1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Censys: The World of Attack Surface Management

Censys: The World of Attack Surface Management

Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.

It sounds as simple as asset management, but ASM is different in the way it approac…

00:18:25  |   Mon 30 May 2022
Calamu: The Next Generation of Data Protection

Calamu: The Next Generation of Data Protection

Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protectio…

00:26:26  |   Fri 27 May 2022
Darktrace: The Fast and Furious Nature of Cybersecurity

Darktrace: The Fast and Furious Nature of Cybersecurity

The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most …

00:17:53  |   Thu 19 May 2022
Rapid7: How to Swiftly Respond to Modern Cyber Threats

Rapid7: How to Swiftly Respond to Modern Cyber Threats

In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available. 

With security teams now being put…

00:16:04  |   Wed 18 May 2022
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain

Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain

When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. 

This is bec…

00:25:49  |   Tue 17 May 2022
Sophos: The World of Cyber Insurance

Sophos: The World of Cyber Insurance

Cyber insurance helps to provide critical cover for those who need protection against digital threats.

While businesses are responsible for their own cybersecurity, liability coverage can help provide…

00:28:11  |   Tue 10 May 2022
CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange

CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange

Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source inf…

00:16:21  |   Tue 03 May 2022
Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction

Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction

CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services.

Usually providing a variety of f…

00:24:33  |   Wed 13 Apr 2022
Technimove: The Science Behind Cyber Security & Cyber Resilience

Technimove: The Science Behind Cyber Security & Cyber Resilience

Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security & Cyber Resiliency Periodic Table and how enterprises can fully understand the digital threat l…

00:30:49  |   Mon 28 Mar 2022
GitGuardian: Secrets in the Source Code Need Protection

GitGuardian: Secrets in the Source Code Need Protection

In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,

to explore Secrets Sprawl or the phenomenon of (unwanted) secrets d…

00:19:54  |   Fri 25 Mar 2022
Testing Application Security Challenges in 2022

Testing Application Security Challenges in 2022

Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations are still unable to identify the key challenges wit…

00:22:59  |   Wed 02 Feb 2022
Quality Automotive Products in an Age of Cyber Crime

Quality Automotive Products in an Age of Cyber Crime

Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be compromised within the supply chain. Regardless of where…

00:17:16  |   Wed 24 Nov 2021
Intercepting Attackers with Deceptive Technology

Intercepting Attackers with Deceptive Technology

Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enterprise. However, according to cybersecurity experts, deceptive te…

00:27:09  |   Wed 03 Nov 2021
Cybersecurity: The Orchestration and Automation of Processes

Cybersecurity: The Orchestration and Automation of Processes

Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes the cookie. The adoption of automation has certainl…

00:20:50  |   Wed 20 Oct 2021
Building Connections in Your Cybersecurity Job

Building Connections in Your Cybersecurity Job

Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people cite that the career can often result in low pay…

00:18:22  |   Wed 08 Sep 2021
Best Software Security Practices for 2021

Best Software Security Practices for 2021

Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that all seem to be promising the same thing. For many a…

00:20:23  |   Wed 18 Aug 2021
Top Enterprises are Normalising Data Leaks

Top Enterprises are Normalising Data Leaks

Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it no longer makes the headlines. In fact, even in 20…

00:19:51  |   Wed 21 Jul 2021
Analysing the Top Indicators of Behaviour

Analysing the Top Indicators of Behaviour

Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "Indicators of Compromise" remain prevalent to thi…

00:21:15  |   Fri 02 Jul 2021
What Cybersecurity Experts Get Wrong

What Cybersecurity Experts Get Wrong

When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are starting to realise, however, is that technology…

00:20:40  |   Wed 16 Jun 2021
Social Engineering: Psychological Warfare in the Cyberspace

Social Engineering: Psychological Warfare in the Cyberspace

From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recognising the fact that as much as you train and pre…

00:26:41  |   Tue 18 May 2021
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.