Logo
    Search

    Enterprise Security Weekly (Video)

    If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler has spent many years as a marketing executive for security vendors. Katie has also recently moved to a vendor marketing role. Sean is founder and CTO at Trimarc Security, a professional services company which focuses on improving enterprise security. Together they provide valuable resources for protecting the enterprise and following the market each week!
    enSecurity Weekly Productions932 Episodes

    Episodes (932)

    Early stage startup M&A on fire, funding healthy, and attackers are like lawyers? - ESW #352

    Early stage startup M&A on fire, funding healthy, and attackers are like lawyers? - ESW #352

    In the enterprise security news,

    1. Axonius raises $200M and is doing $100M ARR!
    2. Claroty raises $100M and is doing $100M ARR!
    3. Crowdstrike picks up DSPM with Flow Security
    4. CyCode picks up Bearer
    5. Are attackers like lawyers?
    6. How a bank failed (with no help from a cyber attack)
    7. the FTC cracks down on customer data collection
    8. Apple’s car sadly won’t be a thing any time soon
    9. or maybe ever.

    All that and more, on this episode of Enterprise Security Weekly.

    Show Notes: https://securityweekly.com/esw-352

    What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

    What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

    Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks?

    Wait for the annual pen test? Probably not a good idea.

    In this segment, we'll talk with Michael Mumcuoglu about how MITRE's ATT&CK framework can help defenders better prepare for inevitable attack TTPs they'll have knocking on their doors.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-352

    Funding goes quiet while M&A makes some noise! - ESW #351

    Funding goes quiet while M&A makes some noise! - ESW #351

    In this week's news segment, we discuss the lack of funding announcements, and the potential effect RSA could have on the timing of all sorts of press releases. We also discuss 1Password's potential future with its sizable customer base and the $620M it raised a few years back.

    Some other topics we discuss:

    • NIST CSF 2.0
    • insider threats
    • Ivanti Pulse Secure's appliance software found to be running positively ancient software (11 year old Linux distro, 5-20+ year old libraries & components)
    • Nevada AG trying to get messaging decrypted for children, to "protect them"
    • Kelly Shortridge's response to CISA's secure development RFI
    • OpenAI's new GenAI video product, Sora and the potential impact it could have on cybersecurity
    • Instacart spews out crappy AI recipes and photos

    Show Notes: https://securityweekly.com/esw-351

    Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351

    Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351

    Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture!

    You can find the report Pascal mentions here, on Radware's website: https://www.radware.com/threat-analysis-report/

    Show Notes: https://securityweekly.com/esw-351

    Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault

    Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault

    Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021.

    Chris will discuss the relevance of intelligence and threat hunting today and how they work together. He will also talk about his EASY framework for creating impactful intelligence and its relation to hunting!

    Show Notes: https://securityweekly.com/vault-esw-8

    Pretending to be Batman, self-destructing USB drives, and controlling your dreams - ESW #350

    Pretending to be Batman, self-destructing USB drives, and controlling your dreams - ESW #350

    This is almost a special episode on crazy new products. For the first half of the show, we discuss startup funding, market forces, acquisitions - stuff we usually discuss.

    Then we get into all the crazy new AI and non-AI products being announced and coming out. Have some disposable cash to pre-order crazy gadgets? This is the episode for you!

    Show Notes: https://securityweekly.com/esw-350

    Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350

    Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350

    In this segment, featuring guest Amer Deeba, we'll explore how the SEC's new breach reporting rules will affect companies. We've got a ton of questions: What behavior has to change? What additional preparation needs to take place? How does this rule affect data security? How does it affect crisis communications?

    And most importantly, when is an incident "material"?

    Show Notes: https://securityweekly.com/esw-350

    Fake IDs threaten ID verification services, PANW hits $100B valuation, and other news - ESW #349

    Fake IDs threaten ID verification services, PANW hits $100B valuation, and other news - ESW #349

    This week, we discussed how a quick (minutes) and cheap ($15 a pop) fake ID service creates VERY convincing IDs that are possibly good enough to fool ID verification services, HR, and a load of other scenarios where it's common to share images of an ID. Kudos to 404Media's work there.

    In the security market, we discuss who might be the first cybersecurity unicorn to go public in 2024, Oasis Security and Tenchi's funding rounds, Protect AI's acquisition of Laiyer AI and their FOSS project, LLM Guard. We discussed the seemingly inevitable M&A activity as unfunded security startups NEED to find a sale. Ross Haleliuk had an interesting LinkedIn post that goes deeper on this topic. Finally, we discussed Tyler's observation that Palo Alto Networks did the seemingly impossible - increased their valuation from $19B to over $100B in 5 years, despite having to weather a pandemic and market downturn along the way! Ryan pointed out that PANW joined the S&P 500 somewhere along the way - a watershed moment for them.

    We discussed Bluesky and how it's likely too little too late when it comes to building back the community we lost when much of the InfoSec community left Twitter.

    We also discussed a cybersecurity training scammer, Daniel Miessler's new Fabric tool, AnyDesk getting hacked, The Real Shim Shady vuln, new (voluntary) cybersecurity goals for healthcare, and the lack of toothbrush-enabled DDoS attacks!

    Full show notes here: https://www.scmagazine.com/podcast-episode/3061-enterprise-security-weekly-349

    Show Notes: https://securityweekly.com/esw-349

    Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349

    Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349

    Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the traffic was unencrypted, and up to 80% of encrypted network traffic has some defeatable flaw in its encryption

    No longer can enterprises take their cryptography for granted, rarely evaluated or checked.

    Knowing when, where and what type of cryptography is used throughout the enterprise and by which applications is critical to your overall security policy, zero-trust approach, and risk management strategy. After all, zero-trust is meaningless if your cryptography isn't working.

    Segment Resources: https://www.businesswire.com/news/home/20231030166159/en/Proprietary-Research-from-Quantum-Xchange-Shows-the-Dreadful-State-of-Enterprise-Cryptography

    https://www.forbes.com/sites/forbestechcouncil/people/vincentberk/?sh=3d88055852c1

    This segment is sponsored by Quantum Xchange. Visit https://securityweekly.com/quantumxchange to learn more about them!

    Show Notes: https://securityweekly.com/esw-349

    The Internet of Shit, AI Funding, Market Struggles, The Cyber Why, and when to Quit - ESW #348

    The Internet of Shit, AI Funding, Market Struggles, The Cyber Why, and when to Quit - ESW #348

    In this week's Enterprise Security News, Adrian, Tyler, and Katie discuss: 1. Tons of funding! 2. A notable acquisition! 3. The line is blurring between services and product firms 4. Apparently IronNet isn’t dead? 5. The toxicity of Hero culture in tech 6. Knowing when to quit 7. AI-powered fraud is hitting close to home 8. Quantum snake oil is getting worse 9. Prompt injection 10. Are you being hacked by your washing machine?

    All that and more, on this episode of Enterprise Security Weekly.

    Show Notes: https://securityweekly.com/esw-348

    The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348

    The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348

    We've seen general users targeted with phishing, financial employees targeted for BEC scams, and engineers targeted for access to infrastructure. The truly scary attacks, however, are the indirect ones that are automated. The threats that come in via software updates, or trusted connections with third parties.

    The software supply chain is both absolutely essential, and fragile. A single developer pulling a tiny library out of NPM can cause chaos. A popular open source project changing hands could instantly give access to millions of systems. Every day, a new app store or component repository pops up and becomes critical to maintaining infrastructure.

    In this interview, we'll chat with Pete Morgan about how these risks can be managed and mitigated.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-348

    Secret Double Octopus, Furbies, and Too Much Data! - ESW #347

    Secret Double Octopus, Furbies, and Too Much Data! - ESW #347

    Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I’m making none of this up). Rumors about Zscaler’s next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies.

    Chrome gets AI features, security teams have TOO much data, and a new threat intel database from Wiz. Is bootstrapping a cybersecurity startup a realistic option? Finally, remember Furbies? NSA’s furby docs just dropped, and they are HILARIOUS. Thanks to Jason Koebler from 404Media for that.

    Show Notes: https://securityweekly.com/esw-347

    2024: The Year Cross-Platform Endpoint Management Finally Gets Good? - Zach Wasserman - ESW #347

    2024: The Year Cross-Platform Endpoint Management Finally Gets Good? - Zach Wasserman - ESW #347

    We interview the co-founder and CTO of Fleet to understand why good, cross platform MDM/EMM has been such a challenge for so many years. Want good Windows device management? You're probably going to compromise on MacOS management. Ditto for Windows if you prioritize your Macs. Want good Linux device management? It doesn't exist.

    Hopefully, Fleet can change all that in 2024, as they aim to complete their support for all major platforms, using the open source OSQuery project as their base.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-347

    Creating Trust in Biometric Authentication for Identity Verification - Sabrina Gross - ESW #346

    Creating Trust in Biometric Authentication for Identity Verification - Sabrina Gross - ESW #346

    The general public has varied opinions of biometric authentication, and an increasingly reluctant relationship with it, as more and more facial recognition is forced upon us (especially those of us that travel frequently). Facial recognition doesn't work for everyone, so what other options do we have?

    In this interview, we'll explore accessibility in identity verification and the viability of voice-based authentication. How big an issue are AI-powered voice imposters? How will companies like Veridas combat these threats? We'll ask all these questions and more in this ESW interview.

    Show Notes: https://securityweekly.com/esw-346

    Funding, acquisitions, AI, CES, and dumpster fires kick off security for 2024! - ESW #345

    Funding, acquisitions, AI, CES, and dumpster fires kick off security for 2024! - ESW #345

    The year kicks off with TWELVE funding announcements and NINE acquisitions! Several new companies have merged, we already have a few dumpster fires burning and there is plenty of AI news to kick off the year.

    The annual Consumer Electronics Show gives us previews of the invasive and insecure horrors that will be unleashed upon us this year, New Yorkers get right to repair, and Polish trains don’t. (see the show notes for more)

    Finally, we talk Apple Vision Pro, Tetris, and skydiving iPhones.

    Show Notes: https://securityweekly.com/esw-345

    The Pros and Cons of Building a Security Business Around Open Source - Ev Kontsevoy - ESW #345

    The Pros and Cons of Building a Security Business Around Open Source - Ev Kontsevoy - ESW #345

    Many founders and early stage startups closely guard product details and information about their roadmap and go-to-market plan. Is it a bad idea then to build a company based around an open source project? Not at all, according to Ev Kontsevoy, whose company Teleport has done just that. Building a security vendor around open source isn't a magic formula for success, however, so we'll discuss the pros and cons of this approach.

    We'll also discuss best practices for securing infrastructure at scale and Teleport's journey in enabling a different and more secure approach to managing remote infrastructure.

    Show Notes: https://securityweekly.com/esw-345

    2023 End-of-Year Wrapup - ESW Vault

    2023 End-of-Year Wrapup - ESW Vault

    This is a special episode of ESW: our year-end wrapup for 2023. Want to make sure you didn't miss any big stories in 2023? This is the episode to check out! In under an hour, we'll summarize 2023, covering things like:

    1. our mindset coming into 2023 from 2022
    2. how 2023 kicked off
    3. some special themed episodes we recorded in 2023
    4. the state of the fragile and recovering startup market
    5. key acquisitions in 2023 and some acquisition rumors that never led to anything
    6. breach post-mortems and special lessons learned episodes we did in 2023
    7. some notable drama and dumpster fires
    8. 2023 themes and trends
    9. and some of our favorite newsletters, books, and tools from 2023

    Enjoy!

    Show Notes: https://securityweekly.com/vault-esw-7

    MegatronAL on Kicking in the Door to Cybersecurity - Angela Marafino - ESW Vault

    MegatronAL on Kicking in the Door to Cybersecurity - Angela Marafino - ESW Vault

    I once told my college advisor that I wanted to double major in computer science and jazz performance. She laughed at me. Instead, I jumped into a career in IT and played jazz - without a degree in either. Turns out, that was fine - the industry valued experience and results over academic achievement. Today's guest has two degrees, one in fine arts, one in pre-law, and that's also fine. If there's anything I've learned in InfoSec, it's the mind that matters most, less so the degrees or certs on your wall. Angela Marafino gets cybersecurity and understands what makes it tick. Using this knowledge, she has built a personal brand, network, and career in an impressively short time. She is simultaneously mentor and mentee. Today, we'll explore Angela's path into the industry as well as some of her views on challenges, like imposter syndrome.

    https://hbr.org/2021/02/stop-telling-women-they-have-imposter-syndrome

    https://www.itspmagazine.com/focal-point-podcast

    https://twitter.com/hackerbookclub1

    Show Notes: https://securityweekly.com/vault-esw-6