Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Enterprise Security Weekly (Audio)

Technology Education

Episodes

Showing 1-100 of 473
Page 1 of 5 Next → »»

Making AI actually work in the enterprise and more RSAC Conference 2026 interviews - Camellia Chan, Aamir Lakhani, Jim Spignardo, Jody Brazil, Ely Abramovitch - ESW #455

20 Apr 2026

Contributed by Lukas

Interview with Jim Spignardo What does it take to build AI workflows that work? Why do so many fail? Jim isn't a typical ESW guest. I think it's essen...

We catch up on the news, including AI vuln hunting; also more RSAC interviews! - John Wilson, Mark Lambert, Georges Bossert, Samuel Hassine - ESW #454

13 Apr 2026

Contributed by Lukas

Segment 1: We cover the weekly enterprise news! Segment 2: RSAC interviews from ArmorCode and Filigran ArmorCode: AI Exposure Management and Governing...

Battling payment fraud with tokenization and executive interviews from RSAC 2026 - Jimmy White, Thyaga Vasudevan, Brian Oh, Mickey Bresman, Ashish Jain - ESW #453

06 Apr 2026

Contributed by Lukas

Interview with Brian Oh from FIS Global Merchant-Specific Tokenization: Making Embedded Finance More Fraud-Resistant Payment fraud has not gone away. ...

Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - Alexandre Sieira, Lenny Zeltser, Helen Patton - ESW #452

30 Mar 2026

Contributed by Lukas

Interview with Helen Patton about her new book, Switching to Cyber Helen joins us to discuss her second book, "Switching to Cyber." Her first book dis...

Can AI help critical infrastructure, the state of the cyber market, and weekly news - Mike Privette, Kara Sprague - ESW #451

23 Mar 2026

Contributed by Lukas

Interview with Kara Sprague - The AI Fix for Infrastructure's Oldest Security Risks. Critical infrastructure, often built on decades-old systems and l...

AI Governance, new book (Code War) from Allie Mellen, and the weekly news! - Jeremy Snyder, Allie Mellen - ESW #450

16 Mar 2026

Contributed by Lukas

Interview with Jeremy Snyder from FireTail about AI Governance Death by a thousand cuts: the AI shadow IT problem I think the best description of the ...

Breaking in with CrashFix, supply chain security, and CMMC phase 1 - David Zendzian, Anna Pham, Jacob Horne - ESW #449

09 Mar 2026

Contributed by Lukas

Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a ne...

OT Security/business resilience, lack of incentives for securing software & the news - Ben Worthy - ESW #448

02 Mar 2026

Contributed by Lukas

Interview - Ben Worthy from Airbus Protect The current state of OT security and business resilience In this episode of Enterprise Security Weekly, we ...

Bringing intelligence to assets, new White House cybersecurity strategy, and the news - Tim Morris - ESW #447

23 Feb 2026

Contributed by Lukas

Segment 1 - Interview with Tim Morris Bringing intelligence to assets You've been through 6 CMDB projects in the last decade. None of them came close ...

Hardware-level zero trust, don't trust AI with your employees, and the news - J Wolfgang Goerlich, Matias Katz - ESW #446

16 Feb 2026

Contributed by Lukas

Segment 1: Interview with Mathias Katz What if you had enterprise-grade network security protections traveling with your users' laptops? What if it co...

Clickfixed, Zero Trust World, and OpenClaw is out of control - but that's the point - Rob Allen - ESW #445

09 Feb 2026

Contributed by Lukas

Interview Segment - Rob Allen - Clickfix "Clickfix" attacks aren't new, but they're certainly more common these days. Rob Allen joins us to help us un...

Initial entry to resilience: understanding modern attack flows and this week's news - Warwick Webb - ESW #444

02 Feb 2026

Contributed by Lukas

Segment 1: Interview with Warwick Webb From Initial Entry to Resilience: Understanding Modern Attack Flows Modern cyberattacks don't unfold as isolate...

The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443

26 Jan 2026

Contributed by Lukas

Segment 1: Interview with Thyaga Vasudevan Hybrid by Design: Zero Trust, AI, and the Future of Data Control AI is reshaping how work gets done, accele...

Making vulnerability management and incident response actually work. Also, the News! - Ryan Fried, Beck Norris, José Toledo - ESW #442

19 Jan 2026

Contributed by Lukas

Segment 1 with Beck Norris - Making vulnerability management actually work Vulnerability management is often treated as a tooling or patching problem,...

The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441

12 Jan 2026

Contributed by Lukas

First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures ...

Why are cybersecurity predictions so bad? - ESW #440

05 Jan 2026

Contributed by Lukas

For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature ...

Holiday Chat: Local AI datacenter activism, AI can't substitute good taste, and more - ESW #439

29 Dec 2025

Contributed by Lukas

For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the...

Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438

22 Dec 2025

Contributed by Lukas

Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a s...

Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437

15 Dec 2025

Contributed by Lukas

Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls...

Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436

08 Dec 2025

Contributed by Lukas

Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security pro...

From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435

01 Dec 2025

Contributed by Lukas

Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exp...

Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434

24 Nov 2025

Contributed by Lukas

Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using ...

Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

17 Nov 2025

Contributed by Lukas

Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing y...

OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

10 Nov 2025

Contributed by Lukas

Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. ...

Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431

03 Nov 2025

Contributed by Lukas

Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-cri...

Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430

27 Oct 2025

Contributed by Lukas

Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents,...

Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429

20 Oct 2025

Contributed by Lukas

Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost ...

New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428

13 Oct 2025

Contributed by Lukas

Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. ...

AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427

06 Oct 2025

Contributed by Lukas

At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today's AI-driven enterpris...

Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426

29 Sep 2025

Contributed by Lukas

How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today's threat landscape has never been more complex. Ma...

Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425

22 Sep 2025

Contributed by Lukas

Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and...

Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424

15 Sep 2025

Contributed by Lukas

Segment 1 - Interview with Jeff Pollard Introducing Forrester's AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this e...

Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar "Jawa" Sivasankaran - ESW #423

08 Sep 2025

Contributed by Lukas

Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pr...

Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422

01 Sep 2025

Contributed by Lukas

Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of secu...

Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421

25 Aug 2025

Contributed by Lukas

Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like...

Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420

18 Aug 2025

Contributed by Lukas

Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to ...

ESW at BlackHat and the weekly enterprise security news - ESW #419

11 Aug 2025

Contributed by Lukas

Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard s...

Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418

04 Aug 2025

Contributed by Lukas

The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split in...

tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417

28 Jul 2025

Contributed by Lukas

Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite...

The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416

21 Jul 2025

Contributed by Lukas

Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there's a hall-of-fame for cybersecurity books? Over th...

Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415

14 Jul 2025

Contributed by Lukas

Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups...

Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414

07 Jul 2025

Contributed by Lukas

Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cyber...

The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413

30 Jun 2025

Contributed by Lukas

Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks ...

Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412

23 Jun 2025

Contributed by Lukas

In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are ...

Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411

16 Jun 2025

Contributed by Lukas

Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to...

The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410

09 Jun 2025

Contributed by Lukas

Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in rea...

Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

02 Jun 2025

Contributed by Lukas

Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurit...

Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408

26 May 2025

Contributed by Lukas

Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackli...

The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407

19 May 2025

Contributed by Lukas

Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes t...

Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406

12 May 2025

Contributed by Lukas

Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundatio...

2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

05 May 2025

Contributed by Lukas

Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. ...

The Future of Access Management - Jeff Shiner - ESW #404

28 Apr 2025

Contributed by Lukas

As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to k...

The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403

21 Apr 2025

Contributed by Lukas

In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when...

What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

14 Apr 2025

Contributed by Lukas

Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept w...

Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401

07 Apr 2025

Contributed by Lukas

When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a g...

Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400

31 Mar 2025

Contributed by Lukas

A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on yo...

Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399

24 Mar 2025

Contributed by Lukas

What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience ...

Penetration Tests: useful, pointless, harmful, required, ineffective? - Phillip Wylie, Marina Segal - ESW #398

17 Mar 2025

Contributed by Lukas

Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at...

Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

10 Mar 2025

Contributed by Lukas

2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attac...

First Do No Harm - Security Challenges in Healthcare - Ed Gaudet, Tanya Janca - ESW #396

03 Mar 2025

Contributed by Lukas

In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the eco...

The Future of Cyber Regulation in the New Administration - Ilona Cohen, Jenn Gile - ESW #395

24 Feb 2025

Contributed by Lukas

In this interview, we're excited to have Ilona Cohen to help us understand what changes this new US administration might bring, in terms of cybersecur...

Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Allie Mellen, Tim MalcomVetter - ESW #394

17 Feb 2025

Contributed by Lukas

We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without ...

The groundbreaking technology addressing employment scams and deepfakes - John Dwyer, Aaron Painter - ESW #393

10 Feb 2025

Contributed by Lukas

Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity...

The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392

03 Feb 2025

Contributed by Lukas

Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in th...

AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391

27 Jan 2025

Contributed by Lukas

HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are glo...

The Next Era of Data Security: AI, Cloud, & Compliance - Jeff Smith, Dimitri Sirota, Kiran Chinnagangannagari - ESW #390

20 Jan 2025

Contributed by Lukas

Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigI...

How threat-informed defense benefits each security team member - Frank Duff, Nathan Sportsman - ESW #389

13 Jan 2025

Contributed by Lukas

We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluati...

D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388

20 Dec 2024

Contributed by Lukas

Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND...

The 2024 Cybersecurity Market Review - Mike Privette, Rew Islam - ESW #387

13 Dec 2024

Contributed by Lukas

For our second year now, Mike Privette, from Return on Security and the Security, Funded newsletter joins us to discuss the year's highlights and what...

Tackling Barriers on the Road To Cyber Resilience - Rob Allen, Theresa Lanowitz - ESW #386

06 Dec 2024

Contributed by Lukas

In this final installment of a trio of discussions with Theresa Lanowitz about Cyber Resilience, we put it all together and attempt to figure out what...

2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW Vault

28 Nov 2024

Contributed by Lukas

Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on December 22, 2023. We're...

Fixing how cybersecurity products are bought and sold - Mariana Padilla - ESW #385

22 Nov 2024

Contributed by Lukas

This is a topic our hosts are very passionate about, and we're excited to discuss with Mariana Padilla, co-founder and CEO of Hackerverse. She wants t...

AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384

15 Nov 2024

Contributed by Lukas

There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented ...

Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383

08 Nov 2024

Contributed by Lukas

CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary t...

What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382

04 Nov 2024

Contributed by Lukas

The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alc...

Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381

25 Oct 2024

Contributed by Lukas

Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that ...

Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380

18 Oct 2024

Contributed by Lukas

Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The lates...

Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379

11 Oct 2024

Contributed by Lukas

For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing s...

Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378

03 Oct 2024

Contributed by Lukas

Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experien...

SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377

27 Sep 2024

Contributed by Lukas

The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conve...

Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376

20 Sep 2024

Contributed by Lukas

A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs...

Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375

13 Sep 2024

Contributed by Lukas

This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire ...

How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault

05 Sep 2024

Contributed by Lukas

Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum co...

What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374

30 Aug 2024

Contributed by Lukas

The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the m...

The end of the road for some cyber startups & making detection actually work! - Vivek Bhandari, Vivek Ramachandran, Mike Lyborg, Brandon Potter - ESW #373

23 Aug 2024

Contributed by Lukas

This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding prob...

Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372

15 Aug 2024

Contributed by Lukas

In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They hi...

AI Red Teaming and AI Safety - Sounil Yu, Amanda Minnich - ESW #371

09 Aug 2024

Contributed by Lukas

In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her...

Cybersecurity's Love Affair with Distractions - Fred Wilmot, Dani Woolf - ESW #370

02 Aug 2024

Contributed by Lukas

Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would ...

Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch, Edward Wu - ESW #369

26 Jul 2024

Contributed by Lukas

The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift...

Jump-starting SOC Analyst Careers, Addressing Cybersecurity Industry Challenges, and Historic Rumors in Enterprise Security - ESW #368

19 Jul 2024

Contributed by Lukas

In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Ty...

Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367

12 Jul 2024

Contributed by Lukas

I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governan...

The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366

28 Jun 2024

Contributed by Lukas

We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every...

Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

21 Jun 2024

Contributed by Lukas

Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approac...

iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

21 Jun 2024

Contributed by Lukas

FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secu...

Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

20 Jun 2024

Contributed by Lukas

Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren't going to go away with current approaches like SAST and SCA. Why? ...

Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365

14 Jun 2024

Contributed by Lukas

This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Forti...

Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364

06 Jun 2024

Contributed by Lukas

"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category...

A CISO's Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault

31 May 2024

Contributed by Lukas

In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity market...

Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

31 May 2024

Contributed by Lukas

Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Securi...

Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault

30 May 2024

Contributed by Lukas

As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This ...

Page 1 of 5 Next → »»