Enterprise Security Weekly (Video)

Enterprise Security Weekly (Video)

News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.

Episodes

June 30, 2025 112 mins

Interview with Dave Lewis

Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organizations expect. Talk about the critical weaknesses in traditional SSO imple...

Mark as Played

In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine compliance. We’ll discuss what a modern, strategic access management approach looks like ...

Mark as Played

Segment 1 - Interview with Rob Allen from ThreatLocker

This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!

Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud

Segment 3 - Interviews from RSAC 2025

Cyera

Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their d...

Mark as Played

Segment 1 - Enterprise Security News, Live at IDV

This week, in the enterprise security news,

  1. Acquisitions
  2. potential IPOs
  3. Terminator Salvation in real life
  4. First $1B one-employee business?
  5. Mikko puts in his notice
  6. Pitch Black in real life, and more!

Segment 2 - Interview with Dr. Tina Srivastava

The #1 cause of data breaches is stolen credentials. What if we didn’t store credentials anymore? We explore ...

Mark as Played

Segment 1

CTG Interview

Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure.

Cyber Resilience in Action: A Guide for Mid...

Mark as Played

Segment 1: Erik Bloch Interview

The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us!

Segment 2: Enterprise Weekly News

In this week's enterprise security news, ...

Mark as Played

Segment 1: Fastly Interview

In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO.

We will discuss where Marshall feels li...

Mark as Played

Segment 1 - Secrets and their role in infrastructure security

From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design.

T...

  • Mark as Played

    Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among ma...

    Mark as Played

    In this week's enterprise security news,

    1. Lots of funding announcements as we approach RSA
    2. New products
    3. The M-Trends also rudely dropped their report the same day as Verizon
    4. Supply chain threats
    5. Windows Recall is making another attempt
    6. MCP server challenges
    7. Non-human identities
    8. A startup post mortem
    9. Remember that Zoom outage a week or two ago? The cause is VERY interesting

    All that and more, on this episode of Enterprise ...

    Mark as Played

    As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data.

    In this episode of Security Weekly, Jeff Shiner,...

    Mark as Played

    In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.

    You can grab your own copy of the report at https://verizon.com/dbir

    Show Notes: https://securityweekly.com/esw-404

    Mark as Played

    In the enterprise security news,

    1. lots of funding, but no acquisitions?
    2. New companies
    3. new tools
    4. including a SecOps chrome plugin
    5. and a chrome plugin that tells you the price of enterprise software
    6. prompt engineering tips from google
    7. being an Innovation Sandbox finalist will cost you
    8. Security brutalism
    9. CVE dumpster fires
    10. and a heartwarming story about a dog, because we need to end on something happy!

    All that and more, on ...

    Mark as Played

    In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterprise.

    Then, we move on to the topic of AI safety and whether that should be the CISO'...

    Mark as Played

    What a time to have this conversation! Mere days from the certain destruction of CVE, averted only in the 11th hour, we have a chat about vulnerability management lifecycles. CVEs are definitely part of them.

    Vulnerability management is very much a hot mess at the moment for many reasons. Even with perfectly stable support from the institutions that catalog and label vulnerabilities from vendors, we'd still have some serious issues...

    Mark as Played

    In the enterprise security news,

    1. new startup funding
    2. what happened to the cybersecurity skills shortage?
    3. tools for playing with local GenAI models
    4. CVE assignment drama
    5. a SIEM-agnostic approach to detection engineering
    6. pitch for charity
    7. a lost dog that doesn’t want to be found

    All that and more, on this episode of Enterprise Security Weekly.

    Show Notes: https://securityweekly.com/esw-402

    Mark as Played

    Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most.

    The idea of implementing default deny principles elsewhere were ...

    Mark as Played

    We wanted security data? We got it! Now, what the heck do we DO with all of it?

    The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we’re seeing companies like Abstract Security pop up to address some of these challenges.

    Abstract just released a comprehensive eBook on security data strategy, linked below, and you don’t even need to give up ...

    Mark as Played

    This week, in the enterprise security news,

    1. we check the vibes
    2. we check the funding
    3. we check runZero’s latest release notes
    4. tons of free tools!
    5. the latest TTPs
    6. supply chain threats
    7. certs won’t save you
    8. GRC needs disruption
    9. the latest Rippling/Deel drama

    All that and more, on this episode of Enterprise Security Weekly.

    Show Notes: https://securityweekly.com/esw-401

    Mark as Played

    You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and no...

    Mark as Played

    Popular Podcasts

      United States of Kennedy is a podcast about our cultural fascination with the Kennedy dynasty. Every week, hosts Lyra Smith and George Civeris go into one aspect of the Kennedy story.

      Stuff You Should Know

      If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

      Dateline NBC

      Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

      The Clay Travis and Buck Sexton Show

      The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

      Crime Junkie

      Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

    Advertise With Us
    Music, radio and podcasts, all free. Listen online or download the iHeart App.

    Connect

    © 2025 iHeartMedia, Inc.