marie Ketner, Director of Product at Cybrary, to talk about How to Develop Your Cybersecurity...
52:37
This week, we start off the show with an Interview with Mike Gruen, VP of Engineering & CISO from Cybrary, to...
01:22:16
The Department of Justice has recently released a new memo entitled "International Statement: End-To-End Encryption...
57:03
Bingecast: Enrique Blair on Quantum Computing
What is quantum mechanics? What can quantum computers do that classical computers can’t? Has Google achieved...
01:03:38
The Shining Example - BSW #199
This week, Sri Sundaralingam joins Security Weekly to discuss the challenges of hybrid workforce and what security...
01:03:10
Episode 439: JP Aumasson on Cryptography
JP Aumasson, author of Serious Cryptography, discusses cryptography, specifically how encryption and hashing work and...
01:08:21
Michael de la Garza, Dr. Al Carlson, and Phil Abraham talk cybersecurity and blockchain with Joe
Polymorphic Cipher Encryption? Dragonchain | Den | Twitter | LinkedIn | Telegram| GitHub | Facebook | YouTube |...
01:01:59
Episode 1 : Bitcoin, Punjabi and Encryption.
This episode features world renowned UC Berkeley crypto researcher ( PhD UCLA 2013, IIT Delhi 2008, Forbes 30 Under...
39:54
Securing Data With LASERS | TWiT Bits
Lou Maresca of This Week in Enterprise Tech shares the Science News story regarding the use of LASERS creating random...
01:41
We're making codes and breaking ciphers this week as we look at the world of cryptography! Coming up, Cold War spy...
57:11
We're making codes and breaking ciphers this week as we look at the world of cryptography! Coming up, Cold War spy...
58:17
In this episode, we discuss how product engineers can design cybersecurity into product components from the beginning...
44:33
We're making codes and breaking ciphers this week as we look at the world of cryptography! Coming up, Cold War spy...
57:11
We're making codes and breaking ciphers this week as we look at the world of cryptography! Coming up, Cold War spy...
58:17
With the UK and Australia taking steps to restrict the use of encryption, will New Zealand follow suit? InternetNZ...
Details lacking in Government's plan to intercept encrypted messages
Tech experts question Government's plan to force companies to give access to encrypted conversations, saying there's...