Logo
    Search

    Enterprise Security Weekly (Video)

    If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler has spent many years as a marketing executive for security vendors. Katie has also recently moved to a vendor marketing role. Sean is founder and CTO at Trimarc Security, a professional services company which focuses on improving enterprise security. Together they provide valuable resources for protecting the enterprise and following the market each week!
    enSecurity Weekly Productions932 Episodes

    Episodes (932)

    Ransomware prevention, ransomware stats, SSH vulns, and $1 Chevy Tahoes! - ESW #344

    Ransomware prevention, ransomware stats, SSH vulns, and $1 Chevy Tahoes! - ESW #344

    This week, in the security market, we talk about next NEXT gen anti-virus, how Okta can (apparently) do no wrong, and a VC firm imploding.

    Then we discuss how smartphones and speakers are allegedly being used to spy on us, and the future of privacy and consumer tech products.

    The latest SSH vuln is much less concerning than media outlets and academic researchers would have you believe. The Citrixbleed vuln, however is about as bad as vulns can get, and has led to one of the biggest US consumer breaches in a while, with Comcast/XFinity losing all customer records.

    The SEC backpedals (again!) on requiring breached companies to provide details about how they got breached.

    And finally, we have some fun with some squirrel stories that you should absolutely check out by going to our show notes, here: https://securityweekly.com/esw344

    Show Notes: https://securityweekly.com/esw-344

    Creating a certification path for SASE products and services - Pascal Menezes - ESW #344

    Creating a certification path for SASE products and services - Pascal Menezes - ESW #344

    Understanding how CyberRatings, NaaS, and SASE combine to make network security easier to buy and deploy. MEF is an industry association, providing standards, certifications, and facilitating community discussions. MEF has teamed up with CyberRatings.org to establish a certification program for SASE services, making it easier for buyers to understand what's included in SASE-related products and services.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-344

    2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW #344

    2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW #344

    We're excited to give an end-of-year readout on the performance of the cybersecurity industry with Mike Privette, founder of Return on Security and author of the weekly Security, Funded newsletter. This year, this podcast has leaned heavily on the Security, Funded newsletter to prep for our news segment, as it provides a great summary of all the funding and M&A events going on each week.

    In this segment, we look back at 2023, statistics for the year, comparisons to 2022, interesting insights, predictions, and more!

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-344

    Funding continues for early startups, cybersecurity isn't special, but pickleball is - ESW #343

    Funding continues for early startups, cybersecurity isn't special, but pickleball is - ESW #343

    On this week's news segment, we pick up where we left off with Doug running the show last week. We discuss current early stage categories, AD canarytokens, and low hanging vulns. We talk about why cybersecurity is important, but not nearly as unique or special as some might have you think. The goal of patching faster than exploits can be used - is it a fool's errand?

    Also, pickleball - the country's fastest growing sport, is causing chaos across the nation.

    Show Notes: https://securityweekly.com/esw-343

    Telemetry Data's Role in Cybersecurity - Tucker Callaway - ESW #343

    Telemetry Data's Role in Cybersecurity - Tucker Callaway - ESW #343

    What is telemetry data and why is it important to cybersecurity? Why is it such a pain to collect, store and use? How do we improve our ability to gather and benefit from this data? Today, Tucker Callaway, the CEO of Mezmo joins us to answer all these questions and help us understand the future of the SIEM and other cybersecurity data tools.

    Show Notes: https://securityweekly.com/esw-343

    The Pillars of Trust in Identity Verification - Rob O'Farrell - ESW #343

    The Pillars of Trust in Identity Verification - Rob O'Farrell - ESW #343

    On this podcast, we've often struggled with whether or not to include stories and discussion on identity verification. Is identity verification cybersecurity proper, or cybersecurity adjacent as part of fraud prevention? As always, when we're unsure, we find folks to talk to and learn more.

    Today, we'll be learning about weak points in the identity verification chain from Rob O'Farrell. He'll also be helping us to understand what identity verification is, and why it's important to cybersecurity overall. As more and more of the world is digitized (especially the lagging healthcare industry in the US), reliable identity verification seems more important every day.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-343

    Carbon Black's Solo Venture, Cybersecurity in Space, Rethinking Human Error, & More! - ESW #342

    Carbon Black's Solo Venture, Cybersecurity in Space, Rethinking Human Error, & More! - ESW #342

    This week in the enterprise news, we explore the harsh realities of the startup world with a look at recent failures and shutdowns, investigating the factors leading to these setbacks. Meanwhile, Carbon Black makes headlines by breaking away from VMware in what seems like a divestiture within an acquisition, raising questions about the future of the company. We'll also discuss the European Space Agency's venture into cybersecurity for the space industry, revealing that even the vastness of outer space isn't immune to digital threats. Tune in for all this and more!

    Show Notes: https://securityweekly.com/esw-342

    Lessons from 10 years running the first cyber-exclusive investment firm - Bob Ackerman - ESW #342

    Lessons from 10 years running the first cyber-exclusive investment firm - Bob Ackerman - ESW #342

    Bob Ackerman argues that, from an investment perspective, cybersecurity is like life sciences - a complex, nuanced field that is difficult field to invest in part-time. So his firm, Allegis Cyber, became one of the first to focus exclusively on investing in cyber startups. In this segment, we'll discuss one of Allegis's recent investments, SixMap, and Bob's other investment/accelerator vehicle, Data Tribe. Data Tribe sources investments from national intelligence, with examples like Dragos that came through this program.

    Show Notes: https://securityweekly.com/esw-342

    AI and Ransomware dominate the news cycles - ESW #341

    AI and Ransomware dominate the news cycles - ESW #341

    Nine out of the ten funding articles mention AI - they're either using it in their products, or protecting AI use cases (particularly GenAI and LLM use).

    We discuss Broadcom's closing of the VMware acquisition, how they operate similarly to private equity firms, and how it's mostly bad news for VMware employees and customers.

    Some weird legal cases this week: Binance's founder and CEO pleads guilty to money laundering charges, a cybersecurity company's COO pleads guilty to attacking hospitals to generate sales leads, and Hacking Team's founder is arrested for attempted murder!

    We devote a chunk of time to discussing the huge rise in ransomware activity, and close out the show with a squirrel story on the tiny Pacific island nation of Tokelau, and how the .tk domain has destroyed its reputation, and nearly the nation itself.

    Show Notes: https://securityweekly.com/esw-341

    Cybercrime is booming: understanding why and what we can do about it - Keith Jarvis - ESW #341

    Cybercrime is booming: understanding why and what we can do about it - Keith Jarvis - ESW #341

    As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while.

    Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor.

    Segment Resources:

    Show Notes: https://securityweekly.com/esw-341

    Non-profits need security too - Kelley Misata - ESW #341

    Non-profits need security too - Kelley Misata - ESW #341

    While non-profit doesn't mean "no budget" when it comes to cybersecurity, a lot of smaller to mid-sized non-profits operate on a shoestring, with little to no money for cybersecurity talent or spending. This is where Sightline Security steps in. Sightline's founder and CEO, Kelley Misata joins us today to explain how her own non-profit helps other non-profits improve their cybersecurity posture.

    Show Notes: https://securityweekly.com/esw-341

    New security startups, Stamos and Krebs go to SentinelOne, NY takes cyber seriously - ESW #340

    New security startups, Stamos and Krebs go to SentinelOne, NY takes cyber seriously - ESW #340

    Finally, in the enterprise security news,

    1. Lots of new security startups with early stage funding
    2. SentinelOne picks up Chris Krebs and Alex Stamos’s consulting firm
    3. PE firm picks up ActiveState - a company I haven’t thought about since I last downloaded ActiveState Perl 1000 years ago
    4. Microsoft announces the limited release of Security Copilot
    5. Semgrep releases a secrets scanner
    6. AGI predicted to come much sooner than you might expect
    7. NY State doubles down on cybersecurity regulations to protect its hospitals
    8. the young hackers behind Mirai, one of the biggest botnets ever
    9. Ransomware groups snitch on businesses to the SEC

    Show Notes: https://securityweekly.com/esw-340

    Five Lessons Learned From Okta’s Customer Support System Breach - ESW #340

    Five Lessons Learned From Okta’s Customer Support System Breach - ESW #340

    We regularly cover significant breaches on this podcast, but it is rare that we have enough information about a major breach to cover in enough detail to devote an entire segment to. Today, we dive into lessons learned from the breach of Okta's customer support system that targeted some other major security vendors.

    This is part of a troubling trend, where the target of an attack only serves as a jumping off point to other organizations. China's 2023 attack of Microsoft is an example of this. It was easier to attack Microsoft 365, one of the world's largest business SaaS platforms, than to go after each of the 25 individual targets these Chinese actors needed access to.

    Traditionally, we've thought of lateral movement as something that happens within a network segment, or even within a single organization. Now, we're seeing lateral movement between SaaS platforms, between clouds, from third party vendors to customer, and even from open source project to open source adopters.

    In this segment, we'll cover five key lessons learned from Okta's breach, from information shared by Okta and three of its customers: 1Password, Cloudflare, and BeyondTrust.

    1. Protect Your Session Tokens
    2. Monitor for Unusual Behavior
    3. SaaS Vendors Are Common Targets
    4. Zero Trust Principles Work
    5. MFA Isn't a Binary (on or off) Control

    Segment Resources

    Show Notes: https://securityweekly.com/esw-340

    Exploring the Intersection of Security for Edge Computing and Endpoint - Theresa Lanowitz, Mani Keerthi Nagothu - ESW #340

    Exploring the Intersection of Security for Edge Computing and Endpoint - Theresa Lanowitz, Mani Keerthi Nagothu - ESW #340

    Once again, Theresa Lanowitz joins us to discuss Edge Computing, but with a twist this time, as Mani Keerthi Nagotu from SentinelOne joins us as well! As a field CISO, Mani knows all too well the struggles security leaders are going through, given the current market and threat landscape:

    • Maybe not less budget, but more pressure to produce results and justify spending
    • Security leaders being held personally accountable for performance
    • Potential layoffs, and the need to achieve the same goals with less labor and tool overhead

    Segment Resources

    This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attcybersecurity to learn more about them!

    Show Notes: https://securityweekly.com/esw-340

    Palo Alto buys Talon, the changing world of security exits, 6 Qs to ask your CISO - ESW #339

    Palo Alto buys Talon, the changing world of security exits, 6 Qs to ask your CISO - ESW #339

    During the news today, we went deep down the rabbithole of discussing security product efficacy. Adrian still doesn't believe in enterprise browsers beyond Google Chrome, but can't deny that Talon got a pretty favorable exit considering the state of the market. We see the first major exit for cybersecurity insuretechs, and discuss a few notable funding rounds.

    We discuss Kelly Shortridge's essay on the origins and nature of the term "security" and what it means. Stephen Schmidt suggests 6 questions every board should ask their CISO, we explore Cyentia Labs' meta analysis of MITRE ATT&CK techniques, and Phil Venables shares some hilarious takes on infosec stereotypes.

    Show Notes: https://securityweekly.com/esw-339

    Security Chaos Engineering: Realigning the Security Industry - Kelly Shortridge - ESW #339

    Security Chaos Engineering: Realigning the Security Industry - Kelly Shortridge - ESW #339

    We've reached an inflection point in security. There are a handful of organizations regularly and successfully stopping cyber attacks. Most companies haven't gotten there, however. What separates these two groups? Why does it seem like we're still failing as an industry, despite seeming to collectively have all the tools, intel, and budget we've asked for?

    Kelly Shortridge has studied this problem in depth. She has created tools (https://www.deciduous.app/), and written books (https://www.securitychaoseng.com/) to help the community approach security challenges in a more logical and structured way. We'll discuss what hasn't worked for infosec in the past, and what Kelly thinks might work as we go into the future.

    Show Notes: https://securityweekly.com/esw-339

    HAR files, Okta breach, EO on AI, Ransomware, Solarwinds CISO charged, and Bagels! - ESW #338

    HAR files, Okta breach, EO on AI, Ransomware, Solarwinds CISO charged, and Bagels! - ESW #338

    Oh, the HARror! Sanitizing HAR files is not as easy as some might lead you to believe. CISA funds Cyber.org for K-12 cyber education and ORNL creates a Center for AI Security Research (CAISER). Cloudflare creates a tool out of spite, and CISA creates a tool you shouldn't use in production? Biden's EO on "Safe, Secure, and Trustworthy AI" and the Top Five Things you need to know about how GenAI is used in Security Tools.

    Five lessons learned form Okta's latest breach, should ransom payments be illegal, and why ransomware victims can't stop paying ransoms. We discuss the impact of the charges made against Solarwinds and its CISO by the SEC, the 2023 ISC2 Cybersecurity Workforce Survey, and Microsoft's latest open letter on security.

    Finally we wrap up discussing a delicious $8M Series A for better bagels!

    Show Notes: https://securityweekly.com/esw-338

    Data Chaos MUST be Curbed, but how? - Jackie McGuire - ESW #338

    Data Chaos MUST be Curbed, but how? - Jackie McGuire - ESW #338

    There is little to no organization of data within companies in 2023. We're all guilty of this at some level. The download folders and desktops on our personal machines are a mess. File servers, and cloud storage services are a mess. In Microsoft's recent data leak, AI researchers even had PC backups stored along side machine learning models for whatever reason.

    Data is hard to classify, organize, and monitor. By designing for convenience, we've created convenience debt that now has to be paid down. In this segment we talk to Jackie McGuire about what needs to happen to accomplish this, at the enterprise level, and at scale.

    Even if we can one day address the challenge of tracking and labeling data, we'll still have the challenge of addressing data integrity and resilience, which we'll also discuss if we have time!

    Segment Resources: https://www.darkreading.com/risk/it-s-time-to-assess-the-potential-dangers-of-an-increasingly-connected-world-

    Show Notes: https://securityweekly.com/esw-338