Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/a8/21/3d/a8213d21-6d40-de26-ec8a-76c68094db7d/mza_13234155600040561222.jpg/600x600bb.jpg
Breakpoint Security Podcast
Neelu Tripathy
61 episodes
21 hours ago
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
Show more...
Technology
RSS
All content for Breakpoint Security Podcast is the property of Neelu Tripathy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
Show more...
Technology
Episodes (20/61)
Breakpoint Security Podcast
S04EP07 | SBOMs & Supply Chain Security | Anant Srivastava
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
Show more...
3 days ago
44 minutes

Breakpoint Security Podcast
S04EP07 | Teaser | SBOMification
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd Implementing Software Bill of Materials (SBOMs) is a complex process riddled with challenges that can undermine their security benefits. The primary issue is data quality and accuracy, as many tools fail to list all components, especially hidden transitive dependencies, creating a false sense of security. Furthermore, organizations are often overwhelmed by the sheer volume of data an SBOM produces, lack...
Show more...
6 days ago
1 minute

Breakpoint Security Podcast
S04EP06 | Rapid Fire | Shobhit Gautam
From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne This short clip is fun, fast, and full of great personal insights on #cybersecurity . It’s a great reminder that behind every strong security defense is a brilliant, interesting human. #bugbountytips -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: S...
Show more...
1 week ago
5 minutes

Breakpoint Security Podcast
S04EP06 | Bug Bounty Programs | Shobhit Gautam
TOPIC:From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Stop viewing bug bounties as just a headache! We're talking about turning #vulnerabilities into measurable #security value. My guest dives deep into how organizations can strategically shift their perspective: using #crowdsourced security intelligence as a core engine for #continuous improvement. It’s about leveraging these programs to generate critical #threatintelligence and #risk data. Eve...
Show more...
2 weeks ago
53 minutes

Breakpoint Security Podcast
S04EP05 | Teaser | Bug Bounties Programs
TOPICFrom Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne Shobhit is a Staff Solutions Architect at HackerOne. He has 15+ years of security experience, with extensive expertise in application, cloud, and infrastructure security. He is passionate about building secure solutions and fostering a security-conscious culture. He has experience leading security awareness initiatives, m...
Show more...
3 weeks ago
1 minute

Breakpoint Security Podcast
S04EP05| Rapid Fire | Saakshar Duggal
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene We talked serious **DPDP Act** compliance in the full episode, but now it's time for the fun stuff! 🚀 I put our expert through the wringer with our rapid-fire round. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to se...
Show more...
3 weeks ago
4 minutes

Breakpoint Security Podcast
S04EP05 | DPDP Act and Compliance | Saakshar Duggal
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene The DPDP Act is here, redefining digital privacy in India. But how does this new law stack up against global standards like GDPR? We're diving deep into the toughest differences and the biggest headache for every business: Consent Management. Beyond specific, informed consent and the constant right to withdraw, we tackle Data Minimization and the ambiguity of Data Retention rules....
Show more...
1 month ago
43 minutes

Breakpoint Security Podcast
S04EP05 | Teaser | DPDP Act and Compliance
The new DPDP Act is officially rewriting the rules for handling personal data in India. It sounds like simple compliance, but the implementation challenges for every data fiduciary are tricky—and getting it wrong could lead to massive fines. Today, we dive into the biggest hurdles, from consent management to fulfilling data principal rights. We guide you through the precise techniques you need to roll out DPDP successfully. Don't risk your organization's future—check out the full episode! G...
Show more...
1 month ago
2 minutes

Breakpoint Security Podcast
S04EP04 | Rapid Fire | Jay Thoden van Velzen
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance At Breakpoint, we tend to get real about cybersecurity. We often say security's job is to be an enabler for the business. After the myth breaking full episode, here's a light Rapid Fire where Jay shares some of his experiments on chaos engineering and other interesting adventures. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcas...
Show more...
1 month ago
5 minutes

Breakpoint Security Podcast
S04EP04 | Culture Eats Security for Breakfast | Jay Thoden van Velzen
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance In this segment, we’re unpacking the biggest myth in security: that strategy is enough. Our guest argues that culture eats strategy for breakfast, and effective security isn’t about more policies, but about deep negotiation and understanding. We’ll discuss how to use tools like security risk management and security engineering not as blockers, but as instruments for...
Show more...
1 month ago
48 minutes

Breakpoint Security Podcast
S04EP03 | Dust Busters or Bots? | Dennis Giese
Guest: Dennis Giese, Independent Security Researcher You've seen the headlines, heard the wild stories, and maybe even panicked about the devices in your own home. "Hackers take control of robot vacuums, yell racial slurs." It sounds insane, but what really happened? Our guest today is one of the researchers who exposed the vulnerabilities behind these shocking incidents. In this segment, we're diving deep into the world of smart home robotics and cyber-physical security. Our guest wi...
Show more...
1 month ago
24 minutes

Breakpoint Security Podcast
S04EP02 | Reversing Large Deep Learning Models | Yashodhan Mandke
Have you ever thought about how an attacker might reverse-engineer an AI model? Our guest today is doing just that, going beyond passwords and keys to unpack the very DNA of deep learning! In this segment, we're diving into the groundbreaking work of reversing large deep learning models. Our guest reveals how it's possible to reverse an AI model's entire mathematical structure, exposing its architecture, critical hyperparameters, and even the internal weights and biases that define its behav...
Show more...
2 months ago
25 minutes

Breakpoint Security Podcast
S04EP01 | Zero Day Playbook with Coverage-Guided PHP Fuzzing | Sebastian Neef
Ever wonder how zero-day vulnerabilities in your favorite websites get uncovered? Our guest today is diving into a game-changing technique: coverage-guided fuzzing for PHP web apps! Forget slow scanners; we're talking about finding critical bugs before the bad guys do. Guest: Sebastian Neef, PhD at the Technical University of Berlin, at the Chair for Security in Telecommunications In this segment, we explore PHUZZ, an open-source tool that's shaking up web application security testing. Our ...
Show more...
2 months ago
12 minutes

Breakpoint Security Podcast
Agentic AI | Dr Angelina Gokhale #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Dr Angelina Gokhale Senior Data Scientist, Netmonastery Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Show more...
3 months ago
1 minute

Breakpoint Security Podcast
Agentic AI | Khushbu Jain #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Khushbu Jain Managing Partner, Data Privacy | Ark Legal Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Show more...
3 months ago
1 minute

Breakpoint Security Podcast
Agentic AI | Abhishek Datta #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Abhishek Datta Co-Founder | SafeDep Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk. But that also exten...
Show more...
3 months ago
1 minute

Breakpoint Security Podcast
Agentic AI | Thiruraghavan Madhugiri #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Thiruraghavan Madhugiri Director, Security Engg | Adobe Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Show more...
3 months ago

Breakpoint Security Podcast
#S04CFPEP03 | CFP Series | Effective Paper Submission Part 03
Effective Paper Submission for Beginners Part 03 You've seen the good researchers on stage at the best conferences or your favorite local security conference, dropping knowledge bombs and getting that well-deserved applause. Ever wondered how they got there? It all starts with a killer paper submission! In this brand new video, part of our "CFP series", I'm pulling back the curtain on 'Effective Paper Submission' for security conferences. This isn't just about having a great idea/research; ...
Show more...
4 months ago
16 minutes

Breakpoint Security Podcast
Agentic AI | Krishna Pandey #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their AI Agents to do for them' :) Guest: Krishna Pandey Senior Director, Cybersecurity | Xerox Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk...
Show more...
4 months ago
1 minute

Breakpoint Security Podcast
Agentic AI | Kunal Aggarwal #ai #aisecurity #agenticai #cybersecurity
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Kunal Aggarwal CTO @ RedHunt Labs Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk. But that also extends...
Show more...
4 months ago
1 minute

Breakpoint Security Podcast
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...