Securing the Workspace Attackers Already Live In with Rajan Kapoor

Securing the Workspace Attackers Already Live In with Rajan Kapoor

Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover.

In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough.

Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs

Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/

Learn more about Material Security: https://material.security

___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Check out our upcoming events: https://www.hackervalley.com/livestreams

Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(424)

Who Owns Your AI Security Policy? with Chris Cochran

Who Owns Your AI Security Policy? with Chris Cochran

Right now, someone in your organization is probably feeding sensitive data into an AI system that nobody approved. So when something goes wrong, who's responsible? And more critically, do you even hav...

18 Touko 35min

Turning 30,000 Findings Into 50 That Matter with Dan Pagel and Brad Hibbert

Turning 30,000 Findings Into 50 That Matter with Dan Pagel and Brad Hibbert

Mythos just found 30,000 new vulnerabilities, and now every security team is asking the same question: what actually matters? In this episode, Ron Eddings sits down with Dan Pagel, CEO at Brinqa, and ...

1 Touko 34min

Killing the Playbook with Agentic AI with Allan Alford and Tom Findling

Killing the Playbook with Agentic AI with Allan Alford and Tom Findling

SOAR promised to close the loop in the SOC and fell flat. Agentic AI is finally delivering what a decade of playbooks couldn’t. In this episode, Ron sits down with Allan Alford, SVP at NTT Global Dat...

24 Huhti 39min

The Epidemic of Sameness Is Killing Your Brand with Don Jeter

The Epidemic of Sameness Is Killing Your Brand with Don Jeter

In 2025, Torq brought a monster truck to RSAC. And Don Jeter, Torq's CMO, will be the first to tell you: nobody's buying an AI SOC platform because of a grave digger in the booth. In this episode, Ron...

17 Huhti 34min

Minutes to Meltdown: Cyber Recovery When It Counts with Chris Bevil

Minutes to Meltdown: Cyber Recovery When It Counts with Chris Bevil

Most organizations are prepping for disaster recovery when they should be building for cyber recovery, and those are not the same thing.  Recorded live at RSAC Conference 2026, Ron sat down with Chris...

7 Huhti 28min

Building AI Governance Before the Incidents Hit with Guru Sethupathy

Building AI Governance Before the Incidents Hit with Guru Sethupathy

AI adoption is outpacing governance at every level, and the cost of waiting is getting higher by the day. Guru Sethupathy, General Manager of AI Governance at Optro and former Founder of FairNow, brea...

1 Huhti 24min

What Happens When Attackers Collaborate More Than Defenders? Ron Eddings Reporting Live from RSAC Conference

What Happens When Attackers Collaborate More Than Defenders? Ron Eddings Reporting Live from RSAC Conference

What happens when attackers collaborate better than defenders?  Recorded live from RSAC 2026, this solo episode with Ron breaks down the biggest themes shaping cybersecurity right now, from organized ...

31 Maalis 13min

RSAC 2026: Show Up or Fall Behind

RSAC 2026: Show Up or Fall Behind

What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the sa...

20 Maalis 21min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
adhd-podi
rss-rahamania
rss-laadukasta-ensihoitoa
rss-vapaudu-voimaasi
kesken
psykologia
rss-liian-kuuma-peruna
rss-narsisti
rss-niinku-asia-on
rss-arkea-ja-aurinkoa-podcast-espanjasta
rss-hereilla
dreamtalk
rss-keskeneraiset-aidit
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-duodecim-lehti
rss-valo-minussa-2
rss-tfa-8020-podcast