Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Daniel Miessler. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daniel Miessler or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

A Conversation With Harry Wetherald CO-Founder & CEO At Maze

35:03
 
Share
 

Manage episode 507926916 series 2343127
Content provided by Daniel Miessler. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daniel Miessler or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:
https://mazehq.com/

In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams.

We talk about:

The Real Problem in Vulnerability Management
Why remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them.

Context, Ownership, and Velocity
How linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down.

AI Agents and the Future of Security
Why we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models.

Attackers Move First
How attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead.

From Days to Minutes
Why the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference.

Subscribe to the newsletter at:
https://danielmiessler.com/subscribe

Join the UL community at:
https://danielmiessler.com/upgrade

Follow on X:
https://x.com/danielmiessler

Follow on LinkedIn:
https://www.linkedin.com/in/danielmiessler

Chapters:

00:00 – Welcome and Harry’s Background
01:07 – The Real Problem: Remediation vs. Prioritization
04:31 – Breaking Down Vulnerability Context and Threat Intel
05:46 – Connecting Vulnerabilities to Developers and Workflows
08:01 – Why Traditional Vulnerability Management Fails
10:29 – Startup Lessons and The State of AI Agents
13:26 – DARPA’s AI Cybersecurity Competition
14:29 – System Design: Deterministic Code vs. AI
16:05 – How the Product Works and Data Sources
18:01 – AI as “Extra Eyes and Hands” in Security
20:20 – Breaking Barriers: Rethinking Scale with AI
23:22 – Building World Models for Defense (and Attack)
25:22 – Attackers Move Faster: Why Context Matters
27:04 – Phishing at Scale with AI Agents
31:24 – Shrinking Windows of Vulnerability: From Days to Minutes
32:47 – What’s Next for Harry’s Work
34:13 – Closing Thoughts

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

  continue reading

552 episodes

Artwork
iconShare
 
Manage episode 507926916 series 2343127
Content provided by Daniel Miessler. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daniel Miessler or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:
https://mazehq.com/

In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams.

We talk about:

The Real Problem in Vulnerability Management
Why remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them.

Context, Ownership, and Velocity
How linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down.

AI Agents and the Future of Security
Why we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models.

Attackers Move First
How attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead.

From Days to Minutes
Why the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference.

Subscribe to the newsletter at:
https://danielmiessler.com/subscribe

Join the UL community at:
https://danielmiessler.com/upgrade

Follow on X:
https://x.com/danielmiessler

Follow on LinkedIn:
https://www.linkedin.com/in/danielmiessler

Chapters:

00:00 – Welcome and Harry’s Background
01:07 – The Real Problem: Remediation vs. Prioritization
04:31 – Breaking Down Vulnerability Context and Threat Intel
05:46 – Connecting Vulnerabilities to Developers and Workflows
08:01 – Why Traditional Vulnerability Management Fails
10:29 – Startup Lessons and The State of AI Agents
13:26 – DARPA’s AI Cybersecurity Competition
14:29 – System Design: Deterministic Code vs. AI
16:05 – How the Product Works and Data Sources
18:01 – AI as “Extra Eyes and Hands” in Security
20:20 – Breaking Barriers: Rethinking Scale with AI
23:22 – Building World Models for Defense (and Attack)
25:22 – Attackers Move Faster: Why Context Matters
27:04 – Phishing at Scale with AI Agents
31:24 – Shrinking Windows of Vulnerability: From Days to Minutes
32:47 – What’s Next for Harry’s Work
34:13 – Closing Thoughts

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

  continue reading

552 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play