Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Enterprise Security Weekly (Audio)

Technology Education

Episodes

Showing 1-100 of 456
Page 1 of 5 Next → »»

Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438

22 Dec 2025

Contributed by Lukas

Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a s...

Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437

15 Dec 2025

Contributed by Lukas

Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls...

Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436

08 Dec 2025

Contributed by Lukas

Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security pro...

From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435

01 Dec 2025

Contributed by Lukas

Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exp...

Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434

24 Nov 2025

Contributed by Lukas

Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using ...

Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

17 Nov 2025

Contributed by Lukas

Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing y...

OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

10 Nov 2025

Contributed by Lukas

Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. ...

Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431

03 Nov 2025

Contributed by Lukas

Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-cri...

Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430

27 Oct 2025

Contributed by Lukas

Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents,...

Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429

20 Oct 2025

Contributed by Lukas

Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost ...

New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428

13 Oct 2025

Contributed by Lukas

Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. ...

AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427

06 Oct 2025

Contributed by Lukas

At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today's AI-driven enterpris...

Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426

29 Sep 2025

Contributed by Lukas

How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today's threat landscape has never been more complex. Ma...

Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425

22 Sep 2025

Contributed by Lukas

Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and...

Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424

15 Sep 2025

Contributed by Lukas

Segment 1 - Interview with Jeff Pollard Introducing Forrester's AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this e...

Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar "Jawa" Sivasankaran - ESW #423

08 Sep 2025

Contributed by Lukas

Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pr...

Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422

01 Sep 2025

Contributed by Lukas

Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of secu...

Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421

25 Aug 2025

Contributed by Lukas

Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like...

Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420

18 Aug 2025

Contributed by Lukas

Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to ...

ESW at BlackHat and the weekly enterprise security news - ESW #419

11 Aug 2025

Contributed by Lukas

Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard s...

Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418

04 Aug 2025

Contributed by Lukas

The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split in...

tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417

28 Jul 2025

Contributed by Lukas

Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite...

The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416

21 Jul 2025

Contributed by Lukas

Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there's a hall-of-fame for cybersecurity books? Over th...

Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415

14 Jul 2025

Contributed by Lukas

Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups...

Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414

07 Jul 2025

Contributed by Lukas

Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cyber...

The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413

30 Jun 2025

Contributed by Lukas

Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks ...

Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412

23 Jun 2025

Contributed by Lukas

In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are ...

Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411

16 Jun 2025

Contributed by Lukas

Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to...

The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410

09 Jun 2025

Contributed by Lukas

Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in rea...

Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

02 Jun 2025

Contributed by Lukas

Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurit...

Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408

26 May 2025

Contributed by Lukas

Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackli...

The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407

19 May 2025

Contributed by Lukas

Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes t...

Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406

12 May 2025

Contributed by Lukas

Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundatio...

2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

05 May 2025

Contributed by Lukas

Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. ...

The Future of Access Management - Jeff Shiner - ESW #404

28 Apr 2025

Contributed by Lukas

As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to k...

The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403

21 Apr 2025

Contributed by Lukas

In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when...

What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

14 Apr 2025

Contributed by Lukas

Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept w...

Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401

07 Apr 2025

Contributed by Lukas

When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a g...

Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400

31 Mar 2025

Contributed by Lukas

A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on yo...

Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399

24 Mar 2025

Contributed by Lukas

What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience ...

Penetration Tests: useful, pointless, harmful, required, ineffective? - Phillip Wylie, Marina Segal - ESW #398

17 Mar 2025

Contributed by Lukas

Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at...

Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

10 Mar 2025

Contributed by Lukas

2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attac...

First Do No Harm - Security Challenges in Healthcare - Ed Gaudet, Tanya Janca - ESW #396

03 Mar 2025

Contributed by Lukas

In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the eco...

The Future of Cyber Regulation in the New Administration - Ilona Cohen, Jenn Gile - ESW #395

24 Feb 2025

Contributed by Lukas

In this interview, we're excited to have Ilona Cohen to help us understand what changes this new US administration might bring, in terms of cybersecur...

Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Allie Mellen, Tim MalcomVetter - ESW #394

17 Feb 2025

Contributed by Lukas

We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without ...

The groundbreaking technology addressing employment scams and deepfakes - John Dwyer, Aaron Painter - ESW #393

10 Feb 2025

Contributed by Lukas

Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity...

The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392

03 Feb 2025

Contributed by Lukas

Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in th...

AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391

27 Jan 2025

Contributed by Lukas

HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are glo...

The Next Era of Data Security: AI, Cloud, & Compliance - Jeff Smith, Dimitri Sirota, Kiran Chinnagangannagari - ESW #390

20 Jan 2025

Contributed by Lukas

Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigI...

How threat-informed defense benefits each security team member - Frank Duff, Nathan Sportsman - ESW #389

13 Jan 2025

Contributed by Lukas

We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluati...

D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388

20 Dec 2024

Contributed by Lukas

Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND...

The 2024 Cybersecurity Market Review - Mike Privette, Rew Islam - ESW #387

13 Dec 2024

Contributed by Lukas

For our second year now, Mike Privette, from Return on Security and the Security, Funded newsletter joins us to discuss the year's highlights and what...

Tackling Barriers on the Road To Cyber Resilience - Rob Allen, Theresa Lanowitz - ESW #386

06 Dec 2024

Contributed by Lukas

In this final installment of a trio of discussions with Theresa Lanowitz about Cyber Resilience, we put it all together and attempt to figure out what...

2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW Vault

28 Nov 2024

Contributed by Lukas

Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on December 22, 2023. We're...

Fixing how cybersecurity products are bought and sold - Mariana Padilla - ESW #385

22 Nov 2024

Contributed by Lukas

This is a topic our hosts are very passionate about, and we're excited to discuss with Mariana Padilla, co-founder and CEO of Hackerverse. She wants t...

AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384

15 Nov 2024

Contributed by Lukas

There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented ...

Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383

08 Nov 2024

Contributed by Lukas

CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary t...

What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382

04 Nov 2024

Contributed by Lukas

The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alc...

Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381

25 Oct 2024

Contributed by Lukas

Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that ...

Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380

18 Oct 2024

Contributed by Lukas

Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The lates...

Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379

11 Oct 2024

Contributed by Lukas

For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing s...

Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378

03 Oct 2024

Contributed by Lukas

Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experien...

SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377

27 Sep 2024

Contributed by Lukas

The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conve...

Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376

20 Sep 2024

Contributed by Lukas

A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs...

Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375

13 Sep 2024

Contributed by Lukas

This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire ...

How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault

05 Sep 2024

Contributed by Lukas

Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum co...

What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374

30 Aug 2024

Contributed by Lukas

The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the m...

The end of the road for some cyber startups & making detection actually work! - Vivek Bhandari, Vivek Ramachandran, Mike Lyborg, Brandon Potter - ESW #373

23 Aug 2024

Contributed by Lukas

This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding prob...

Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372

15 Aug 2024

Contributed by Lukas

In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They hi...

AI Red Teaming and AI Safety - Sounil Yu, Amanda Minnich - ESW #371

09 Aug 2024

Contributed by Lukas

In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her...

Cybersecurity's Love Affair with Distractions - Fred Wilmot, Dani Woolf - ESW #370

02 Aug 2024

Contributed by Lukas

Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would ...

Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch, Edward Wu - ESW #369

26 Jul 2024

Contributed by Lukas

The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift...

Jump-starting SOC Analyst Careers, Addressing Cybersecurity Industry Challenges, and Historic Rumors in Enterprise Security - ESW #368

19 Jul 2024

Contributed by Lukas

In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Ty...

Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367

12 Jul 2024

Contributed by Lukas

I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governan...

The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366

28 Jun 2024

Contributed by Lukas

We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every...

Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

21 Jun 2024

Contributed by Lukas

Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approac...

iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

21 Jun 2024

Contributed by Lukas

FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secu...

Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

20 Jun 2024

Contributed by Lukas

Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren't going to go away with current approaches like SAST and SCA. Why? ...

Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365

14 Jun 2024

Contributed by Lukas

This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Forti...

Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364

06 Jun 2024

Contributed by Lukas

"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category...

A CISO's Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault

31 May 2024

Contributed by Lukas

In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity market...

Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

31 May 2024

Contributed by Lukas

Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Securi...

Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault

30 May 2024

Contributed by Lukas

As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This ...

This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363

24 May 2024

Contributed by Lukas

Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cy...

Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362

16 May 2024

Contributed by Lukas

Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, P...

Executive Interviews from RSAC! - ESW #361

09 May 2024

Contributed by Lukas

Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical S...

Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

02 May 2024

Contributed by Lukas

It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for inc...

Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359

25 Apr 2024

Contributed by Lukas

A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and ...

From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

18 Apr 2024

Contributed by Lukas

Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to pro...

Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

11 Apr 2024

Contributed by Lukas

In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it ...

Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356

05 Apr 2024

Contributed by Lukas

NVD checked out, then they came back? Maybe? Should the xz backdoor be treated as a vulnerability? Is scan-driven vulnerability management obsolete wh...

Why cyber hygiene requires curious talent - Clea Ostendorf - ESW #355

29 Mar 2024

Contributed by Lukas

Many years ago, I fielded a survey focused on the culture of cybersecurity. One of the questions asked what initially drew folks to cybersecurity as a...

Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

22 Mar 2024

Contributed by Lukas

While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats ...

Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353

15 Mar 2024

Contributed by Lukas

In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever gr...

What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

07 Mar 2024

Contributed by Lukas

Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SI...

Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351

01 Mar 2024

Contributed by Lukas

Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other networ...

Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault

22 Feb 2024

Contributed by Lukas

Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021. Ch...

Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350

15 Feb 2024

Contributed by Lukas

In this segment, featuring guest Amer Deeba, we'll explore how the SEC's new breach reporting rules will affect companies. We've got a ton of question...

Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349

09 Feb 2024

Contributed by Lukas

Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the t...

The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348

01 Feb 2024

Contributed by Lukas

We've seen general users targeted with phishing, financial employees targeted for BEC scams, and engineers targeted for access to infrastructure. The ...

Page 1 of 5 Next → »»