
Free Daily Podcast Summary
by YSecurity
Get key takeaways, quotes, and insights from The Security Podcast of Silicon Valley in a 5-minute read. Delivered straight to your inbox.
The most recent episodes — sign up to get AI-powered summaries of each one.
Your printers know your passwords. They store credentials for your email server, your file shares, and your LDAP. Jim LaRoe, founder of Symphion, explains why 99% of enterprise printers sit at factory defaults, and what a single forgotten device actually costs you. Jim: www.linkedin.com/in/jim-laroe Symphion: www.symphion.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
The biggest AI mistake companies make isn't picking the wrong tool, it's not understanding the dependencies underneath it. Jacob and Stephen from Talbot West share how they map entire organizations to find the right AI entry point, why LLMs are overhyped, and what technologies are actually underrated right now. Jacob: www.linkedin.com/in/jacobandra Stephen: www.linkedin.com/in/stephenkarafiath Talbot West: www.talbotwest.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
You can have perfect infrastructure—and still be talking to the wrong person. In this episode, Jasson Casey (Beyond Identity) breaks down why identity—not infrastructure—is the real security boundary, how passwords created today’s vulnerabilities, and what a future without “moving secrets” looks like. If you’re building or scaling a company, this is a shift you can’t ignore. Listen now. Jasson: www.linkedin.com/in/jassoncasey Beyond Identity: www.beyondidentity.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
Is your security team drowning in noise while your developers struggle to keep up? Neatsun Ziv, CEO of Ox Security, explains why traditional "Shift Left" strategies have failed and how applying business context can help your team focus on the vulnerabilities that actually matter. Listen to the full episode to learn how to turn security into a competitive advantage. Neatsun: https://www.linkedin.com/in/neatsun-ziv-ab7394/ Ox Security: http://www.ox.security/ Jon: https://www.linkedin.com/in/jon-mclachlan Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich YSecurity: https://www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
Most security decisions fail when the people doing the work don’t have the information they need. Garrett Smith, Founder and CEO of Reveal Technology and a Marine Corps Reserve Lieutenant Colonel, explains how bottom-up product design changes defense outcomes—and what business leaders can learn about building technology people actually adopt. Listen to learn how compliance, procurement, and mission pressure shape what ships and what stalls. Garrett: https://www.linkedin.com/in/wgarrettsmith/ Reveal Technology: https://www.revealtech.ai Jon: https://www.linkedin.com/in/jon-mclachlan Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich YSecurity: https://www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
AI agents can delete your production database and tell you everything is fine. Graham Neray, Co-Founder and CEO of Oso, breaks down why AI agents introduce a new level of risk for growing SaaS companies. If you’re adding AI to your product, moving upmarket, or selling into regulated industries, your authorization model is no longer a backend detail—it’s a growth dependency. Listen in to learn how automating least privilege protects your product, your customers, and your revenue. Graham: https://www.linkedin.com/in/grahamneray/ Oso: http://www.osohq.com Jon: https://www.linkedin.com/in/jon-mclachlan Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich YSecurity: https://www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
The perimeter will fail. What matters is whether your business turns one incident into a disaster. Andrew Rubin, Founder and CEO of Illumio, explains how breach containment reduces blast radius, why category timing is “luck,” and what leaders must do as AI speeds up attackers and defenders. Listen for a founder-level playbook on building security that scales with growth. Andrew: https://www.linkedin.com/in/andrewsrubin Illumio: https://www.illumio.com Jon: https://www.linkedin.com/in/jon-mclachlan Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich YSecurity: https://www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
AI won’t save your startup. Unless it can ship changes safely. Venkat Thiruvengadam breaks down why the real value isn’t the model, it’s the orchestration: guardrails, permissions, context, and human-in-the-loop workflows that let agents do more than “read-only.” Tune in for a practical conversation on scaling DevOps, security, and compliance without slowing the business. Venkat: www.linkedin.com/in/venkat-thiruvengadam DuploCloud: www.duplocloud.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
Free AI-powered daily recaps. Key takeaways, quotes, and mentions — in a 5-minute read.
Get Free Summaries →Free forever for up to 3 podcasts. No credit card required.
Listeners also like.
A shame-free space to engage in open and honest discussions about what‘s going on in security. Interviews of about 45 minutes in length explore the dilemmas and opportunities faced by real entrepreneurs, operators, engineers, and leaders.https://www.ysecurity.io
AI-powered recaps with compact key takeaways, quotes, and insights.
Get key takeaways from The Security Podcast of Silicon Valley in a 5-minute read.
Stay current on your favorite podcasts without falling behind.
It's a free AI-powered email that summarizes new episodes of The Security Podcast of Silicon Valley as soon as they're published. You get the key takeaways, notable quotes, and links & mentions — all in a quick read.
When a new episode drops, our AI transcribes and analyzes it, then generates a personalized summary tailored to your interests and profession. It's delivered to your inbox every morning.
No. Podzilla is an independent service that summarizes publicly available podcast content. We're not affiliated with or endorsed by YSecurity.
Absolutely! The free plan covers up to 3 podcasts. Upgrade to Pro for 15, or Premium for 50. Browse our full catalog at /podcasts.
The Security Podcast of Silicon Valley publishes biweekly. Our AI generates a summary within hours of each new episode.
The Security Podcast of Silicon Valley covers topics including Technology, Education, Business, Entrepreneurship, Self-Improvement. Our AI identifies the specific themes in each episode and highlights what matters most to you.
Free forever for up to 3 podcasts. No credit card required.
Free forever for up to 3 podcasts. No credit card required.