Enterprise Security Weekly (Video)
As we wrap up the year, we have an honest discussion about how important security really is to the business. We discuss some of Katie's predictions for AppSec in 2025, as well as "what sucks" in security! Show Notes:
info_outline D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388Enterprise Security Weekly (Video)
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND with Peter in this episode, along with some of the new tools they've built to go along with this milestone. To use MITRE's own words to describe the gap this project fills: "it is necessary that practitioners know not only what threats a capability claims to address, but specifically how those threats are addressed from an engineering perspective, and under what circumstances the solution would work" Segment Resources: Show Notes:
info_outline AWS does IR, credit card canarytokens, shared responsibility, phishing tests do harm - ESW #387Enterprise Security Weekly (Video)
This week, in the enterprise security news, NOTE: We didn't get to 2, 3, 5, or 7 due to some technical difficulties and time constraints, but we'll hit them next week! The show notes have been updated to reflect what we actually discussed this week: Snowflake takes security more seriously Microsoft takes security more seriously US Government takes telecom security more seriously Cleo Capital takes security more seriously EU’s DORA takes effect soon Is phishing and security awareness training worthless? CISOs need financial literacy Supply chain firewall is basic but useful All that and...
info_outline Pondering Portable Passwordless Passkeys in 2025 - Rew Islam - ESW #387Enterprise Security Weekly (Video)
In this segment, we discuss two new FIDO Alliance standards focused on credential portability. Specifically, if passwordless is going to catch on, we need to minimize friction and maximize usability. In practice, this means that passkeys must be portable! Rew Islam of Dashlane joins us to discuss the new standards and how they'll help us enter a new age of secure authentication, both for consumers and the enterprise. Segment Resources: Show Notes:
info_outline The 2024 Cybersecurity Market Review - Mike Privette - ESW #387Enterprise Security Weekly (Video)
For our second year now, Mike Privette, from Return on Security and the Security, Funded newsletter joins us to discuss the year's highlights and what's to come in the next 12 months. In some ways, it has been a return to form for funding, though some casualties of a tough market likely had to seek acquisition when they might have otherwise raised another round and stayed independent a while longer. We'll cover some stats, talk 2025 IPO market, and discuss the likelihood of (already) being in another bubble, particularly with regards to the already saturated AI security market. It won't be all...
info_outline Cybersecurity from Santa, office surveillance, Apple work/life balance issues, & more - ESW #386Enterprise Security Weekly (Video)
This week, in the enterprise security news, Funding and acquisition news slows down as we get into the “I’m more focused on holiday shopping season” North Pole Security picked an appropriate time to raise some seed funding Breaking news, it’s still super easy to exfiltrate data The Nearest Neighbor Attack Agentic Security is the next buzzword you’re going to be tired of soon Frustrations with separating work from personal in the Apple device ecosystem We check in on the AI SOC and see how it’s going Office surveillance technology gives us the creeps All that and more, on this...
info_outline Stopping 0day Exploits Doesn't Require AI or Superhuman Speed - Rob Allen - ESW #386Enterprise Security Weekly (Video)
When focused on cybersecurity through a vulnerability management lens, it's tempting to see the problem as a race between exploit development and patching speed. This is a false narrative, however. While there are hundreds of thousands of vulnerabilities, each requiring unique exploits, the number of post-exploit actions is finite. Small, even. Although Log4j was seemingly ubiquitous and easy to exploit, we discovered the Log4Shell attack wasn't particularly useful when organizations had strong outbound filters in place. Today, we'll discuss an often overlooked advantage defenders have:...
info_outline Tackling Barriers on the Road To Cyber Resilience - Theresa Lanowitz - ESW #386Enterprise Security Weekly (Video)
In this final installment of a trio of discussions with Theresa Lanowitz about Cyber Resilience, we put it all together and attempt to figure out what the road to cyber resilience looks like, and what barriers security leaders will have to tackle along the way. We'll discuss: How to identify these barriers to cyber resilience Be secure by design Align cybersecurity investments with the business Also, be sure to check out the first two installments of this series! Episode 380: Episode 383: This segment is sponsored by LevelBlue. Visit to learn more about them! Show Notes:
info_outline 2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW VaultEnterprise Security Weekly (Video)
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on December 22, 2023. We're excited to give an end-of-year readout on the performance of the cybersecurity industry with Mike Privette, founder of Return on Security and author of the weekly Security, Funded newsletter. This year, this podcast has leaned heavily on the Security, Funded newsletter to prep for our news segment, as it provides a great summary of all the funding and M&A events going on each week. In this segment, we look back at 2023, statistics for the...
info_outline AI messes with scammers, autonomous endpoint security, malware targets Excel - ESW #385Enterprise Security Weekly (Video)
In the enterprise security news, Bitsight, Snyk, and Silverfort announce acquisitions Tanium announces an “autonomous” endpoint security offering We find out how much a smartphone costs when it is manufactured in the US CISA’s leadership announces resignations Ransomware is going after old versions of Excel Should vendors be doing more about alert fatigue? The latest cybersecurity reports Using AI to mess with scammers All that and more, on this episode of Enterprise Security Weekly. Show Notes:
info_outlineFinally, in the enterprise security news,
- HUMAN, Relyance AI, and watchTowr raise funding this week
- Alternative paths to becoming a CISO
- Vendor booths don’t have to suck (for vendors or conference attendees!)
- Budget planning guidance for 2025
- CISOs might not be that great at predicting their own future needs
- Use this one easy trick to bypass EDR!
- Analyzing the latest breaches and malware
- You probably shouldn’t buy a Fisker Ocean, no matter how cheap they get
All that and more, on this episode of Enterprise Security Weekly.
Show Notes: https://securityweekly.com/esw-380