If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
…
continue reading
Hello, I’m Hunt Ethridge. I’m an Award winning Dating & Relationship Expert/TV Personality/Coach/Matchmaker/Writer/Entrepreneur, Husband, Father, Bon Vivant & All - Around Swell Guy! I’ve been in the Love Industry for over 15 years and have been following all the ups and downs of today’s dating dilemmas. I teach my clients that dating is a mix of biology, psychology, sociology, and anthropology. To understand our motivations, the motivations of the person sitting across from you and the moti ...
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
…
continue reading
Headlines and in depth analysis of sports.
…
continue reading
The Wicked Library is a Parsec Award winning show featuring horror fiction stories from upcoming, new, independent and bestselling authors. Our Tales of terror are read by Host / Producer, Daniel Foytik and other popular voice actors and feature custom music to bring the stories to life. Each episode features the work of some of the best voices in independent horror fiction. Authors of all types have contributed stories, like Jessica McHugh, KB Goddard, C. Bryan Brown, Stephanie Wytovich, an ...
…
continue reading
1
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354
49:14
49:14
Play later
Play later
Lists
Like
Liked
49:14
While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myth…
…
continue reading
1
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52
While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myth…
…
continue reading
1
Lots Of Funding News, Airbus Says No, and Cato Networks Going IPO? - ESW #354
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44
In the enterprise security news, Lots of funding news, including: - Nozomi Networks Raises $100 Million to Expand Industrial Cybersecurity Business - BigID Raises $60 Million at $1 Billion Valuation - J.P. Morgan Growth Leads $39 Million Investment in Eye Security - CyberSaint raises $21 million to accelerate market expansion Zscaler Acquires Avalo…
…
continue reading
1
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
1:57:11
1:57:11
Play later
Play later
Lists
Like
Liked
1:57:11
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'…
…
continue reading
1
Will AI allow us to finally scale vuln mgmt and threat detection? - ESW #353
1:08:43
1:08:43
Play later
Play later
Lists
Like
Liked
1:08:43
We don't cover a lot of stories in this week's episode, but we go deep on a few important ones. I'm biased, but I think it's a good one, especially having Darwin's input and encyclopedic knowledge available to us. Also in this week's news: Homomorphic encryption pops up again! Microsoft Security Copilot has a release date! Sudo for Windows Microseg…
…
continue reading
1
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'…
…
continue reading
1
Early stage startup M&A on fire, funding healthy, and attackers are like lawyers? - ESW #352
1:00:14
1:00:14
Play later
Play later
Lists
Like
Liked
1:00:14
In the enterprise security news, Axonius raises $200M and is doing $100M ARR! Claroty raises $100M and is doing $100M ARR! Crowdstrike picks up DSPM with Flow Security CyCode picks up Bearer Are attackers like lawyers? How a bank failed (with no help from a cyber attack) the FTC cracks down on customer data collection Apple’s car sadly won’t be a t…
…
continue reading
1
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07
Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks? Wait for the annual pen test? Probably not a good idea. In this segment, we'll talk with Michael Mumcuoglu about…
…
continue reading
1
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352
1:47:13
1:47:13
Play later
Play later
Lists
Like
Liked
1:47:13
Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks? Wait for the annual pen test? Probably not a good idea. In this segment, we'll talk with Michael Mumcuoglu about…
…
continue reading
1
Funding goes quiet while M&A makes some noise! - ESW #351
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59
In this week's news segment, we discuss the lack of funding announcements, and the potential effect RSA could have on the timing of all sorts of press releases. We also discuss 1Password's potential future with its sizable customer base and the $620M it raised a few years back. Some other topics we discuss: NIST CSF 2.0 insider threats Ivanti Pulse…
…
continue reading
1
Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351
1:59:04
1:59:04
Play later
Play later
Lists
Like
Liked
1:59:04
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions …
…
continue reading
1
Hacktivism Unveiled: Insights into the Footprints of Hacktivists - Pascal Geenens - ESW #351
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15
Pascal Geenens from Radware joins us to discuss the latest research findings relating to hacktivists an other actors using volumetric and other network-based attacks. We'll discuss everything from the current state of DDoS attacks to use in the military and even the impact of cyberattacks on popular culture! You can find the report Pascal mentions …
…
continue reading
1
Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021. Chris will discuss the relevance of intelligence and threat hunting today and how they work together. He will also talk about his EASY framework for creating impactful intelligence and its relation to h…
…
continue reading
1
Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 22, 2021. Chris will discuss the relevance of intelligence and threat hunting today and how they work together. He will also talk about his EASY framework for creating impactful intelligence and its relation to h…
…
continue reading
1
Pretending to be Batman, self-destructing USB drives, and controlling your dreams - ESW #350
1:08:09
1:08:09
Play later
Play later
Lists
Like
Liked
1:08:09
This is almost a special episode on crazy new products. For the first half of the show, we discuss startup funding, market forces, acquisitions - stuff we usually discuss. Then we get into all the crazy new AI and non-AI products being announced and coming out. Have some disposable cash to pre-order crazy gadgets? This is the episode for you! Show …
…
continue reading
1
Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350
1:52:59
1:52:59
Play later
Play later
Lists
Like
Liked
1:52:59
In this segment, featuring guest Amer Deeba, we'll explore how the SEC's new breach reporting rules will affect companies. We've got a ton of questions: What behavior has to change? What additional preparation needs to take place? How does this rule affect data security? How does it affect crisis communications? And most importantly, when is an inc…
…
continue reading
1
Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350
45:32
45:32
Play later
Play later
Lists
Like
Liked
45:32
In this segment, featuring guest Amer Deeba, we'll explore how the SEC's new breach reporting rules will affect companies. We've got a ton of questions: What behavior has to change? What additional preparation needs to take place? How does this rule affect data security? How does it affect crisis communications? And most importantly, when is an inc…
…
continue reading
1
Fake IDs threaten ID verification services, PANW hits $100B valuation, and other news - ESW #349
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38
This week, we discussed how a quick (minutes) and cheap ($15 a pop) fake ID service creates VERY convincing IDs that are possibly good enough to fool ID verification services, HR, and a load of other scenarios where it's common to share images of an ID. Kudos to 404Media's work there. In the security market, we discuss who might be the first cybers…
…
continue reading
1
Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349
1:38:59
1:38:59
Play later
Play later
Lists
Like
Liked
1:38:59
Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the traffic was unencrypted, and up to 80% of encrypted network traffic has some defeatable flaw in its encryption No longer can enterprises take their cryptography for granted, rarely evaluated or checked…
…
continue reading
1
Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17
Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the traffic was unencrypted, and up to 80% of encrypted network traffic has some defeatable flaw in its encryption No longer can enterprises take their cryptography for granted, rarely evaluated or checked…
…
continue reading
1
The Internet of Shit, AI Funding, Market Struggles, The Cyber Why, and when to Quit - ESW #348
59:04
59:04
Play later
Play later
Lists
Like
Liked
59:04
In this week's Enterprise Security News, Adrian, Tyler, and Katie discuss: 1. Tons of funding! 2. A notable acquisition! 3. The line is blurring between services and product firms 4. Apparently IronNet isn’t dead? 5. The toxicity of Hero culture in tech 6. Knowing when to quit 7. AI-powered fraud is hitting close to home 8. Quantum snake oil is get…
…
continue reading
1
The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348
1:45:43
1:45:43
Play later
Play later
Lists
Like
Liked
1:45:43
We've seen general users targeted with phishing, financial employees targeted for BEC scams, and engineers targeted for access to infrastructure. The truly scary attacks, however, are the indirect ones that are automated. The threats that come in via software updates, or trusted connections with third parties. The software supply chain is both abso…
…
continue reading
1
The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50
We've seen general users targeted with phishing, financial employees targeted for BEC scams, and engineers targeted for access to infrastructure. The truly scary attacks, however, are the indirect ones that are automated. The threats that come in via software updates, or trusted connections with third parties. The software supply chain is both abso…
…
continue reading
1
Secret Double Octopus, Furbies, and Too Much Data! - ESW #347
57:57
57:57
Play later
Play later
Lists
Like
Liked
57:57
Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I’m making none of this up). Rumors about Zscaler’s next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies. Chrome gets AI features, security teams have TO…
…
continue reading
1
2024: The Year Cross-Platform Endpoint Management Finally Gets Good? - Zach Wasserman - ESW #347
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01
We interview the co-founder and CTO of Fleet to understand why good, cross platform MDM/EMM has been such a challenge for so many years. Want good Windows device management? You're probably going to compromise on MacOS management. Ditto for Windows if you prioritize your Macs. Want good Linux device management? It doesn't exist. Hopefully, Fleet ca…
…
continue reading