Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 5 - Identity Debt: The Hidden Risk in SaaS Applications

In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel’s elite Unit 8200 and explains why identity is now the new security perimeter.

CIO POV: Identity and the Unbalanced Tension Between Attacker and Defender

Protecting a large enterprise is like playing goalkeeper in a soccer match. A CISO’s job is to keep the net clean while multiple attackers close in from various angles, aiming to score. No matter how many shots the goalie blocks, a single goal can win the game for the opposition.

Quantum Chip Breakthroughs: Why Machine Identity Resilience Can't Wait

Quantum computing isn’t just coming—it’s barreling toward us, flipping the rules of cybersecurity like a table in a bad action movie fight scene. And it begs the question every CISO and IT security professional should be asking right now: Are we ready for the quantum leap? While this groundbreaking technology promises extraordinary advancements, from AI breakthroughs to disease modeling, a darker shadow lurks beneath its potential.

EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape

Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.

Enhancing Kubernetes Security: Strategies for Effective Secrets Management

Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised credentials, resulting in significant financial losses. The recent attack involving a stolen API key at the U.S. Treasury Department highlights the vulnerability of even well-protected systems.

Lurking Threats in Post-Authentication Sessions

An attacker doesn’t need your password anymore. They don’t even need to break your MFA. They just need to get ahold of your session. And once they have it, they are you. Organizations have focused on securing access for two decades, initially relying on passwords. When passwords proved weak and insufficient, multi-factor authentication (MFA) emerged as the new standard. It was a substantial improvement, adding an extra layer of security to verify users.

How CISOs Can Use Identity to Advance Zero Trust

AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about mutating polymorphic malware, prolonged ransomware sneak attacks that lead to double-extortion and deepfakes that defraud victims every few minutes.

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Unmanaged Endpoints: Your Security Blind Spot

It’s Monday morning and the coffee shop is full of telecommuters, sipping lattes and catching up on emails. The way organizations enable work has changed. With the rise of SaaS applications and cloud-first strategies, employees, contractors and third parties frequently access corporate assets from personal, unmanaged laptops.