In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative…
Published on 2 months, 1 week ago
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing…
Published on 2 months, 2 weeks ago
Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and e…
Published on 2 months, 3 weeks ago
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and …
Published on 2 months, 4 weeks ago
Segment 1 - Interview with Rob Allen from ThreatLocker
This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!
Segment 2 - Topic: Growin…Published on 3 months ago
Segment 1 - Enterprise Security News, Live at IDV
This week, in the enterprise security news,
Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko put…Published on 3 months, 1 week ago
Segment 1
CTG Interview
Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle ma…
Published on 3 months, 2 weeks ago
Segment 1: Erik Bloch Interview
The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit diff…
Published on 3 months, 3 weeks ago
In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're …
Published on 4 months ago
Segment 1 - Secrets and their role in infrastructure security
From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud…
Published on 4 months, 1 week ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate