<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>300</height>
  <width>600</width>
  <title>AI Has a data problem, cascading breaches, and the weekly news - Dimitri Sirota - ESW #459</title>
  <description>Interview with Dimitri Sirota from BigID Most organizations think AI risk lives in the model – or the identity. It doesn’t. It lives in the data. In this episode, BigID’s CEO reframes the conversation: why legacy access controls are breaking down, why visibility into sensitive data is the missing foundation, and what it takes to govern humans and machines under a single, accountable framework. Segment Resources:  BigID's  Agent Access Management Guide BigID's podcast,  CTRL + ALT + AI  This Week's Topic: Cascading Breaches We’re seeing more and more 3rd and 4th party attacks that chain through multiple layers of compromised tools and services. In this topic segment, we discuss the two main aspects of this trend:  How we can stop the chain of breaches from a third party library, vendor, or service provider How this might get handled at the legal, contractual, and organizational levels  We discuss two big recent examples:  Sonicwall's 2025 breach of their cloud firewall configuration backup service The compromise of Aqua Security's widely used Trivy open source tool  The Weekly Enterprise News Finally, in the enterprise security news,  Funding and M&amp;amp;amp;A courtesy of the Security, Funded newsletter We have evidence that attackers are leveraging AI now (this sounds like old news, but there was little to no evidence before, when people were claiming this) The Angry admin problem emerges again Vulnerability information is getting crazy to keep up with Breach information is getting crazy to keep up with You can give your Agents an allowance now - don’t spend it all in one place Are vulnerabilities sparse or dense? Mythos, as a model, isn’t all that special Deploy your own deception sensors! Japan made something weird. Again.  All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-459 </description>
  <author_name>Enterprise Security Weekly (Video)</author_name>
  <author_url>https://securityweekly.com/esw</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/41311675/height/300/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="300" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/content/201999340</thumbnail_url>
</oembed>
