1. EachPod
EachPod
Security You Should Know - Podcast

Security You Should Know

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that.

Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on:

How to explain the issue to your CEO
What the solution actually does (and doesn’t do)
How the pricing model works

Then, our security leaders ask the tough questions to see what sets this vendor apart.

Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details.

Security You Should Know: Connecting security solutions with security leaders.

Technology News Tech News
Update frequency
every 5 days
Average duration
16 minutes
Episodes
30
Years Active
2025
Share to:
Harnessing AI-Native PAM with Formal

Harnessing AI-Native PAM with Formal

All links and images can be found on CISO Series.

Most data breaches don't happen because attackers are geniuses. They happen because organizations give too much access to too many people for far to…

00:19:26  |   Mon 08 Sep 2025
Enhancing Humans in Your SOC with RedCarbon

Enhancing Humans in Your SOC with RedCarbon

All links and images can be found on CISO Series.

In this episode, Simone Rapizzi, CSO at RedCarbon, explains how their AI-powered platform uses specialized models to automate threat detection and re…

00:14:56  |   Mon 25 Aug 2025
Proving Trust with Drata

Proving Trust with Drata

In this episode, Matt Hillary, CISO at Drata, explains how their AI-native trust management platform addresses these challenges by automating evidence collection from integrated systems and reducing …

00:19:58  |   Mon 18 Aug 2025
Reducing SIEM Costs with Scanner

Reducing SIEM Costs with Scanner

SIEM costs are spiraling out of control for organizations. Increasing log volumes, longer compliance-driven retention requirements, and the habit of collecting everything "just in case," the list goe…

00:13:28  |   Mon 11 Aug 2025
Evolving Security Awareness with Adaptive Security

Evolving Security Awareness with Adaptive Security

All links and images can be found on CISO Series

Security awareness is critical to cultivate in your organization. But security awareness training can often miss the mark. Traditional training is s…

00:17:27  |   Mon 04 Aug 2025
Securing the Human Element with Trustmi

Securing the Human Element with Trustmi

All links and images can be found on CISO Series.

Wire fraud and payment security remain persistent challenges for organizations, with the FBI reporting a 33% increase in BEC losses between 2023 and…

00:16:28  |   Mon 28 Jul 2025
Navigating Cloud Security with TrustOnCloud

Navigating Cloud Security with TrustOnCloud

Implmenting new technologies for the business is already a daunting task. Cloud and SaaS have made some of the implementation easier, but it also makes it easier to not fully comprehend the risks yo…

00:15:35  |   Mon 21 Jul 2025
Coordinating Security Tools with Tines

Coordinating Security Tools with Tines

Security orchestration sounds great in theory, but in practice, coordinating between different security tools remains a headache. As workflows need to move faster to keep pace with AI-driven attacks…

00:14:54  |   Mon 14 Jul 2025
Embracing AI-Native DLP with Orion Security

Embracing AI-Native DLP with Orion Security

All links and information can be found on CISO Series.

DLP can be a bit of a four-letter word in cybersecurity. False positives are a major problem with any traditional DLP solution because setting…

00:18:35  |   Mon 07 Jul 2025
Quantifying, Prioritizing, and Remediating Risk with Qualys

Quantifying, Prioritizing, and Remediating Risk with Qualys

Managing risk is the name of the game for a CISO. Quantification is a major part of that job, but it doesn't end there. Without a means of communicating that quantification to the rest of the busine…

00:16:06  |   Mon 30 Jun 2025
Maximizing the Value of MDR with ThreatLocker

Maximizing the Value of MDR with ThreatLocker

Security teams today are expected to manage two fronts—building and maintaining proactive defenses, and staying ready to respond at any moment to threats that slip through. But unless someone active…

00:18:04  |   Mon 02 Jun 2025
Stopping AI Oversharing with Knostic

Stopping AI Oversharing with Knostic

Large language models are most useful to your business when they have access to your data. But these models also overshare by default, providing need-to-know information without sophisticated access …

00:17:02  |   Wed 28 May 2025
Navigating Unauthorized Site Access with ThreatLocker

Navigating Unauthorized Site Access with ThreatLocker

Unauthorized site access remains a significant security concern for organizations. But why does this issue persist, and how can it be effectively addressed?

In this episode, Rob Allen, chief produ…

00:15:12  |   Mon 19 May 2025
Getting Linux Visibility with Sandfly Security

Getting Linux Visibility with Sandfly Security

Linux is the backbone of critical infrastructure, yet it often flies under the radar when it comes to endpoint monitoring. From legacy servers to embedded systems, Linux devices are frequently unpro…

00:18:18  |   Mon 12 May 2025
Solving Patch Management with ThreatLocker

Solving Patch Management with ThreatLocker

For years, patch management has been treated as a solved problem—until reality strikes. Outdated applications, portable executables, patch conflicts, and shadow software leave organizations unknowin…

00:17:28  |   Wed 07 May 2025
Beating the Bots with Kasada

Beating the Bots with Kasada

Automated attacks are growing in speed and sophistication, far outpacing the human defenses most organizations rely on. Whether it’s credential stuffing, scraping, or denial-of-wallet attacks, bots …

00:16:11  |   Mon 05 May 2025
Containing Elevated Privileges with ThreatLocker

Containing Elevated Privileges with ThreatLocker

Managing privileged access across a sprawling IT environment remains one of cybersecurity’s toughest balancing acts. Admin privileges are often granted too broadly and retained for too long, opening…

00:17:36  |   Wed 30 Apr 2025
Solving Alert Fatigue with Dropzone AI

Solving Alert Fatigue with Dropzone AI

Security operations centers (SOCs) are drowning in alerts, forcing analysts to waste time chasing down false positives while real threats slip through. The problem isn’t just efficiency—it’s burnout…

00:15:14  |   Mon 28 Apr 2025
Securing Endpoints in a Hybrid World with ThreatLocker

Securing Endpoints in a Hybrid World with ThreatLocker

Securing endpoints is a persistent challenge, especially in a hybrid working environment. The human factor is an unavoidable element with endpoint security, which means you have to be ready for a lot…

00:16:22  |   Wed 23 Apr 2025
Build Customer Trust with Conveyor

Build Customer Trust with Conveyor

Customer security reviews often miss their mark, leaving organizations scrambling to compensate with extensive questionnaires that divert attention away from genuine risk management. The inconsistenc…

00:18:49  |   Mon 21 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.