Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 secu…
Published on 4 months, 2 weeks ago
In this week's enterprise security news,
Lots of funding announcements as we approach RSA New products The M-Trends also rudely dropped their report the same day as Verizon Supply chain threats Wind…Published on 4 months, 3 weeks ago
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applicat…
Published on 4 months, 3 weeks ago
In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.
You can grab your own copy of the report at https://verizon.com/dbir
Show Notes: https://secur…
Published on 4 months, 3 weeks ago
In the enterprise security news,
lots of funding, but no acquisitions? New companies new tools including a SecOps chrome plugin and a chrome plugin that tells you the price of enterprise software pr…Published on 5 months ago
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. Th…
Published on 5 months ago
What a time to have this conversation! Mere days from the certain destruction of CVE, averted only in the 11th hour, we have a chat about vulnerability management lifecycles. CVEs are definitely part…
Published on 5 months ago
Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, po…
Published on 5 months, 1 week ago
In the enterprise security news,
new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to de…Published on 5 months, 1 week ago
We wanted security data? We got it! Now, what the heck do we DO with all of it?
The core challenge of security operations, incident response, and even compliance is still a data management and analys…
Published on 5 months, 1 week ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate