Artwork

Content provided by SquareX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SquareX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Why Browser-Native Security is the New Must-Have for Enterprises | Inside SquareX

20:58
 
Share
 

Manage episode 449569030 series 3579095
Content provided by SquareX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SquareX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Shourya, principal software engineer at SquareX, joins Sasha from our Founder’s Office to discuss why enterprises need to have a security solution that runs directly in the browser. Shourya explains how traditional secure web gateways and endpoint detection tools often fall short against sophisticated client-side web attacks like Last Mile Reassembly Attacks. He shares how browser-native solutions can bridge these gaps, providing the visibility and control enterprises need to manage complex threats.
Shourya also explores common vulnerabilities organizations face, such as malicious QR codes and advanced phishing tactics, and explains how SquareX’s browser-native solution detects and neutralizes these threats. From insights on BYOD security to the importance of tracking user journeys when investigating incidents, this conversation offers a comprehensive summary on the importance of browser-native security.
0:00 Common enterprise security stacks and their limitations
1:45 Advantages of browser-native security
3:59 File Chunking and Last Mile Reassembly Attacks
8:15 How browser-native solutions provide essential visibility for security teams
11:56 Malicious files and SquareX’s privacy-friendly, in-browser file scanning
13:27 Three prevalent attacks that existing solutions have trouble solving
15:57 Securing BYOD when employees use unmanaged devices
17:57 Why granularity is necessary to mitigate data loss through generative AI tools
20:02 Closing thoughts and future cybersecurity trends
🔔 Follow Shourya and Aleksandra on:
https://www.linkedin.com/in/shouryaps/
https://www.linkedin.com/in/aleksandra-melnikova-1012/

🔥 Powered by SquareX
SquareX helps organizations detect, mitigate, and threat hunt web attacks happening against their users in real-time. Find out more about SquareX at https://sqrx.com/

  continue reading

Chapters

1. Common enterprise security stacks and their limitations (00:00:00)

2. Advantages of browser-native security (00:01:45)

3. File Chunking and Last Mile Reassembly Attacks (00:03:59)

4. How browser-native solutions provide essential visibility for security teams (00:08:15)

5. Malicious files and SquareX’s privacy-friendly, in-browser file scanning (00:11:56)

6. Three prevalent attacks that existing solutions have trouble solving (00:13:27)

7. Securing BYOD when employees use unmanaged devices (00:15:57)

8. Why granularity is necessary to mitigate data loss through generative AI tools (00:17:57)

9. Closing thoughts and future cybersecurity trends (00:20:02)

46 episodes

Artwork
iconShare
 
Manage episode 449569030 series 3579095
Content provided by SquareX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SquareX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Shourya, principal software engineer at SquareX, joins Sasha from our Founder’s Office to discuss why enterprises need to have a security solution that runs directly in the browser. Shourya explains how traditional secure web gateways and endpoint detection tools often fall short against sophisticated client-side web attacks like Last Mile Reassembly Attacks. He shares how browser-native solutions can bridge these gaps, providing the visibility and control enterprises need to manage complex threats.
Shourya also explores common vulnerabilities organizations face, such as malicious QR codes and advanced phishing tactics, and explains how SquareX’s browser-native solution detects and neutralizes these threats. From insights on BYOD security to the importance of tracking user journeys when investigating incidents, this conversation offers a comprehensive summary on the importance of browser-native security.
0:00 Common enterprise security stacks and their limitations
1:45 Advantages of browser-native security
3:59 File Chunking and Last Mile Reassembly Attacks
8:15 How browser-native solutions provide essential visibility for security teams
11:56 Malicious files and SquareX’s privacy-friendly, in-browser file scanning
13:27 Three prevalent attacks that existing solutions have trouble solving
15:57 Securing BYOD when employees use unmanaged devices
17:57 Why granularity is necessary to mitigate data loss through generative AI tools
20:02 Closing thoughts and future cybersecurity trends
🔔 Follow Shourya and Aleksandra on:
https://www.linkedin.com/in/shouryaps/
https://www.linkedin.com/in/aleksandra-melnikova-1012/

🔥 Powered by SquareX
SquareX helps organizations detect, mitigate, and threat hunt web attacks happening against their users in real-time. Find out more about SquareX at https://sqrx.com/

  continue reading

Chapters

1. Common enterprise security stacks and their limitations (00:00:00)

2. Advantages of browser-native security (00:01:45)

3. File Chunking and Last Mile Reassembly Attacks (00:03:59)

4. How browser-native solutions provide essential visibility for security teams (00:08:15)

5. Malicious files and SquareX’s privacy-friendly, in-browser file scanning (00:11:56)

6. Three prevalent attacks that existing solutions have trouble solving (00:13:27)

7. Securing BYOD when employees use unmanaged devices (00:15:57)

8. Why granularity is necessary to mitigate data loss through generative AI tools (00:17:57)

9. Closing thoughts and future cybersecurity trends (00:20:02)

46 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play