Info

Enterprise Security Weekly (Video)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
RSS Feed Subscribe in Apple Podcasts
Enterprise Security Weekly (Video)
2025
May
April
March
February
January


2024
December
November
October
September
August
July
June
May
April
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
May 19, 2025

Segment 1: Fastly Interview

In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO.

We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features?

This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!

Segment 2: Weekly Enterprise News

In this week's enterprise security news,

  1. Agents replacing analysis is highly misunderstood
  2. only one funding round
  3. Orca acquires Opus to automate remediation
  4. OneDrive is updating to make BYOD worse?
  5. Companies are starting to regret replacing workers with AI
  6. Is venture capital hanging on by a thread (made of AI)?
  7. Potential disruption in the traditional vuln mgmt space!
  8. MCP is already looking like a dumpster fire from a security perspective
  9. malicious NPM packages
  10. and, IS ALCHEMY REAL?

Segment 3: RSAC Conference 2025 Interviews

Interview 1: Pluralsight

Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats.

Pluralsight's AI Skills Report

This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats!

Interview 2: Radware

Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks.

This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them!

Show Notes: https://securityweekly.com/esw-407

May 12, 2025

Segment 1 - Secrets and their role in infrastructure security

From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design.

This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!

Segment 2 - Weekly Enterprise News

In this week's enterprise security news, we have:

  1. Funding, mostly focused on identity security and ‘secure-by-design’
  2. Palo Alto acquires one of the more mature AI security startups, Protect AI
  3. LimaCharlie is first with a cybersecurity-focused MCP offering
  4. Meta releases a ton of open source AI security tooling, including LlamaFirewall
  5. Exploring the state of AI in the SOC
  6. The first research on whether AI is replacing jobs is out
  7. Some CEOs are requiring employees to be more productive with AI
  8. Are prompts the new IOCs?
  9. Are puppies the new booth babes?
  10. We get closure on two previous stories we covered:
    1. one about an ex-Disney employee,
    2. and one about a tiny dog

Segment 3 - Executive Interviews from RSAC

CYWARE The legacy SecOps market is getting disrupted. The traditional way of ingesting large troves of data, analysis and actioning is not efficient today. Customers and the market are moving towards a more threat centric approach to effectively solve their security operations challenges.

  1. CERT Water Management Case Study
  2. Cybersecurity Alert Fatigue! How Threat Intelligence Can Turn Data Overload Into Actionable Insights Blog
  3. Frost & Sullivan's 2024 Threat Intelligence Platform Radar Report
  4. 2025 TIP Buyer’s Guide

This segment is sponsored by Cyware. Visit https://securityweekly.com/cywarersac to request a demo!

SUMOLOGIC Intelligent SecOps is more than a buzzword—it's a blueprint for modernizing security operations through real-time analytics, contextual threat intelligence, and AI-powered automation. In this segment, Sumo Logic’s Field CTO Chas Clawson explains how SOC teams can accelerate detection and response, cut through alert noise, and improve security outcomes by fusing AI-driven automation with human context and expertise. He also shares the latest security capabilities Sumo Logic announced at the RSA Conference to help organizations build and operate Intelligent SecOps.

This segment is sponsored by Sumo Logic. Visit https://securityweekly.com/sumologicrsac to learn more about them!

Show Notes: https://securityweekly.com/esw-406

May 5, 2025

Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac.

Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04

There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them!

Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them!

While the value of identity security remains largely untapped, SailPoint’s latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption
Learn more about SailPoint’s Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them!

Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it’s now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren’t just hacking systems anymore—they’re hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today’s most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security!

Show Notes: https://securityweekly.com/esw-405

Apr 28, 2025

In this week's enterprise security news,

  1. Lots of funding announcements as we approach RSA
  2. New products
  3. The M-Trends also rudely dropped their report the same day as Verizon
  4. Supply chain threats
  5. Windows Recall is making another attempt
  6. MCP server challenges
  7. Non-human identities
  8. A startup post mortem
  9. Remember that Zoom outage a week or two ago? The cause is VERY interesting

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-404

Apr 28, 2025

As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data.

In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He’ll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security.

Show Notes: https://securityweekly.com/esw-404

Apr 28, 2025

In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.

You can grab your own copy of the report at https://verizon.com/dbir

Show Notes: https://securityweekly.com/esw-404

Apr 21, 2025

In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterprise.

Then, we move on to the topic of AI safety and whether that should be the CISO's job, or someone else's.

Finally, we'll discuss the future of AI and try to end on a positive or hopeful note!

Show Notes: https://securityweekly.com/esw-403

Apr 21, 2025

In the enterprise security news,

  1. lots of funding, but no acquisitions?
  2. New companies
  3. new tools
  4. including a SecOps chrome plugin
  5. and a chrome plugin that tells you the price of enterprise software
  6. prompt engineering tips from google
  7. being an Innovation Sandbox finalist will cost you
  8. Security brutalism
  9. CVE dumpster fires
  10. and a heartwarming story about a dog, because we need to end on something happy!

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-403

Apr 21, 2025

What a time to have this conversation! Mere days from the certain destruction of CVE, averted only in the 11th hour, we have a chat about vulnerability management lifecycles. CVEs are definitely part of them.

Vulnerability management is very much a hot mess at the moment for many reasons. Even with perfectly stable support from the institutions that catalog and label vulnerabilities from vendors, we'd still have some serious issues to address, like:

  • disconnects between vulnerability analysts and asset owners
  • gaps and issues in vulnerability discovery and asset management
  • different options for workflows between security and IT: which is best?
  • patching it like you stole it

Oh, did we mention Matt built an open source vuln scanner?

Show Notes: https://securityweekly.com/esw-403

Apr 14, 2025

Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most.

The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up.

Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we’ll be talking to Threatlocker’s CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it.

This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!

Show Notes: https://securityweekly.com/esw-402

Apr 14, 2025

In the enterprise security news,

  1. new startup funding
  2. what happened to the cybersecurity skills shortage?
  3. tools for playing with local GenAI models
  4. CVE assignment drama
  5. a SIEM-agnostic approach to detection engineering
  6. pitch for charity
  7. a lost dog that doesn’t want to be found

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-402

Apr 14, 2025

We wanted security data? We got it! Now, what the heck do we DO with all of it?

The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we’re seeing companies like Abstract Security pop up to address some of these challenges.

Abstract just released a comprehensive eBook on security data strategy, linked below, and you don’t even need to give up an email address to read it! In this interview, we’ll talk through some of the highlights:

  • Challenges
  • Myths
  • Pillars of a data security strategy
  • Understanding the tools available

Segment Resources

Show Notes: https://securityweekly.com/esw-402

Apr 7, 2025

This week, in the enterprise security news,

  1. we check the vibes
  2. we check the funding
  3. we check runZero’s latest release notes
  4. tons of free tools!
  5. the latest TTPs
  6. supply chain threats
  7. certs won’t save you
  8. GRC needs disruption
  9. the latest Rippling/Deel drama

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-401

Apr 7, 2025

You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise.

Segment Resources:

Show Notes: https://securityweekly.com/esw-401

Apr 7, 2025

When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap.

Side note: I really hate the term "soft skills". How about we call them "fundamental business skills", or "invaluable career advancement skills"? Hmm, doesn't quite roll off the tongue the same.

Soft skills can impact everything, as they impose the limits of how we interact with our world. That goes for co-worker interactions, career advancements, and how we're perceived by our peers and community. It doesn't matter how brilliant you might be - without soft skills, your potential could be severely limited.

Did you know that soft skills issues contributed to the Equifax breach?

We'll also discuss how fear is related to some of the same limitations and challenges as soft skills.

Segment Resources:

Show Notes: https://securityweekly.com/esw-401

Mar 31, 2025

In this week's enterprise security news,

  1. Big funding for Island
  2. Is DLP finally getting disrupted? By something that works?
  3. We learn all about Model Context Protocol servers
  4. Integrating SSO and SSH!
  5. Do we have too many cybersecurity regulations?
  6. Toxic cybersecurity workplaces
  7. Napster makes a comeback
  8. this week, we’ve got 50% less AI and 50% more co-hosts

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-400

Mar 31, 2025

In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months.

We won't have time to cover all the trends, but there are several here that I'm excited to discuss!

  • Deepfake Detection Difficult
  • Zero Trust Agentic AI
  • Phishing resistant MFA adoption
  • Identity Verification
  • Machine Identity
  • Decentralized Identity
  • Post Quantum
  • Shared Signals

Segment Resources:

Show Notes: https://securityweekly.com/esw-400

Mar 30, 2025

A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM.

  • Are the right logs enabled?
  • Is your EDR working correctly?
  • Would you notice a sudden increase or decrease in events from critical sources?
  • What can practitioners do to ensure the success of their SIEM deployment?

This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!

Show Notes: https://securityweekly.com/esw-400

Mar 24, 2025

This week, JP Bourget from Blue Cycle is with us to discuss Building the SOC of the Future

Then, Michael Mumcuoglu (Moom-cuoglu) from CardinalOps joins us to talk about improving detection engineering.

In the enterprise security news,

Google bets $32B on a Wiz Kid Cybereason is down a CEO, but $120M richer EPSS version 4 is out Github supply chain attacks all over A brief history of supply chain attacks Why you might want to wait out the Agentic AI trend Zyxel wants you to throw away their (old) products HP printers are quantum resilient (and no one cares) A giant rat is my hero All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-399

Mar 24, 2025

It feels like forever ago, but in the mid-2010s, we collectively realized, as an industry, that prevention was never going to be enough. Some attacks were always going to make their way through. Then ransomware got popular and really drove this point home. Detection engineering is a tough challenge, however.

Where do we start? Which attacks should we build detections for? How much of the MITRE ATT&CK matrix do we need to cover? How often do these detections need to be reviewed and updated? Wait, are any of our detections even working?

In this interview with Michael Mumcuoglu, we'll discuss where SecOps teams get it wrong. We'll discuss common pitfalls, and strategies for building more resilient and effective detections.

Again, as an industry, we need to understand why ransomware attacks keep going unnoticed, despite attackers using routine techniques and tools that we see over and over and over again.

Show Notes: https://securityweekly.com/esw-399

Mar 23, 2025

What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process.

In this interview, we'll discuss some of the common mistakes SecOps teams make, and where to start when building the SOC of the future.

Show Notes: https://securityweekly.com/esw-399

Mar 17, 2025

In this week's enterprise security news,

  1. Knostic raises funding
  2. The real barriers to AI adoption for security folks
  3. What AI is really getting used for in the wild
  4. Early stage startup code bases are almost entirely AI generated
  5. Hacking your employer never seems to go well
  6. should the CISO be the chief resiliency officer?
  7. proof we still need more women in tech

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-398

Mar 17, 2025

It takes months to get approvals and remediate cloud issues. It can take months to fix even critical vulnerabilities! How could this be? I thought the cloud was the birthplace of agile/DevOps, and everything speedy and scalable in IT? How could cloud security be struggling so much?

In this interview we chat with Marina Segal, the founder and CEO of Tamnoon - a company she founded specifically to address these problems.

Segment Resources:

  1. Gartner prediction: By 2025, 75% of new CSPM purchases will be part of an integrated CNAPP offering. This highlights the growing importance of CNAPP solutions. https://www.wiz.io/academy/cnapp-vs-cspm

  2. Cloud security skills gap: Even well-intentioned teams may inadvertently leave their systems vulnerable due to the cybersecurity skills shortage. https://eviden.com/publications/digital-security-magazine/cybersecurity-predictions-2025/top-cloud-security-trends/

  3. CNAPP market growth: The CNAPP market is expected to grow from $10.74 billion in 2025 to $59.88 billion by 2034, indicating a significant increase in demand for these solutions. https://eviden.com/publications/digital-security-magazine/cybersecurity-predictions-2025/top-cloud-security-trends/

  4. Challenges in Kubernetes security: CSPMs and CNAPPs may have gaps in addressing Kubernetes-specific security issues, which could be relevant to the skills gap discussion. https://www.armosec.io/blog/kubernetes-security-gap-cspm-cnapp/

  5. Addressing the skills gap: Investing in training to bridge the cybersecurity skills gap and leveraging CNAPP platforms that combine advanced tools are recommended strategies. https://www.fortinet.com/blog/business-and-technology/navigating-todays-cloud-security-challenges

  6. Tamnoon's State of Remediation 2025 report

Show Notes: https://securityweekly.com/esw-398

Mar 16, 2025

Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm.

Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet thousands of orgs every year fall victim to these attacks. What's going on here? Why are we so bad at stopping the very thing we've been training against for so long?

This Interview with Phillip Wylie will provide some insight into this! Spoiler: a lot of the issues we had 10, even 15 years ago remain today.

Segment resources:

Show Notes: https://securityweekly.com/esw-398

Mar 10, 2025

In the enterprise security news,

  1. Why is a consulting firm raising a $75M Series B?
  2. A TON of Cybereason drama just dropped
  3. Skybox Security shuts down after 23 years
  4. The chilling effect on security leaders is HERE, and what that means
  5. IT interest in on-prem, does NOT mean they’re quitting the cloud
  6. Updates on the crazy Bybit heist
  7. the state of MacOS malware
  8. Skype is shutting down
  9. Mice with CRISPR’ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-397

1 2 3 4 5 6 7 Next » 44