
You can have perfect infrastructure—and still be talking to the wrong person. In this episode, Jasson Casey (Beyond Identity) breaks down why identity—not infrastructure—is the real security boundary, how passwords created today’s vulnerabilities, and what a future without “moving secrets” looks like. If you’re building or scaling a company, this is a shift you can’t ignore. Listen now. Jasson: www.linkedin.com/in/jassoncasey Beyond Identity: www.beyondidentity.com Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io 🔒 Sponsored by YSecurity Closing a big deal and getting hit with a vendor questionnaire, SOC 2 request, or pen test requirement? That's exactly what we handle. YSecurity embeds a team of security engineers with backgrounds from Apple, Uber, Microsoft, Robinhood, and Brex directly into your company. No full-time hire, no bloated retainer. You set a monthly cap and we handle everything. Book a free strategy call and we'll tell you exactly where you stand. 👉 Book your free call: 30 Min Meeting | YSecurity.io | Cal.com 👉 Learn more: YSecurity | On-Demand Cybersecurity Team for Startups — SOC 2 in 5 Months
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

95. Stop Saying No: How Security Leaders Enable AI Instead of Blocking It (with Pranava Adduri and George Gerchow)

94. How one unsecured printer can take down 11,000 devices (with Jim LaRoe, Symphion, Inc.)

93. The Conversation Nobody’s Having About AI (with Jacob Andra and Stephen Karafiath)

91. Why Asking Developers To Fix Everything Is... A Bad Idea (with Neatsun Ziv)
Free AI-powered recaps of The Security Podcast of Silicon Valley and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.