Preview Mode Links will not work in preview mode

Security Weekly Podcast Network (Audio)

Sep 30, 2022

Hackers rarely break through crypto or exploit fancy zero days. Most of the time they simply login using stolen credentials. Managing passwords, keys and other forms of secrets does not work at scale. In this segment we’ll look into a more radical approach to infrastructure security: getting rid of secrets entirely and moving to access control based on physical properties of humans and machines.

This segment is sponsored by Teleport. Visit to learn more about them!


This week, we're joined by Casey Ellis to discuss a Telco breach from a land down under, UK government sits out bug bounty boom but welcomes vulnerability disclosure, Karakurt Data Extortion Group, Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack, being caught with your pants down, & more!


Visit for all the latest episodes!

Visit to sign up for a demo or buy our AI Hunter!

Follow us on Twitter:

Like us on Facebook:


Show Notes: