1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
TrustArc: The Evolution of Privacy Laws

TrustArc: The Evolution of Privacy Laws

Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals. 

Designed to govern the collection, use, storage, and sharing of personal data by businesses…

00:21:38  |   Fri 04 Aug 2023
Salvador Technologies: The Art of Cyber Attack Recovery

Salvador Technologies: The Art of Cyber Attack Recovery

The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences. 

The extent of the impact will depend on the nature and severity of th…

00:22:36  |   Fri 04 Aug 2023
Red Sift: Brand Protection is Key for Your Security Strategy

Red Sift: Brand Protection is Key for Your Security Strategy

A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer from a breach. 

With the objective of CTEM being the…

00:19:16  |   Thu 29 Jun 2023
ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity

ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity

From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ever before. 

Getting one step ahead of cyber attack…

00:18:08  |   Thu 08 Jun 2023
Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-on-year. 

Visibility is critical when it comes to c…

00:22:41  |   Tue 06 Jun 2023
BlackFog: DLP is Dead - Long Live Data Exfiltration!

BlackFog: DLP is Dead - Long Live Data Exfiltration!

Data exfiltration has become a serious issue for companies in today’s world.

The unauthorised removal and theft of company data are becoming more commonplace as cybercriminals become more sophisticate…

00:16:31  |   Wed 31 May 2023
Rapid7: Scaling Cybersecurity Into a Business Process

Rapid7: Scaling Cybersecurity Into a Business Process

In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measures has become paramount and the role of Chief Inf…

00:17:42  |   Wed 31 May 2023
HID Global: Physical Identity Challenges in the Healthcare Industry

HID Global: Physical Identity Challenges in the Healthcare Industry

Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprint reading, physical identity is used to verify wh…

00:24:10  |   Tue 09 May 2023
Blumira: Difficulties SMEs Face with Cybersecurity

Blumira: Difficulties SMEs Face with Cybersecurity

Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity. 

One of the most significant challenges is the lack of resources, including budget and personnel, to …

00:18:28  |   Fri 21 Apr 2023
TrustArc: Effectively Managing Third-Party Risk

TrustArc: Effectively Managing Third-Party Risk

Effectively managing third-party risk has become crucial for companies.

Not only is it key to helping protect a company's reputation, which is crucial for maintaining customer trust and loyalty, but m…

00:20:18  |   Fri 21 Apr 2023
Radware: Understanding Supply Chain Attacks and Client Side Protection

Radware: Understanding Supply Chain Attacks and Client Side Protection

Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker …

00:15:13  |   Mon 20 Mar 2023
Honeycomb: Measuring the Success of an Incident Response Program

Honeycomb: Measuring the Success of an Incident Response Program

Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage and restoring normal business functionality as quickly…

00:19:48  |   Thu 02 Mar 2023
Keyfactor: Why You Need to Care About Machine Identity

Keyfactor: Why You Need to Care About Machine Identity

Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. 

The management of digital certificates and keys allows all internal traffi…

00:16:21  |   Mon 21 Nov 2022
Radware: Bot Mitigation is Key for Application Protection

Radware: Bot Mitigation is Key for Application Protection

Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.

And with half of all internet traffic coming from bots (both good ones and bad ones), managing that…

00:22:31  |   Mon 14 Nov 2022
Egnyte: Keeping Up With The Next Generation of Data Privacy

Egnyte: Keeping Up With The Next Generation of Data Privacy

Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated. 

So what’s happening in politics right now that c…

00:19:07  |   Thu 27 Oct 2022
Beyond Identity: Software Supply Chain Attacks and the Best Defence

Beyond Identity: Software Supply Chain Attacks and the Best Defence

A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. 

Recent high-profile supply chain attacks, most notably …

00:24:12  |   Thu 06 Oct 2022
Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust

Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust

As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected. 

Organisations across the globe are beginning to impl…

00:23:31  |   Fri 23 Sep 2022
Omada: The Pitfalls of IGA Deployments

Omada: The Pitfalls of IGA Deployments

Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. 

For companies that need functionalities like role-based access a…

00:25:23  |   Fri 23 Sep 2022
HID Global: Why Authentication is Still Such an Issue

HID Global: Why Authentication is Still Such an Issue

Authentication is the art of determining whether something is what it says it is. 

Passwords provide a great way for customers and consumers to access their personal information but when it comes to t…

00:17:55  |   Tue 02 Aug 2022
Anomali: Building a Secure Framework with XDR and MITRE ATTACK

Anomali: Building a Secure Framework with XDR and MITRE ATTACK

In this podcast, Chris Steffen, Research Director at Enterprise Management Associates (EMA), joins Mark Alba, Chief Product and Strategy Officer at Anomali, to explore the ins and outs of extended de…

00:27:41  |   Fri 08 Jul 2022
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.