Info

Enterprise Security Weekly (Video)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
RSS Feed Subscribe in Apple Podcasts
Enterprise Security Weekly (Video)
2025
April
March
February
January


2024
December
November
October
September
August
July
June
May
April
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April


Categories

All Episodes
Archives
Categories
Now displaying: March, 2025
Mar 31, 2025

In this week's enterprise security news,

  1. Big funding for Island
  2. Is DLP finally getting disrupted? By something that works?
  3. We learn all about Model Context Protocol servers
  4. Integrating SSO and SSH!
  5. Do we have too many cybersecurity regulations?
  6. Toxic cybersecurity workplaces
  7. Napster makes a comeback
  8. this week, we’ve got 50% less AI and 50% more co-hosts

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-400

Mar 31, 2025

In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months.

We won't have time to cover all the trends, but there are several here that I'm excited to discuss!

  • Deepfake Detection Difficult
  • Zero Trust Agentic AI
  • Phishing resistant MFA adoption
  • Identity Verification
  • Machine Identity
  • Decentralized Identity
  • Post Quantum
  • Shared Signals

Segment Resources:

Show Notes: https://securityweekly.com/esw-400

Mar 30, 2025

A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM.

  • Are the right logs enabled?
  • Is your EDR working correctly?
  • Would you notice a sudden increase or decrease in events from critical sources?
  • What can practitioners do to ensure the success of their SIEM deployment?

This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!

Show Notes: https://securityweekly.com/esw-400

Mar 24, 2025

This week, JP Bourget from Blue Cycle is with us to discuss Building the SOC of the Future

Then, Michael Mumcuoglu (Moom-cuoglu) from CardinalOps joins us to talk about improving detection engineering.

In the enterprise security news,

Google bets $32B on a Wiz Kid Cybereason is down a CEO, but $120M richer EPSS version 4 is out Github supply chain attacks all over A brief history of supply chain attacks Why you might want to wait out the Agentic AI trend Zyxel wants you to throw away their (old) products HP printers are quantum resilient (and no one cares) A giant rat is my hero All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-399

Mar 24, 2025

It feels like forever ago, but in the mid-2010s, we collectively realized, as an industry, that prevention was never going to be enough. Some attacks were always going to make their way through. Then ransomware got popular and really drove this point home. Detection engineering is a tough challenge, however.

Where do we start? Which attacks should we build detections for? How much of the MITRE ATT&CK matrix do we need to cover? How often do these detections need to be reviewed and updated? Wait, are any of our detections even working?

In this interview with Michael Mumcuoglu, we'll discuss where SecOps teams get it wrong. We'll discuss common pitfalls, and strategies for building more resilient and effective detections.

Again, as an industry, we need to understand why ransomware attacks keep going unnoticed, despite attackers using routine techniques and tools that we see over and over and over again.

Show Notes: https://securityweekly.com/esw-399

Mar 23, 2025

What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process.

In this interview, we'll discuss some of the common mistakes SecOps teams make, and where to start when building the SOC of the future.

Show Notes: https://securityweekly.com/esw-399

Mar 17, 2025

In this week's enterprise security news,

  1. Knostic raises funding
  2. The real barriers to AI adoption for security folks
  3. What AI is really getting used for in the wild
  4. Early stage startup code bases are almost entirely AI generated
  5. Hacking your employer never seems to go well
  6. should the CISO be the chief resiliency officer?
  7. proof we still need more women in tech

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-398

Mar 17, 2025

It takes months to get approvals and remediate cloud issues. It can take months to fix even critical vulnerabilities! How could this be? I thought the cloud was the birthplace of agile/DevOps, and everything speedy and scalable in IT? How could cloud security be struggling so much?

In this interview we chat with Marina Segal, the founder and CEO of Tamnoon - a company she founded specifically to address these problems.

Segment Resources:

  1. Gartner prediction: By 2025, 75% of new CSPM purchases will be part of an integrated CNAPP offering. This highlights the growing importance of CNAPP solutions. https://www.wiz.io/academy/cnapp-vs-cspm

  2. Cloud security skills gap: Even well-intentioned teams may inadvertently leave their systems vulnerable due to the cybersecurity skills shortage. https://eviden.com/publications/digital-security-magazine/cybersecurity-predictions-2025/top-cloud-security-trends/

  3. CNAPP market growth: The CNAPP market is expected to grow from $10.74 billion in 2025 to $59.88 billion by 2034, indicating a significant increase in demand for these solutions. https://eviden.com/publications/digital-security-magazine/cybersecurity-predictions-2025/top-cloud-security-trends/

  4. Challenges in Kubernetes security: CSPMs and CNAPPs may have gaps in addressing Kubernetes-specific security issues, which could be relevant to the skills gap discussion. https://www.armosec.io/blog/kubernetes-security-gap-cspm-cnapp/

  5. Addressing the skills gap: Investing in training to bridge the cybersecurity skills gap and leveraging CNAPP platforms that combine advanced tools are recommended strategies. https://www.fortinet.com/blog/business-and-technology/navigating-todays-cloud-security-challenges

  6. Tamnoon's State of Remediation 2025 report

Show Notes: https://securityweekly.com/esw-398

Mar 16, 2025

Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm.

Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet thousands of orgs every year fall victim to these attacks. What's going on here? Why are we so bad at stopping the very thing we've been training against for so long?

This Interview with Phillip Wylie will provide some insight into this! Spoiler: a lot of the issues we had 10, even 15 years ago remain today.

Segment resources:

Show Notes: https://securityweekly.com/esw-398

Mar 10, 2025

In the enterprise security news,

  1. Why is a consulting firm raising a $75M Series B?
  2. A TON of Cybereason drama just dropped
  3. Skybox Security shuts down after 23 years
  4. The chilling effect on security leaders is HERE, and what that means
  5. IT interest in on-prem, does NOT mean they’re quitting the cloud
  6. Updates on the crazy Bybit heist
  7. the state of MacOS malware
  8. Skype is shutting down
  9. Mice with CRISPR’ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-397

Mar 10, 2025

And now, for something completely different!

I've always urged the importance for practitioners to understand the underlying technology that they're challenged with defending. When we're yelling at the Linux admins and DevOps folks to "just patch it", what does that process entail? How do those patches get applied? When and how are they released in the first place?

This is often one of the sticking points when security folks get nervous about "going open source", as if 90% of the code in their environments doesn't already come from some open source project. It's a legitimate concern however - without a legal contract, and some comfort level that a paid support team is actually going to fix critical vulnerabilities, how do we develop trust or a relationship with an open source project?

In this interview, benny Vasquez, the Chair of the board of directors for AlmaLinux, will fill in some of the gaps for us, and help us understand how an open source project can not only be trusted, but in many cases may be more responsive to security teams' needs than a commercial vendor.

Segment Resources:

Show Notes: https://securityweekly.com/esw-397

Mar 9, 2025

2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks.

Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts.

Segment Resources:

Show Notes: https://securityweekly.com/esw-397

Mar 3, 2025

This week, in the enterprise security news,

  1. we’ve got some funding and acquisitions!
  2. ransomware payments are DOWN 35%
  3. infostealers on Macs are UP 101%
  4. Bybit got hit by a $1.5B heist and shrugged it off
  5. A SaaS report says AI is having no impact on pricing
  6. Microsoft’s CEO says AI is generating no value
  7. Google is dropping SMS as a second factor
  8. Google creates a 4th state of matter instead of fixing Teams
  9. What it’s like to be named “Null”

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-396

Mar 3, 2025

We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding!

Segment Resources:

Show Notes: https://securityweekly.com/esw-396

Mar 2, 2025

In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others.

Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like.

Segment Resources: Ed's podcast, Risk Never Sleeps

Show Notes: https://securityweekly.com/esw-396

1