All Episodes

June 2, 2025 98 mins

Segment 1

CTG Interview

Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure.

Cyber Resilience in Action: A Guide for Mid-Market Firms

This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them!

Nightwing Interview

Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today’s threat landscape.

This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them!

Segment 2

Libraesva Interview

Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message.

This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them!

IRONSCALES Interview

Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception.

  • Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking
  • Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people
  • Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images

IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes.

This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them!

Segment 3

Illumio Interview

In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams a

Mark as Played

Advertise With Us

Popular Podcasts

United States of Kennedy
Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.