1. EachPod

Enterprise Security Weekly (Audio) - Podcast

Enterprise Security Weekly (Audio)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.

How To Education Technology
Update frequency
every 6 days
Average duration
94 minutes
Episodes
441
Years Active
2016 - 2025
Share to:
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud  - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault

Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero T…

00:58:32  |   Fri 21 Jun 2024
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault

FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only fo…

00:44:48  |   Fri 21 Jun 2024
Bringing Autonomy to AppSec - Dr. David  Brumley  - ESW Vault

Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault

Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are:

-40 years old, with little innovation

-…

00:32:22  |   Thu 20 Jun 2024
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365

Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365

This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to…

02:41:25  |   Fri 14 Jun 2024
Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364

Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364

"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governanc…

02:31:08  |   Thu 06 Jun 2024
A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault

A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault

In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightfu…

00:46:35  |   Fri 31 May 2024
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat dete…

00:48:15  |   Fri 31 May 2024
Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault

Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault

As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs,…

00:40:53  |   Thu 30 May 2024
This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363

This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363

Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a han…

02:39:17  |   Fri 24 May 2024
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362

Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362

Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not h…

02:27:32  |   Thu 16 May 2024
Executive Interviews from RSAC! - ESW #361

Executive Interviews from RSAC! - ESW #361

Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical Start, Anomali, Cyware, and Pentera!

Find individu…

02:09:12  |   Thu 09 May 2024
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH t…

01:57:07  |   Thu 02 May 2024
Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359

Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359

A clear pattern with startups getting funding this week are "autonomous" products and features.

  • Automated detection engineering
  • Autonomously map and predict malicious infrastructure
  • ..."helps your w…
01:57:31  |   Thu 25 Apr 2024
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358

Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - se…

01:47:19  |   Thu 18 Apr 2024
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's…

01:42:25  |   Thu 11 Apr 2024
Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356

Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356

NVD checked out, then they came back? Maybe?

Should the xz backdoor be treated as a vulnerability?

Is scan-driven vulnerability management obsolete when it comes to alerting on emerging threats?

What…

01:57:23  |   Fri 05 Apr 2024
Why cyber hygiene requires curious talent - Clea Ostendorf - ESW #355

Why cyber hygiene requires curious talent - Clea Ostendorf - ESW #355

Many years ago, I fielded a survey focused on the culture of cybersecurity. One of the questions asked what initially drew folks to cybersecurity as a career. The most common response was a deep sens…

01:45:43  |   Fri 29 Mar 2024
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern unders…

01:45:52  |   Fri 22 Mar 2024
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353

Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353

In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unne…

01:57:11  |   Fri 15 Mar 2024
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies a…

01:47:13  |   Thu 07 Mar 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Security Weekly Productions. This content is not affiliated with or endorsed by eachpod.com.