1. EachPod
EachPod
Brilliance Security Magazine Podcast - Podcast

Brilliance Security Magazine Podcast

Illuminating the intersection of physical and cyber security with interviews, product reviews, and security-related news and information.

Tech News News
Update frequency
every 13 days
Average duration
28 minutes
Episodes
101
Years Active
2020 - 2025
Share to:
Insider Threat Trends and Challenges

Insider Threat Trends and Challenges

In Episode S5E2, our guest is Sanjay Raja, VP of Product Marketing and Solutions at Gurucul. Gurucul is a provider of a real-time Cloud-native Next-Gen Analytics and Security Operations Platform. San…
00:18:18  |   Wed 15 Feb 2023
Threat Modeling in Modern Software Development

Threat Modeling in Modern Software Development

In this episode, Steve Bowcut's guest is Adam Shostack. In this discussion focused on Threat Modeling in Modern Software Development, Adam, a threat modeling expert, lends a unique and compelling per…

00:23:45  |   Mon 06 Feb 2023
The Role of OSINT in Social Engineering and How to Manage Your Human Attack Surface

The Role of OSINT in Social Engineering and How to Manage Your Human Attack Surface

Steve Bowcut's guest for episode S4E20 is Matt Polak. Matt is the CEO and Founder of Picnic Corporation. Picnic is a cybersecurity firm providing enterprise-wide protection from social engineering. T…

00:30:01  |   Mon 12 Dec 2022
How you can Identify the Security Posture of Your Devices Automatically

How you can Identify the Security Posture of Your Devices Automatically

Our guest for Episode S4E19 is Dr. Carmit Yadin, the Founder & CEO at DeviceTotal—the industry’s first universal repository platform providing security data for devices enabling companies to assess c…

00:21:26  |   Mon 28 Nov 2022
AI-driven Anomaly Detection and Predictive Threat Intelligence

AI-driven Anomaly Detection and Predictive Threat Intelligence

In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven a…

00:21:30  |   Mon 21 Nov 2022
The Security Maturity Model profile for Digital Twins

The Security Maturity Model profile for Digital Twins

In Episode S4E17, Frederick Hirsch, an independent consultant and a co-author of the IoT Security Maturity Model (SMM) Practitioner’s Guide, speaks with the host, Steve Bowcut, about the SMM profile …

00:42:26  |   Sat 12 Nov 2022
The Application Security Skills Gap

The Application Security Skills Gap

In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platf…

00:22:07  |   Mon 07 Nov 2022
Encrypted Collaboration

Encrypted Collaboration

In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption.


István explains why staying in control of …

00:32:40  |   Sat 22 Oct 2022
Zero Trust Network Access

Zero Trust Network Access

In Episode S4E14, Steve Bowcut talks about Zero Trust Network Access with two well-informed guests. On the show are two executives from the cybersecurity firm Syxsense, Mark Reed, CTO, and Dave Taylo…

00:29:20  |   Mon 19 Sep 2022
Unified Communications Solutions

Unified Communications Solutions

In Episode S4E13, our guest is Tom Reilly, the President of Commend Americas. This discussion focuses on Unified Communications Solutions. We talk about what they are, how organizations use them, and…

00:28:02  |   Mon 12 Sep 2022
How to Move Cybersecurity From a Cost Center to a Revenue Enabler

How to Move Cybersecurity From a Cost Center to a Revenue Enabler

In Episode S4E12, our guest is Jim Nitterauer, Director of Information Security at Graylog. In a fun and informative conversation, BSM's Steve Bowcut and Jim discuss how organizations can move cybers…

00:20:18  |   Mon 20 Jun 2022
How Managed Security Service Providers Can Help Protect Against Ransomware

How Managed Security Service Providers Can Help Protect Against Ransomware

In Episode S4E11, our guest is Ray Steen, Chief Strategy Officer of the IT managed services firm, MainSpring. In a fascinating and informative discussion, BSM's Steve Bowcut and Ray talk about:


  • Th…
00:40:12  |   Mon 06 Jun 2022
A10 Networks 2022 DDoS Threat Report

A10 Networks 2022 DDoS Threat Report

In Episode S4E10, our guest is Paul Nicholson, Senior Director of Product Marketing for A10 Networks. Paul gives us insight into the new 2022 A10 Networks DDoS Threat Report. We talk about what you c…

00:18:42  |   Mon 30 May 2022
SOC 2 Compliance for VaaS Providers

SOC 2 Compliance for VaaS Providers

In Episode S4E9, our guest is Ben Rowe, Cloud & Security Architect for Arcules. We discuss System and Organization Controls (SOC) level 2 type 2 certification in video-as-a-service (VaaS) and other c…

00:18:31  |   Mon 23 May 2022
A Modern Approach to VMS

A Modern Approach to VMS

In Episode S4E8 Steve Bowcut, Editor at Brilliance Security Magazine, and John Rezzonico, CEO at Edge 360, discuss what it means to build a Video Management System using modern IT processes and solut…

00:39:03  |   Mon 16 May 2022
Understanding and Communicating Cyber Risk

Understanding and Communicating Cyber Risk

Our topic for Episode S4E7 is Understanding and Communicating Cyber Risk. Our guest is Greg Spicer, CRO and Co-Founder of Ostrich Cyber-Risk


BSM's editor, Steve Bowcut, asks Greg to:


  • Discuss th…
00:34:50  |   Tue 10 May 2022
Supply chain security: What to expect in the next year

Supply chain security: What to expect in the next year

The topic for Episode S4E6 is supply chain security and what to expect in the next year. Our guest is Farshad Abasi, Founder and Chief Security Officer of Forward Security.


In a fun and interesting …

00:34:18  |   Mon 11 Apr 2022
IIC's foundational document for Artificial Intelligence—The Industrial IoT Artificial Intelligence Framework

IIC's foundational document for Artificial Intelligence—The Industrial IoT Artificial Intelligence Framework

In Episode S4E5, we have as our guests two individuals who are distinguished by their work with the Industry IoT Consortium (IIC).


Bassam Zarkout—Executive Vice President IGnPower Inc. and the Chief…

00:28:37  |   Mon 04 Apr 2022
A Novel Approach to Security Bug Bounties

A Novel Approach to Security Bug Bounties

In Episode S4E4, we have two guests. We talk with Jonatan Altszul, CEO at BitTrap and Ariel Futoransky, BitTrap’s CTO. Our topic is A Novel Approach to Security Bug Bounties.


BitTrap helps companies…

00:40:03  |   Mon 14 Mar 2022
Product Supply Chain Security

Product Supply Chain Security

In this episode, our guest is Slava Bronfman, CEO and Co-founder at Cybellum and we talk about product supply chain security. Cybellum provides a product security platform, enabling teams to manage s…

00:27:13  |   Mon 07 Mar 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Steven Bowcut. This content is not affiliated with or endorsed by eachpod.com.