Artwork

المحتوى المقدم من Neil C. Hughes. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Neil C. Hughes أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

3411: Why The Browser Is The New Security Perimeter

27:16
 
مشاركة
 

Manage episode 504835657 series 2391590
المحتوى المقدم من Neil C. Hughes. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Neil C. Hughes أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

When I invited Or Eshed, CEO and co-founder of LayerX Security, onto Tech Talks Daily, I wanted to challenge a blind spot most teams carry into work each day. We talk about phishing, ransomware, and endpoint controls, yet we skip the place where employees actually live online. The browser. That quiet tab bar has become the front door to identities, payments, SaaS, and now AI. Or calls it a different operating system in its own right, and once you hear his examples of how extensions can intercept cookies, mimic logins, or even meddle with AI chats, the penny drops fast.

Here’s the thing. Blocking extensions across the board no longer fits how people work. Developers, marketers, sales teams, and support agents all lean on extensions for real productivity gains. Or’s argument is simple. If the business depends on extensions, security has to meet people where they are with continuous, risk-based controls inside the browser itself. That means assessing code, permissions, ownership changes, and live behaviors, not relying on a static allow list that grows and grows while attackers slip through the cracks.

We also unpack Extensionpedia, LayerX’s free resource that lets anyone look up the risk profile of a specific extension. It is part education, part early warning system, and it serves a wider mission to raise the floor for everyone. Or shares how a technology alliance with Google has helped the team analyze extensions at serious scale, and why better data beats clever slogans in a space where signals change hour by hour.

Malicious Extensions, AI Shortcuts, And The Culture Shift Security Needs

One of the standout moments is a real-world story that starts at home and ends inside a corporate network. A spouse installs a screen-recording extension on a personal device, the browser profile syncs at work, and suddenly corporate credentials and sensitive sessions are mirrored to an untrusted machine. No shadowy APT needed. Just everyday sync doing exactly what it was designed to do. It is messy, human, and exactly why policy needs to be paired with continuous visibility in the browser.

We explore the gray zone where productivity tools collide with privacy. Password managers, VPN helpers, and AI-everywhere extensions promise convenience, yet they can scrape data across SaaS apps or sync credentials in ways security leaders never intended. Or’s advice is refreshingly pragmatic. Assume extensions are staying. Instrument the browser, score risk in real time, and adapt access based on what an extension actually does, not what it claims on a store page.

Looking ahead, Or sees the browser taking an even bigger role as email, SaaS, and AI agents converge in one place. With AI companies building their own browsers, the last mile of user interaction gets denser, faster, and more valuable to protect. If 99 percent of enterprise users already run at least one extension, the task is clear. Know which ones are in play, understand how they behave, and keep policy dynamic. If this conversation sparks a rethink of your own approach, check your extensions in Extensionpedia, and then consider what modern, in-browser controls would look like in your environment. After this episode, you may never look at that tidy row of icons the same way again.

*********

Visit the Sponsor of Tech Talks Network:

Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist

https://crst.co/OGCLA. Click or tap to follow the link." href="https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcrst.co%2FOGCLA&data=05%7C02%7C%7Cd612b8a0aa6c4f08a31908dde5729a6f%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638919002555348411%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=aI2VIHyOm57M6sowtgiI9S8lOBuYflAX15O4TQ3Safc%3D&reserved=0" rel="noopener noreferrer">https://crst.co/OGCLA

  continue reading

2156 حلقات

Artwork
iconمشاركة
 
Manage episode 504835657 series 2391590
المحتوى المقدم من Neil C. Hughes. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Neil C. Hughes أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

When I invited Or Eshed, CEO and co-founder of LayerX Security, onto Tech Talks Daily, I wanted to challenge a blind spot most teams carry into work each day. We talk about phishing, ransomware, and endpoint controls, yet we skip the place where employees actually live online. The browser. That quiet tab bar has become the front door to identities, payments, SaaS, and now AI. Or calls it a different operating system in its own right, and once you hear his examples of how extensions can intercept cookies, mimic logins, or even meddle with AI chats, the penny drops fast.

Here’s the thing. Blocking extensions across the board no longer fits how people work. Developers, marketers, sales teams, and support agents all lean on extensions for real productivity gains. Or’s argument is simple. If the business depends on extensions, security has to meet people where they are with continuous, risk-based controls inside the browser itself. That means assessing code, permissions, ownership changes, and live behaviors, not relying on a static allow list that grows and grows while attackers slip through the cracks.

We also unpack Extensionpedia, LayerX’s free resource that lets anyone look up the risk profile of a specific extension. It is part education, part early warning system, and it serves a wider mission to raise the floor for everyone. Or shares how a technology alliance with Google has helped the team analyze extensions at serious scale, and why better data beats clever slogans in a space where signals change hour by hour.

Malicious Extensions, AI Shortcuts, And The Culture Shift Security Needs

One of the standout moments is a real-world story that starts at home and ends inside a corporate network. A spouse installs a screen-recording extension on a personal device, the browser profile syncs at work, and suddenly corporate credentials and sensitive sessions are mirrored to an untrusted machine. No shadowy APT needed. Just everyday sync doing exactly what it was designed to do. It is messy, human, and exactly why policy needs to be paired with continuous visibility in the browser.

We explore the gray zone where productivity tools collide with privacy. Password managers, VPN helpers, and AI-everywhere extensions promise convenience, yet they can scrape data across SaaS apps or sync credentials in ways security leaders never intended. Or’s advice is refreshingly pragmatic. Assume extensions are staying. Instrument the browser, score risk in real time, and adapt access based on what an extension actually does, not what it claims on a store page.

Looking ahead, Or sees the browser taking an even bigger role as email, SaaS, and AI agents converge in one place. With AI companies building their own browsers, the last mile of user interaction gets denser, faster, and more valuable to protect. If 99 percent of enterprise users already run at least one extension, the task is clear. Know which ones are in play, understand how they behave, and keep policy dynamic. If this conversation sparks a rethink of your own approach, check your extensions in Extensionpedia, and then consider what modern, in-browser controls would look like in your environment. After this episode, you may never look at that tidy row of icons the same way again.

*********

Visit the Sponsor of Tech Talks Network:

Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist

https://crst.co/OGCLA. Click or tap to follow the link." href="https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcrst.co%2FOGCLA&data=05%7C02%7C%7Cd612b8a0aa6c4f08a31908dde5729a6f%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638919002555348411%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=aI2VIHyOm57M6sowtgiI9S8lOBuYflAX15O4TQ3Safc%3D&reserved=0" rel="noopener noreferrer">https://crst.co/OGCLA

  continue reading

2156 حلقات

All episodes

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل