POPULARITY
The Monday Microsegment for the week of September 1st. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Fallout continues from the Salesforce-Salesloft supply chain breach.A cyberattack clips the claws of Jaguar Land Rover.Congress races the clock to keep cyber threat intel sharing alive.And Christer Swartz joins us for a "Boos and Bravos" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
The Monday Microsegment for the week of September 1st. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Federal agencies scramble in the wake of major cyber lapses.A new ransomware strain uses AI to write its own attacks in real time.And to keep rivals out, hackers are patching the very security flaws they exploit.And John Kindervag joins us for an "Ask the Expert" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
The Monday Microsegment for the week of August 25th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Android VPNs promised users privacy — and tracked them instead.That urgent call from the boss? It may not be the boss.And Apple zero-day flaw makes a picture worth a thousand lines of malicious code.And Trevor Dearing joins us for a "Myth Buster" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
Recorded live at Black Hat 2025, this episode takes you straight to the frontlines of cybersecurity innovation. Host, Raghu Nandakumara first sits down with Bennett Moe, a cartographer turned N2K CyberWire VP, reveals how mapping skills can turn massive data into actionable cyber insights and why fundamentals still matter in an AI-driven world. Then, Jim Reavis, CEO of the Cloud Security Alliance and ISSA Hall of Famer, shares his urgent warning on cloud risks, the impact of generative AI, and why security leaders must rethink old playbooks.We discussed:How cartography principles help prioritize and visualize cybersecurity data The evolution of AI in security and where it's moving beyond buzzwords Why fundamentals like security hygiene and the right people in the right roles are still critical Systemic risks in cloud environments and why old security playbooks may no longer suffice How security leaders can become their company's most informed voices on AI The importance of actionable insights over overwhelming data for decision-makingThe role of cloud as a foundation for AI innovations like ChatGPT Distinguishing between securing AI and defending against AI-powered attacks How continuous learning, communication, and community collaboration are essential in cybersecurity The CSA's mission and legacy as a navigator for the cybersecurity community Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
The Monday Microsegment for the week of August 18th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Windows admins, start your updates — the latest Patch Tuesday is a doozy.Hackers are packing RomCom exploits into a popular file-archiving app, but no one's laughing.And phishers are turning stolen logins into stock pump-and-dump scams.And Christer Swartz joins us for an "Ask the Expert" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
The Monday Microsegment for the week of August 11th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Federal courts scramble to tighten security after sealed files spill in cyber breach.Less than 24 hours in, ChatGPT-5 is already breaking bad.And federal agencies: today's the deadline to apply a critical Exchange fix.And Christer Swartz joins us for an "Ask the Expert" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
The Monday Microsegment for the week of August 4th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.A cyberattack shuts down the city of St. Paul — and draws in the National Guard.Spiders and dragons and rats — oh my! U.S. authorities issue new cybersecurity warning.And AI-powered bots are making DDoS attacks almost as easy as cheating on your homework.And John Kindervag joins us for a "Kindervag's Compass" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
The Monday Microsegment for the week of July 28th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.More than 400 organizations compromised in a fast-moving SharePoint attack campaign.Researchers are blaming China-based threat groups for the attacksAnd researchers ask: did well-meaning vulnerability disclosures tip them off?And John Kindervag joins us for a "Kindervag's Compass" segment. Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
In this dynamic episode of The Segment, two of cybersecurity's biggest names reunite with host, Raghu Nandakumara, for a no-holds-barred conversation: John Kindervag, the godfather of Zero Trust, and Dr. Chase Cunningham, aka Dr. Zero Trust. What unfolds is a fast-paced, insight-packed dialogue that spans decades of hard-earned wisdom, unexpected humor, and a shared mission to demystify modern cyber defense.John and Chase reflect on the global evolution of Zero Trust—from its scrappy beginnings to its widespread adoption by Fortune 500s, military leaders, and even elder care facilities. They dive into why context-driven maps are now indispensable, how graph-based security is reshaping the cyber terrain, and where AI and automation can give defenders a real edge. Expect candid takes on the limits of SIEMs, the failure of red teaming without strategy, and why defenders need to start thinking like attackers if they want to win.There's personal reflection too—Chase shares why he was reluctant to pick up the Zero Trust torch, and John opens up about the real heart behind the strategy. With wit, war stories, and straight talk, they make a clear case: cybersecurity isn't about perfection—it's about deterrence, resilience, and knowing what truly matters. Topics Covered:The origin and global adoption of Zero Trust Why “good maps” are critical for cyber resilience Real-world applications of AI in cyber defense Why attackers often outmaneuver defenders—and how to change that The psychology of leadership in cybersecurity strategy From Chick-fil-A to Bletchley Park: the unexpected places Zero Trust shows up Chase's take on stock-picking based on breach trends (yes, really) Resources Mentioned:Think Like an Attacker by Dr. Chase Cunningham John Kindervag's Zero Trust 5-Step Model “Zero Trust Terrain & Holding the High Ground” LinkedIn Live Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
The Monday Microsegment for the week of July 21st. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Is Salt Typhoon's nine-month hack of a National Guard network the tip of the iceberg?CISA issues a rare 24-hour deadline to patch CitrixBleed 2 vulnerability.And a zero-day vulnerability in SharePoint is being used to breach dozens of organizations.And John Kindervag joins us for a "Kindervag's Compass" segment. Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
This week, we are joined by Gary Barlet, former Federal CIO and Air Force Cyber Operations Officer and current Public Sector CTO at Illumio, to discuss how this approach to cybersecurity leaves some states much more at risk than others. Ben has the story of a Virginia case relating to reverse key word searches. Dave's got a highly unusual move by the DOJ against Maryland's district courts. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Complete our annual audience survey before August 31. Links to today's stories: EFF Tells Virginia Court That Constitutional Privacy Protections Forbid Cops from Finding out Everyone Who Searched for a Keyword DOJ launches unusual lawsuit against entire federal district court in Maryland Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers BNPL apps and the privacy issues they found associated with them. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Detection at Scale, Jack speaks with Erik Bloch, VP of Security, Illumio, about why most security operations teams aren't ready for AI tools and what fundamental processes must be in place first. Erik challenges the industry's obsession with new technologies, sharing stories from his experience transforming underperforming security teams at major companies like Cisco, Salesforce, and Atlassian. His conversation with Jack explores how to measure what actually matters in security operations, from team capacity utilization to business outcome dispositions, and why proper ticketing systems and actionable metrics are prerequisites for any advanced tooling to be effective. Topics discussed: The importance of establishing fundamental processes like ticketing systems and metrics before implementing AI tools in security operations. How to measure team capacity utilization and resource allocation to identify when security operations teams are operating beyond sustainable levels. Why traditional security metrics like mean time to detect are often vanity metrics that don't provide actionable business intelligence. The critical need for security leaders to communicate in business language with concrete data rather than anecdotal risk assessments. How managed service providers will likely be the first to successfully adopt AI tools due to their standardized processes. The challenge of proving AI tool effectiveness when most organizations lack baseline metrics to measure improvement against established benchmarks. Why security teams gravitate toward building custom tools and how this impacts their approach to adopting commercial AI solutions. The role of MCP in enabling security teams to create their own agents and integrate multiple tools. How AI should focus on eliminating routine tasks like phishing email analysis rather than trying to catch advanced persistent threats. The framework for implementing AI tools by starting with business outcomes, defining metrics, identifying capabilities, and then inserting automation. Listen to more episodes: Apple Spotify YouTube Website
The Monday Microsegment for the week of July 14th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.UK police round up suspects they say are behind a wave of retail hacks.That new car could be systematic. Hydromatic. Ultramatic. And hacked via a Bluetooth flaw.And a new GPU-based attack turns AI models into artificial idiots.And John Kindervag joins us for a "Kindervag's Compass" segment. Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
The Monday Microsegment for the week of July 7th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Another week, another airline hit with a cyberattack.Iranian hackers threaten to leak more emails from Trump allies And a ransomware gang suddenly shuts down… or is it just a rebrand?And John Kindervag joins us for a "Kindervag's Compass" segment. Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
This week, we are joined by Gary Barlet, former Federal CIO and Air Force Cyber Operations Officer and current Public Sector CTO at Illumio, to discuss how this approach to cybersecurity leaves some states much more at risk than others. Ben discusses some major Supreme Court decisions from the just concluded 2025 term. Dave's got the story of a license plate reader company dialing back access after media reports reveal potential oversharing. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Complete our annual audience survey before August 31. Links to today's stories: CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT TRUMP, PRESIDENT OF THE UNITED STATES, ET AL. v. CASA, INC., ET AL. ON APPLICATION FOR PARTIAL STAY Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers two major U.S. Supreme Court rulings that may shape the future of digital policy. The Court upheld both the FCC's authority to fund the Universal Service Fund—preserving billions for internet access in underserved communities—and a Texas law requiring age verification for adult content, sparking renewed debate over online privacy, free speech, and regulatory reach. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
Andrew Rubin raised $40M in 6 months before writing a single line of code—and another $100M before seeing his first dollar of revenue. Today, Illumio is valued at billions and counts Morgan Stanley among its earliest customers. But Andrew's journey wasn't smooth or easy. Listen in to learn how he navigated the fine line between being early and being too early, how he raised venture capital at unprecedented speed, and why he believes an entrepreneur's conviction—backed by customer insights—is the real key to startup survival.Why You Should ListenHow to raise $40M in 6 months with no product or revenueWhy “too early” often means bankrupt—and how to avoid itWhy activity ≠ funding (and what to do instead)The hard truth about selling enterprise earlyWhy market timing matters more than product geniusKeywordsproduct market fit, fundraising, early-stage startups, startup fundraising, venture capital, enterprise sales, market timing, Andrew Rubin, Illumio, cybersecurity00:00:00 Intro00:08:15 Why Being Early Can Bankrupt You00:16:09 Creating a Market That Doesn't Exist00:27:55 Activity Does Not Equal Funding00:38:06 Landing the First Enterprise Customer00:49:57 Surviving Enterprise Sales Cycles00:54:56 Navigating the Emotional Rollercoaster01:00:46 The Truth About Product Market Fit01:01:55 Andrew Rubin's Best Advice for Early FoundersSend me a message to let me know what you think!
The Monday Microsegment for the week of June 30th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.A second airline hit by a cyberattack in as many weeks.Iran's hackers stay quiet — for now — after U.S. and Israeli airstrikes.And the IRS gets a security audit — and it's not good.And Christer Swartz joins us for a "Boos and Bravos" segment. Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
In this powerful and thought-provoking episode, we sit down with three powerhouse women in cybersecurity—Emma, Aparna, and Sumi—who bring distinctly different journeys from pharmacy, law, technical sales, and engineering into one common mission: reshaping the cybersecurity industry from within. Together, they dive deep into what makes cybersecurity exciting, how resilience and authenticity fuel success, and why community—not conformity—is key to lasting impact.With candid conversations about navigating gender bias, building real allyship, and mentoring the next generation of women in tech, this episode pulls back the curtain on what it really takes to thrive in a male-dominated space. From managing cross-functional teams to balancing business needs with technical demands, these leaders share practical advice, hard-won lessons, and a powerful vision for a more inclusive, empowered future in cyber.Other topics we talked about:What drew each guest to cybersecurity from nontraditional backgrounds The role of mentorship and sponsorship in career growth Confronting misconceptions and biases in the workplace Why visibility and feedback are crucial for career advancement Balancing empathy and authority in leadership Retention strategies for women in tech The power of storytelling in inspiring the next generation How to build trust across business and security teams Whether you're deep in the industry or just cyber-curious, you'll leave inspired to challenge the status quo—and uplift others along the way.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
The Monday Microsegment for the week of June 23rd. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.U.S. officials warn of cyber blowback in the wake of airstrikes on Iran.The largest-ever trove of stolen passwords resurfaces online.And if it walks like a duck and quacks like a duck, it might be the latest attack by Scattered Spider.Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
The Monday Microsegment for the week of June 9th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Travelers left flying blind after cyberattack at Canadian airlineExtra! Extra! Hackers target journalists at The Washington PostAnd a fake IT support is tricking Salesforce users into downloading malwareHead to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
The Monday Microsegment for the week of June 9th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.A North Korean ransomware campaign is playing for keeps.A rose by any other name smells as sweet. But would malware by a standardized name be as leet?And is CISA's brain drain a crisis in the making?Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
The Monday Microsegment for the week of June 2nd. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.AI-powered cyberthreats are scaling fastVictoria's Secret remains hush-hush about security issue that triggered a website shutdownAnd U.S. banks are pushing back on breach disclosure rulesHead to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409
In a world where cybercrime is a business and national security secrets are often hidden in plain sight, this episode uncovers the gripping intersection of espionage and cybersecurity. Brian Boetig, a national security and public safety expert with 35 years of experience spanning the FBI, CIA, U.S. diplomacy, law enforcement, and consulting, shares fascinating stories from his career, including an unexpected brush with Russian intelligence, all thanks to a dachshund. In this episode we also discuss:The evolution of spycraft, from traditional field operations to modern cyber warfareHow cybercrime has transformed into a full-fledged business modelInsights into decoding behavioral patterns in cyberattacksThe complexities of cyber insurance and its limitationsHow businesses may be relying on cyber insurance in the wrong waysExamine how leadership engagement in cybersecurity has evolvedHighlight the critical role the C-suite plays in driving security initiativesStay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
The Monday Microsegment for the week of May 26th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.U.S. cyber defense faces budget cuts — just as threats are ramping up.A ransomware attack hamstrings a major healthcare network.And the Justice Department charges dozens in two global malware takedowns.Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
The Monday Microsegment for the week of May 19th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.- Japan's cyber defense is going on the offense- Scattered Spider crawls its way to the U.S. after UK crime spree.- And Spain reconsiders whether cyberattacks caused last month's national blackoutAnd Christer Swartz us for "Boos and Bravos."Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
In this eye-opening episode of The Segment, we welcome Brett Johnson—once known as the "Original Internet Godfather" and a former U.S. Most Wanted cybercriminal. Now a reformed expert, Brett works to help law enforcement and organizations stay ahead of digital threats.Together, we explore the chilling reality of modern cyber threats, deepfake technology, and the manipulation of perception in an increasingly digital world. Brett shares his insights on why “the perception of reality is more important than reality itself,” how AI is fueling new forms of deception, and why personal relationships and trust are more critical than ever in cybersecurity.In this episode we also discuss:Why defenders continue to fall shortThe biggest misconceptions about cybercriminalsWhy billion-dollar security budgets aren't enoughThe role of regulations in shaping cybersecurity cultureWhy most cyberattacks succeed due to simple oversights, not sophisticated tacticsHow organizations can force attackers to adapt by closing common security gapsThe importance of layered security and data-driven threat detection Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
The Monday Microsegment for the week of May 12th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Simple mistakes are leading to serious OT security issuesDid Samsung issue a sour patch for a server vulnerability last year?And malware is masquerading as an AI media toolAnd John Kindervag joins us for "Ask the Expert."Head to The Zero Trust Hub: hub.illumio.comIntroducing Illumio Insights: AI Cloud Detection and Response Webinar: https://lp.illumio.com/Introducing-Illumio-Insights-Webinar.On-Demand
How prepared is your business for a ransomware attack? Not just to prevent it, but to continue operating when it happens. In this episode, I sit down with Trevor Dearing, Director of Critical Infrastructure at Illumio, to discuss the latest findings from their global ransomware report and what they reveal about cyber resilience. Trevor shares insight from a survey of more than 3,000 organisations across multiple sectors. The most concerning figure is that 58 percent of those impacted by ransomware were forced to halt operations. That number has risen sharply from 43 percent just two years ago. Despite this, many businesses in the UK still avoid reporting attacks, often due to fears around reputational damage or potential retaliation. Trevor explains why that reluctance is misguided and how public support, improved infrastructure, and more explicit government guidance could encourage more transparency. We also explore the rise of containment as a more practical and cost-effective approach than prevention alone. Rather than trying to stop every attack at the perimeter, organisations are learning how to isolate and limit damage quickly. Trevor explains how zero trust architecture, microsegmentation, and one-click containment tools are being used to keep systems operational even during an incident. Only 13 percent of organisations believe their cyber resilience exceeds what is required. Trevor helps us understand why this number remains low and where organisations should focus to shift from vulnerability to resilience. From evolving regulations to future applications of AI in security, this conversation covers what leaders need to know if they prepare for the next generation of cyber threats. To access Illumio's full ransomware report, visit illumio.com. Is your cyber resilience strategy built for recovery, or just defense?
The Monday Microsegment for the week of May 5th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.The White House warns China: If you hack us, we may hack back.UK retailers are under siege — and one ransomware gang is taking credit.And stolen passwords are leading to millions of account takeovers.And Gary Barlet joins us for a special segment on live on the RSAC show floor. Head to The Zero Trust Hub: hub.illumio.com
Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 61: Applying Zero Trust to OT systemsPub date: 2025-04-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationZero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, applications, assets, or services into secure zones for targeted Zero Trust implementation.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, applications, assets, or services into secure zones for targeted Zero Trust implementation.
When personal trauma meets professional purpose, it can reshape an entire industry—just ask Dr. Kelley Misata.Our guest today is Founder and CEO of Sightline Security and president of the Open Information Security Foundation. Dr. Misata brings a unique lens to the field, shaped by her personal journey as a stalking survivor turned cybersecurity advocate. From supporting nonprofits working with trafficking survivors to influencing how organizations manage open source risk, her work underscores the need to approach security with empathy, patience, and mission-first thinking.Together, we explore why cybersecurity can no longer be treated as a siloed function. Instead, it must be embedded into every decision, guided by understanding and tailored to the needs of those it aims to protect—especially in the nonprofit world. The conversation spans the dangers of digital assumptions, the importance of storytelling in awareness training, and how open source communities can be as critical to resilience as enterprise vendors.
The Monday Microsegment for the week of April 28th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.M&S battles a cyber incident that's ‘anything but ordinary'Is AI code generation playing fast and loose with security?And SAP scrambles to patch a critical vulnerability after real-world attacks.And Michael Adjei joins us for "Ask the Expert". Head to The Zero Trust Hub: hub.illumio.comRegister to attend RSAC: https://www.illumio.com/resources/events/rsa-conference-2025
The Monday Microsegment for the week of April 21st. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Russian hackers woo diplomats — with a glass of wine.AI flaws are going unfixed, even when they're critical.And security leaders look for a way forward after CVE program is pulled back from the brinkAnd Christer Swartz joins us for "Boos and Bravos". Head to The Zero Trust Hub: hub.illumio.comRegister to attend RSAC: https://www.illumio.com/resources/events/rsa-conference-2025
The Monday Microsegment for the week of April 14th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.China makes a cyber confession. Or was it a veiled warning?CISA director nomination blocked over another Chinese attackAnd ransomware attacks are up — but payouts are down.And John Kindervag joins us for "Ask the Expert."Head to The Zero Trust Hub: hub.illumio.comRegister to attend RSAC: https://www.illumio.com/resources/events/rsa-conference-2025
The Monday Microsegment for the week of April 7th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.TikTok gets more time in the U.S. — and a huge fine in Europe You can always count on death, taxes, and in April, IRS-themed phishing attacksAnd a major cybercriminal gang is taking the “ware” out of ransomware attacksAnd Trevor Dearing joins us for "Ask the Expert."Head to The Zero Trust Hub: hub.illumio.comRegister to attend RSAC: https://www.illumio.com/resources/events/rsa-conference-2025
The Monday Microsegment for the week of March 31st. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.New “Morphing Meerkat” phishing kit packs a mighty punchCritical vulnerabilities cast a shadow over solar power systemsAnd the risk prognosis is not looking good for many medical devicesAnd Gary Barlet joins us for "Ask the Expert."Head to The Zero Trust Hub: hub.illumio.comRegister to attend RSAC: https://www.illumio.com/resources/events/rsa-conference-2025
The Monday Microsegment for the week of March 24th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.AI is supercharging organized crime, Europol warnsResearchers fool major AI tools into helping them write malwareAnd UK security leaders are confident — maybe too confidentAnd Christer Swartz joins us for a Boos and Bravos SegmentHead to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
The Monday Microsegment for the week of March 17th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Accused LockBit ransomware developer facing lockup after U.S. extraditionMedusa ransomware now targeting critical infrastructureYou're not a robot, and “ClickFix” is not a solutionAnd Gary Barlet joins us for a Book Club segment. Brooking's article: https://www.brookings.edu/articles/generative-ai-the-american-worker-and-the-future-of-work/Head to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
The Monday Microsegment for the week of March 10th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Watching pirated media? Prepare to be boarded by malware.Medusa petrifies more victims with ransomwareAnd Chinese cybersecurity vendor accused of doing the oppositeAnd John Kindervag joins us for an Ask the Expert segment! Head to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
The Monday Microsegment for the week of March 3rd. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.API keys showing up in AI training dataRussian IT firms hacked by pirates in SPAAAAAAAAAAACE!And a new campaign is using malicious PDFs — and some clever SEOAnd John Kindervag joins us for a Myth Busters segment! Head to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
The Monday Microsegment for the week of February 24th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Bybit says bye-bye to nearly 1½ billion dollars in record-breaking crypto heistApple devices are getting a lot less private in the U.K.And phishing gangs are reinventing credit card theft for the digital eraAnd Christer Swartz joins us for an Ask the Expert Segment! Head to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
The Monday Microsegment for the week of February 17th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.More DeepSeek Security Concerns — this time from South KoreaCybercriminals visit Virginia Courthouse — but not in the way you were hopingAnd an old Mac Malware Variant Gets a Brand New UpdateAnd Michael Adjei joins us for an Ask the Expert Segment! Head to The Zero Trust Hub: hub.illumio.comThe Global Cost of Ransomware Study: https://www.illumio.com/resource-center/cost-of-ransomware
Please enjoy this encore of Career Notes. Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Career Notes. Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story. Learn more about your ad choices. Visit megaphone.fm/adchoices