Enterprise Security Weekly (Audio)
Episodes
Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438
22 Dec 2025
Contributed by Lukas
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a s...
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
15 Dec 2025
Contributed by Lukas
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls...
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
08 Dec 2025
Contributed by Lukas
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security pro...
From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435
01 Dec 2025
Contributed by Lukas
Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exp...
Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434
24 Nov 2025
Contributed by Lukas
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using ...
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
17 Nov 2025
Contributed by Lukas
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing y...
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
10 Nov 2025
Contributed by Lukas
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. ...
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
03 Nov 2025
Contributed by Lukas
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-cri...
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
27 Oct 2025
Contributed by Lukas
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents,...
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
20 Oct 2025
Contributed by Lukas
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost ...
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
13 Oct 2025
Contributed by Lukas
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. ...
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
06 Oct 2025
Contributed by Lukas
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today's AI-driven enterpris...
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
29 Sep 2025
Contributed by Lukas
How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today's threat landscape has never been more complex. Ma...
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
22 Sep 2025
Contributed by Lukas
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and...
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
15 Sep 2025
Contributed by Lukas
Segment 1 - Interview with Jeff Pollard Introducing Forrester's AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this e...
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar "Jawa" Sivasankaran - ESW #423
08 Sep 2025
Contributed by Lukas
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pr...
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
01 Sep 2025
Contributed by Lukas
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of secu...
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
25 Aug 2025
Contributed by Lukas
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like...
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
18 Aug 2025
Contributed by Lukas
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to ...
ESW at BlackHat and the weekly enterprise security news - ESW #419
11 Aug 2025
Contributed by Lukas
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard s...
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
04 Aug 2025
Contributed by Lukas
The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split in...
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
28 Jul 2025
Contributed by Lukas
Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite...
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
21 Jul 2025
Contributed by Lukas
Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there's a hall-of-fame for cybersecurity books? Over th...
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
14 Jul 2025
Contributed by Lukas
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups...
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
07 Jul 2025
Contributed by Lukas
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cyber...
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
30 Jun 2025
Contributed by Lukas
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks ...
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
23 Jun 2025
Contributed by Lukas
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are ...
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
16 Jun 2025
Contributed by Lukas
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to...
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
09 Jun 2025
Contributed by Lukas
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in rea...
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
02 Jun 2025
Contributed by Lukas
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurit...
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
26 May 2025
Contributed by Lukas
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackli...
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
19 May 2025
Contributed by Lukas
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes t...
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
12 May 2025
Contributed by Lukas
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundatio...
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
05 May 2025
Contributed by Lukas
Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. ...
The Future of Access Management - Jeff Shiner - ESW #404
28 Apr 2025
Contributed by Lukas
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to k...
The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403
21 Apr 2025
Contributed by Lukas
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when...
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402
14 Apr 2025
Contributed by Lukas
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept w...
Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401
07 Apr 2025
Contributed by Lukas
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a g...
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
31 Mar 2025
Contributed by Lukas
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on yo...
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
24 Mar 2025
Contributed by Lukas
What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience ...
Penetration Tests: useful, pointless, harmful, required, ineffective? - Phillip Wylie, Marina Segal - ESW #398
17 Mar 2025
Contributed by Lukas
Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at...
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397
10 Mar 2025
Contributed by Lukas
2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attac...
First Do No Harm - Security Challenges in Healthcare - Ed Gaudet, Tanya Janca - ESW #396
03 Mar 2025
Contributed by Lukas
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the eco...
The Future of Cyber Regulation in the New Administration - Ilona Cohen, Jenn Gile - ESW #395
24 Feb 2025
Contributed by Lukas
In this interview, we're excited to have Ilona Cohen to help us understand what changes this new US administration might bring, in terms of cybersecur...
Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Allie Mellen, Tim MalcomVetter - ESW #394
17 Feb 2025
Contributed by Lukas
We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without ...
The groundbreaking technology addressing employment scams and deepfakes - John Dwyer, Aaron Painter - ESW #393
10 Feb 2025
Contributed by Lukas
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity...
The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392
03 Feb 2025
Contributed by Lukas
Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in th...
AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391
27 Jan 2025
Contributed by Lukas
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are glo...
The Next Era of Data Security: AI, Cloud, & Compliance - Jeff Smith, Dimitri Sirota, Kiran Chinnagangannagari - ESW #390
20 Jan 2025
Contributed by Lukas
Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigI...
How threat-informed defense benefits each security team member - Frank Duff, Nathan Sportsman - ESW #389
13 Jan 2025
Contributed by Lukas
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluati...
D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388
20 Dec 2024
Contributed by Lukas
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND...
The 2024 Cybersecurity Market Review - Mike Privette, Rew Islam - ESW #387
13 Dec 2024
Contributed by Lukas
For our second year now, Mike Privette, from Return on Security and the Security, Funded newsletter joins us to discuss the year's highlights and what...
Tackling Barriers on the Road To Cyber Resilience - Rob Allen, Theresa Lanowitz - ESW #386
06 Dec 2024
Contributed by Lukas
In this final installment of a trio of discussions with Theresa Lanowitz about Cyber Resilience, we put it all together and attempt to figure out what...
2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW Vault
28 Nov 2024
Contributed by Lukas
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on December 22, 2023. We're...
Fixing how cybersecurity products are bought and sold - Mariana Padilla - ESW #385
22 Nov 2024
Contributed by Lukas
This is a topic our hosts are very passionate about, and we're excited to discuss with Mariana Padilla, co-founder and CEO of Hackerverse. She wants t...
AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384
15 Nov 2024
Contributed by Lukas
There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented ...
Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383
08 Nov 2024
Contributed by Lukas
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary t...
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
04 Nov 2024
Contributed by Lukas
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alc...
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
25 Oct 2024
Contributed by Lukas
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that ...
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
18 Oct 2024
Contributed by Lukas
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The lates...
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
11 Oct 2024
Contributed by Lukas
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing s...
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378
03 Oct 2024
Contributed by Lukas
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experien...
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377
27 Sep 2024
Contributed by Lukas
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conve...
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
20 Sep 2024
Contributed by Lukas
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs...
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
13 Sep 2024
Contributed by Lukas
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire ...
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
05 Sep 2024
Contributed by Lukas
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum co...
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
30 Aug 2024
Contributed by Lukas
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the m...
The end of the road for some cyber startups & making detection actually work! - Vivek Bhandari, Vivek Ramachandran, Mike Lyborg, Brandon Potter - ESW #373
23 Aug 2024
Contributed by Lukas
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding prob...
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
15 Aug 2024
Contributed by Lukas
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They hi...
AI Red Teaming and AI Safety - Sounil Yu, Amanda Minnich - ESW #371
09 Aug 2024
Contributed by Lukas
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her...
Cybersecurity's Love Affair with Distractions - Fred Wilmot, Dani Woolf - ESW #370
02 Aug 2024
Contributed by Lukas
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would ...
Generative AI (as used by defenders AND attackers) will Drive SOC Evolution - Greg Notch, Edward Wu - ESW #369
26 Jul 2024
Contributed by Lukas
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift...
Jump-starting SOC Analyst Careers, Addressing Cybersecurity Industry Challenges, and Historic Rumors in Enterprise Security - ESW #368
19 Jul 2024
Contributed by Lukas
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Ty...
Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367
12 Jul 2024
Contributed by Lukas
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governan...
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
28 Jun 2024
Contributed by Lukas
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every...
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
21 Jun 2024
Contributed by Lukas
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approac...
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
21 Jun 2024
Contributed by Lukas
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secu...
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
20 Jun 2024
Contributed by Lukas
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren't going to go away with current approaches like SAST and SCA. Why? ...
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365
14 Jun 2024
Contributed by Lukas
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Forti...
Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364
06 Jun 2024
Contributed by Lukas
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category...
A CISO's Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault
31 May 2024
Contributed by Lukas
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity market...
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
31 May 2024
Contributed by Lukas
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Securi...
Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault
30 May 2024
Contributed by Lukas
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This ...
This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363
24 May 2024
Contributed by Lukas
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cy...
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362
16 May 2024
Contributed by Lukas
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, P...
Executive Interviews from RSAC! - ESW #361
09 May 2024
Contributed by Lukas
Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical S...
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
02 May 2024
Contributed by Lukas
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for inc...
Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359
25 Apr 2024
Contributed by Lukas
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and ...
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358
18 Apr 2024
Contributed by Lukas
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to pro...
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357
11 Apr 2024
Contributed by Lukas
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it ...
Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356
05 Apr 2024
Contributed by Lukas
NVD checked out, then they came back? Maybe? Should the xz backdoor be treated as a vulnerability? Is scan-driven vulnerability management obsolete wh...
Why cyber hygiene requires curious talent - Clea Ostendorf - ESW #355
29 Mar 2024
Contributed by Lukas
Many years ago, I fielded a survey focused on the culture of cybersecurity. One of the questions asked what initially drew folks to cybersecurity as a...
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354
22 Mar 2024
Contributed by Lukas
While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats ...
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
15 Mar 2024
Contributed by Lukas
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever gr...
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352
07 Mar 2024
Contributed by Lukas
Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SI...
Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351
01 Mar 2024
Contributed by Lukas
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other networ...
Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault
22 Feb 2024
Contributed by Lukas
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021. Ch...
Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350
15 Feb 2024
Contributed by Lukas
In this segment, featuring guest Amer Deeba, we'll explore how the SEC's new breach reporting rules will affect companies. We've got a ton of question...
Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349
09 Feb 2024
Contributed by Lukas
Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the t...
The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348
01 Feb 2024
Contributed by Lukas
We've seen general users targeted with phishing, financial employees targeted for BEC scams, and engineers targeted for access to infrastructure. The ...