Episodios

  • The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
    May 19 2025
    Segment 1: Fastly Interview

    In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO.

    We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features?

    This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them!

    Segment 2: Weekly Enterprise News

    In this week's enterprise security news,

    1. Agents replacing analysis is highly misunderstood
    2. only one funding round
    3. Orca acquires Opus to automate remediation
    4. OneDrive is updating to make BYOD worse?
    5. Companies are starting to regret replacing workers with AI
    6. Is venture capital hanging on by a thread (made of AI)?
    7. Potential disruption in the traditional vuln mgmt space!
    8. MCP is already looking like a dumpster fire from a security perspective
    9. malicious NPM packages
    10. and, IS ALCHEMY REAL?
    Segment 3: RSAC Conference 2025 Interviews

    Interview 1: Pluralsight

    Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats.

    Pluralsight's AI Skills Report

    This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats!

    Interview 2: Radware

    Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks.

    This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them!

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-407

    Más Menos
    2 h y 13 m
  • Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
    May 12 2025
    Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design. This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2 - Weekly Enterprise News In this week's enterprise security news, we have: Funding, mostly focused on identity security and ‘secure-by-design’Palo Alto acquires one of the more mature AI security startups, Protect AILimaCharlie is first with a cybersecurity-focused MCP offeringMeta releases a ton of open source AI security tooling, including LlamaFirewallExploring the state of AI in the SOCThe first research on whether AI is replacing jobs is outSome CEOs are requiring employees to be more productive with AIAre prompts the new IOCs?Are puppies the new booth babes?We get closure on two previous stories we covered: one about an ex-Disney employee,and one about a tiny dog Segment 3 - Executive Interviews from RSAC CYWARE The legacy SecOps market is getting disrupted. The traditional way of ingesting large troves of data, analysis and actioning is not efficient today. Customers and the market are moving towards a more threat centric approach to effectively solve their security operations challenges. CERT Water Management Case StudyCybersecurity Alert Fatigue! How Threat Intelligence Can Turn Data Overload Into Actionable Insights BlogFrost & Sullivan's 2024 Threat Intelligence Platform Radar Report2025 TIP Buyer’s Guide This segment is sponsored by Cyware. Visit https://securityweekly.com/cywarersac to request a demo! SUMOLOGIC Intelligent SecOps is more than a buzzword—it's a blueprint for modernizing security operations through real-time analytics, contextual threat intelligence, and AI-powered automation. In this segment, Sumo Logic’s Field CTO Chas Clawson explains how SOC teams can accelerate detection and response, cut through alert noise, and improve security outcomes by fusing AI-driven automation with human context and expertise. He also shares the latest security capabilities Sumo Logic announced at the RSA Conference to help organizations build and operate Intelligent SecOps. Press Release: Sumo Logic Unifies Security to Deliver Intelligent Security OperationsBlog: RSAC 2025 Intelligent Security OperationsBrief: Sumo Logic Threat IntelligenceChas Blog: Cloudy with a chance of breach: advanced threat hunting strategies for a hyperconnected and SaaSy worldLinkedIn Live: Implications of AI in a modern defense strategy This segment is sponsored by Sumo Logic. Visit https://securityweekly.com/sumologicrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-406
    Más Menos
    2 h y 14 m
  • 2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
    May 5 2025
    Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint’s latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint’s Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it’s now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren’t just hacking systems anymore—they’re hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today’s most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405
    Más Menos
    1 h y 43 m
  • The Future of Access Management - Jeff Shiner - ESW #404
    Apr 28 2025

    As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data.

    In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He’ll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security.

    In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.

    You can grab your own copy of the report at https://verizon.com/dbir

    In this week's enterprise security news,

    1. Lots of funding announcements as we approach RSA
    2. New products
    3. The M-Trends also rudely dropped their report the same day as Verizon
    4. Supply chain threats
    5. Windows Recall is making another attempt
    6. MCP server challenges
    7. Non-human identities
    8. A startup post mortem
    9. Remember that Zoom outage a week or two ago? The cause is VERY interesting

    All that and more, on this episode of Enterprise Security Weekly.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-404

    Más Menos
    2 h
  • The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403
    Apr 21 2025

    In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterprise.

    Then, we move on to the topic of AI safety and whether that should be the CISO's job, or someone else's.

    Finally, we'll discuss the future of AI and try to end on a positive or hopeful note!

    What a time to have this conversation! Mere days from the certain destruction of CVE, averted only in the 11th hour, we have a chat about vulnerability management lifecycles. CVEs are definitely part of them.

    Vulnerability management is very much a hot mess at the moment for many reasons. Even with perfectly stable support from the institutions that catalog and label vulnerabilities from vendors, we'd still have some serious issues to address, like:

    • disconnects between vulnerability analysts and asset owners
    • gaps and issues in vulnerability discovery and asset management
    • different options for workflows between security and IT: which is best?
    • patching it like you stole it

    Oh, did we mention Matt built an open source vuln scanner?

    • https://sirius.publickey.io/

    In the enterprise security news,

    1. lots of funding, but no acquisitions?
    2. New companies
    3. new tools
    4. including a SecOps chrome plugin
    5. and a chrome plugin that tells you the price of enterprise software
    6. prompt engineering tips from google
    7. being an Innovation Sandbox finalist will cost you
    8. Security brutalism
    9. CVE dumpster fires
    10. and a heartwarming story about a dog, because we need to end on something happy!

    All that and more, on this episode of Enterprise Security Weekly.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-403

    Más Menos
    2 h y 12 m
  • What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402
    Apr 14 2025

    Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most.

    The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up.

    Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we’ll be talking to Threatlocker’s CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it.

    This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!

    We wanted security data? We got it! Now, what the heck do we DO with all of it?

    The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we’re seeing companies like Abstract Security pop up to address some of these challenges.

    Abstract just released a comprehensive eBook on security data strategy, linked below, and you don’t even need to give up an email address to read it! In this interview, we’ll talk through some of the highlights:

    • Challenges
    • Myths
    • Pillars of a data security strategy
    • Understanding the tools available

    Segment Resources

    • A Leader’s Guide to Security Data Strategy eBook

    In the enterprise security news,

    1. new startup funding
    2. what happened to the cybersecurity skills shortage?
    3. tools for playing with local GenAI models
    4. CVE assignment drama
    5. a SIEM-agnostic approach to detection engineering
    6. pitch for charity
    7. a lost dog that doesn’t want to be found

    All that and more, on this episode of Enterprise Security Weekly.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-402

    Más Menos
    2 h y 3 m
  • Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401
    Apr 7 2025

    When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap.

    Side note: I really hate the term "soft skills". How about we call them "fundamental business skills", or "invaluable career advancement skills"? Hmm, doesn't quite roll off the tongue the same.

    Soft skills can impact everything, as they impose the limits of how we interact with our world. That goes for co-worker interactions, career advancements, and how we're perceived by our peers and community. It doesn't matter how brilliant you might be - without soft skills, your potential could be severely limited.

    Did you know that soft skills issues contributed to the Equifax breach?

    We'll also discuss how fear is related to some of the same limitations and challenges as soft skills.

    Segment Resources:

    • https://www.softskillstech.ca/
    • Order the Book

    You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise.

    Segment Resources:

    • This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams
    • This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud
    • Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying
    • and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs

    This week, in the enterprise security news,

    1. we check the vibes
    2. we check the funding
    3. we check runZero’s latest release notes
    4. tons of free tools!
    5. the latest TTPs
    6. supply chain threats
    7. certs won’t save you
    8. GRC needs disruption
    9. the latest Rippling/Deel drama

    All that and more, on this episode of Enterprise Security Weekly.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-401

    Más Menos
    2 h y 3 m
  • Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
    Mar 31 2025

    A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM.

    • Are the right logs enabled?
    • Is your EDR working correctly?
    • Would you notice a sudden increase or decrease in events from critical sources?
    • What can practitioners do to ensure the success of their SIEM deployment?

    This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!

    In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months.

    We won't have time to cover all the trends, but there are several here that I'm excited to discuss!

    • Deepfake Detection Difficult
    • Zero Trust Agentic AI
    • Phishing resistant MFA adoption
    • Identity Verification
    • Machine Identity
    • Decentralized Identity
    • Post Quantum
    • Shared Signals

    Segment Resources:

    • The Top Trends Shaping Identity And Access Management In 2025 - (Forrester subscription required)

    In this week's enterprise security news,

    1. Big funding for Island
    2. Is DLP finally getting disrupted? By something that works?
    3. We learn all about Model Context Protocol servers
    4. Integrating SSO and SSH!
    5. Do we have too many cybersecurity regulations?
    6. Toxic cybersecurity workplaces
    7. Napster makes a comeback
    8. this week, we’ve got 50% less AI and 50% more co-hosts

    All that and more, on this episode of Enterprise Security Weekly.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-400

    Más Menos
    1 h y 58 m
adbl_web_global_use_to_activate_T1_webcro805_stickypopup