Info

Enterprise Security Weekly (Video)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
RSS Feed Subscribe in Apple Podcasts
Enterprise Security Weekly (Video)
2025
May
April
March
February
January


2024
December
November
October
September
August
July
June
May
April
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April


Categories

All Episodes
Archives
Categories
Now displaying: April, 2025
Apr 28, 2025

In this week's enterprise security news,

  1. Lots of funding announcements as we approach RSA
  2. New products
  3. The M-Trends also rudely dropped their report the same day as Verizon
  4. Supply chain threats
  5. Windows Recall is making another attempt
  6. MCP server challenges
  7. Non-human identities
  8. A startup post mortem
  9. Remember that Zoom outage a week or two ago? The cause is VERY interesting

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-404

Apr 28, 2025

As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data.

In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He’ll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security.

Show Notes: https://securityweekly.com/esw-404

Apr 28, 2025

In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.

You can grab your own copy of the report at https://verizon.com/dbir

Show Notes: https://securityweekly.com/esw-404

Apr 21, 2025

In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterprise.

Then, we move on to the topic of AI safety and whether that should be the CISO's job, or someone else's.

Finally, we'll discuss the future of AI and try to end on a positive or hopeful note!

Show Notes: https://securityweekly.com/esw-403

Apr 21, 2025

In the enterprise security news,

  1. lots of funding, but no acquisitions?
  2. New companies
  3. new tools
  4. including a SecOps chrome plugin
  5. and a chrome plugin that tells you the price of enterprise software
  6. prompt engineering tips from google
  7. being an Innovation Sandbox finalist will cost you
  8. Security brutalism
  9. CVE dumpster fires
  10. and a heartwarming story about a dog, because we need to end on something happy!

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-403

Apr 21, 2025

What a time to have this conversation! Mere days from the certain destruction of CVE, averted only in the 11th hour, we have a chat about vulnerability management lifecycles. CVEs are definitely part of them.

Vulnerability management is very much a hot mess at the moment for many reasons. Even with perfectly stable support from the institutions that catalog and label vulnerabilities from vendors, we'd still have some serious issues to address, like:

  • disconnects between vulnerability analysts and asset owners
  • gaps and issues in vulnerability discovery and asset management
  • different options for workflows between security and IT: which is best?
  • patching it like you stole it

Oh, did we mention Matt built an open source vuln scanner?

Show Notes: https://securityweekly.com/esw-403

Apr 14, 2025

Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most.

The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up.

Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we’ll be talking to Threatlocker’s CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it.

This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!

Show Notes: https://securityweekly.com/esw-402

Apr 14, 2025

In the enterprise security news,

  1. new startup funding
  2. what happened to the cybersecurity skills shortage?
  3. tools for playing with local GenAI models
  4. CVE assignment drama
  5. a SIEM-agnostic approach to detection engineering
  6. pitch for charity
  7. a lost dog that doesn’t want to be found

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-402

Apr 14, 2025

We wanted security data? We got it! Now, what the heck do we DO with all of it?

The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we’re seeing companies like Abstract Security pop up to address some of these challenges.

Abstract just released a comprehensive eBook on security data strategy, linked below, and you don’t even need to give up an email address to read it! In this interview, we’ll talk through some of the highlights:

  • Challenges
  • Myths
  • Pillars of a data security strategy
  • Understanding the tools available

Segment Resources

Show Notes: https://securityweekly.com/esw-402

Apr 7, 2025

This week, in the enterprise security news,

  1. we check the vibes
  2. we check the funding
  3. we check runZero’s latest release notes
  4. tons of free tools!
  5. the latest TTPs
  6. supply chain threats
  7. certs won’t save you
  8. GRC needs disruption
  9. the latest Rippling/Deel drama

All that and more, on this episode of Enterprise Security Weekly.

Show Notes: https://securityweekly.com/esw-401

Apr 7, 2025

You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise.

Segment Resources:

Show Notes: https://securityweekly.com/esw-401

Apr 7, 2025

When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap.

Side note: I really hate the term "soft skills". How about we call them "fundamental business skills", or "invaluable career advancement skills"? Hmm, doesn't quite roll off the tongue the same.

Soft skills can impact everything, as they impose the limits of how we interact with our world. That goes for co-worker interactions, career advancements, and how we're perceived by our peers and community. It doesn't matter how brilliant you might be - without soft skills, your potential could be severely limited.

Did you know that soft skills issues contributed to the Equifax breach?

We'll also discuss how fear is related to some of the same limitations and challenges as soft skills.

Segment Resources:

Show Notes: https://securityweekly.com/esw-401

1