PLAY PODCASTS
Cybersecurity Tech Brief By HackerNoon

Cybersecurity Tech Brief By HackerNoon

127 episodes — Page 2 of 3

Inside the Passwordless Architecture Redefining Security for Telecom Giants

Jan 20, 20264 min

Third-Party Risks in 2026: Outlook and Security Strategies

Jan 18, 20269 min

Cybersecurity for Startups: The Assumptions That Quietly Break You

Jan 17, 20264 min

Protect Your Crypto: The Wallet Backup Options You Never Considered

Jan 17, 20267 min

Shadow AI: The Invisible Threat Lurking in Your Enterprise

Jan 16, 202612 min

Implementing Zero Trust Cybersecurity Architecture in the Age of AI

Jan 16, 20266 min

The Code That Built a City: Solving the 33-Year Mystery Behind Google’s Málaga Hub

Jan 15, 20263 min

Zero Trust Network Access(ZTNA) Enforcement Using Real Time Risk Scoring & Dynamic Path Segmentation

Jan 15, 20268 min

Wrapping up Trends in MacOS Malware of 2025

Jan 8, 20266 min

I Saw a Phishing Site That Traps Security Bots

Jan 8, 20267 min

The Authorization Gap No One Wants to Talk About: Why Your API Is Probably Leaking Right Now

Jan 7, 202611 min

IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel

Jan 7, 202613 min

The Illusion of Security: How IAM Anti-Patterns Sneak into Every System

Jan 2, 20266 min

The $50,000 PDF No One Reads: Why Your Security Audits Are Failing

Dec 31, 20254 min

Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life

Dec 26, 20258 min

Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches

Dec 25, 20258 min

How Compliance Requirements Shape Modern Software Architecture

Dec 25, 20254 min

The Markup's Blacklight Tool Now Has New Tracking Info and Caching Options

Dec 22, 20252 min

Should You Trust Your VPN Location?

Dec 21, 202515 min

SAIS-GRC Framework: Establishing Trust and Enhancing Resilience in AI-Driven Supply Chains

Dec 20, 202518 min

Quantum Security Governance: Building a Framework for the Post-Quantum World

Dec 20, 202515 min

Why One Lock Isn’t Enough: How Buburuza Designs Multi-Layer Security for AI Banking

Dec 19, 20255 min

The Hidden Cost of Invalid Traffic: Why IP Data Is the Missing Link

Dec 19, 20254 min

The Battle for the Borders: How AI and Cyber Intelligence Are Reshaping Statecraft

Dec 18, 20259 min

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies In 2026

Dec 17, 20256 min

Debunking the "99.8% Accurate IP Data" Claim

Dec 17, 20257 min

What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)

Dec 16, 20259 min

SASE Meets Edge AI: Why Security Will Be Decided in the First Millisecond

Dec 16, 202513 min

The Hidden Cost of “Free” Apps and the Battle for Your Attention

Dec 14, 20257 min

Is Shadow AI Worse Than Shadow IT?

Dec 12, 20258 min

Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control

Dec 12, 202525 min

Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal

Dec 11, 20255 min

The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web

Dec 11, 20256 min

INE Earns G2 Winter 2026 Badges Across Global Markets

Dec 10, 20254 min

The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline

Dec 10, 20258 min

I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend

Dec 9, 202510 min

Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines

Dec 9, 202510 min

How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained

Dec 8, 202517 min

$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality

Dec 6, 202510 min

The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech

Dec 6, 202510 min

How Request–Response Really Works

Dec 5, 20254 min

Taking Control Of Software Supply Chains in the Open Source Era

Dec 5, 20257 min

You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.

Dec 4, 202532 min

AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier

Dec 3, 20259 min

How Will We Distinguish Truth From Fiction?

Dec 3, 20257 min

A Developer’s Guide to Choosing the Right DAST Tool in 2026

Dec 2, 202513 min

Adversarial Attacks on Large Language Models and Defense Mechanisms

Dec 2, 20259 min

Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025

Dec 1, 20256 min

One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM

Nov 29, 20255 min

Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0

Nov 28, 20255 min