1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges

How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges

"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,” stated Eva Abergel, the Senior Solution Expert a…

00:18:29  |   Wed 10 Sep 2025
Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary

Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary

“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-founder of Acalvio. “It’s like putting locks on doors.…

00:30:35  |   Tue 09 Sep 2025
Phishing-Resistant Authentication: A Strategic Imperative for CISOs

Phishing-Resistant Authentication: A Strategic Imperative for CISOs

Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show that attackers continue to bypass traditional protec…

00:25:45  |   Thu 04 Sep 2025
Is Your Workforce Ready for AI-Driven Cyber Threats?

Is Your Workforce Ready for AI-Driven Cyber Threats?

"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack at a scale that's never been before humanly possi…

00:17:50  |   Thu 04 Sep 2025
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?

What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?

When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything.

"Think of Hardware Security Modules (HSMs) like a master vau…

00:23:45  |   Fri 01 Aug 2025
How Can Global Marketplaces Master Payment Security and Combat Fraud?

How Can Global Marketplaces Master Payment Security and Combat Fraud?

"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is always a human being,” Bartosz Skwarczek, Founder & P…

00:32:49  |   Tue 29 Jul 2025
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats

From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats

Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats…

00:28:30  |   Mon 07 Jul 2025
Why Fraud Prevention Silos Are Holding Your Business Back

Why Fraud Prevention Silos Are Holding Your Business Back

"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real sep…

00:22:53  |   Thu 26 Jun 2025
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?

Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?

"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access …

00:15:47  |   Mon 23 Jun 2025
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges

Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges

In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the …

00:23:09  |   Thu 29 May 2025
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes

Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes

Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in t…

00:26:07  |   Wed 28 May 2025
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?

Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?

“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks.

This o…

00:30:52  |   Wed 21 May 2025
The Never-Ending Chess Game in Personnel Security

The Never-Ending Chess Game in Personnel Security

Takeaways

  • #Personnelsecurity is crucial for organisations and individuals.
  • There is a significant talent shortage in the #cybersecurityindustry.
  • #AI can enhance security measures but cannot replace huma…
00:27:55  |   Fri 16 May 2025
Beyond The App Store: Cloud Marketplace Security

Beyond The App Store: Cloud Marketplace Security

Takeaways

  • #Cloudmarketplaces function like a digital mall for various services.
  • Continuous monitoring and detection of threats are essential.
  • Legislation like NIST 2 and Dora impacts cloud security prac…
00:27:26  |   Fri 16 May 2025
Data Backups: The Digital Safety Deposit Box

Data Backups: The Digital Safety Deposit Box

Takeaways

  • #Databackups are essential for business continuity.
  • The 3-2-1 backup #strategy is crucial for data protection.
  • Testing backup systems is necessary to ensure data recovery.
  • Businesses should bac…
00:20:04  |   Thu 15 May 2025
DDoS Demystified: Understanding the Threat

DDoS Demystified: Understanding the Threat

Takeaways

  • #DDoS can mimic legitimate traffic, making detection difficult.
  • #Botnets are often created from compromised IoT devices.
  • Motivations for DDoS attacks range from hacktivism to personal grievanc…
00:24:38  |   Thu 15 May 2025
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security

Is Traditional Client-Based Access Obsolete? Rethinking Internal Security

"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeS…

00:29:08  |   Thu 01 May 2025
Can You Afford to Ignore Exploitability?

Can You Afford to Ignore Exploitability?

Takeaways

  • #ExposureManagement involves assessing multiple factors, not just single scans.
  • Organisations must optimise their remediation capacity due to limited resources.
  • Visibility is crucial, but find…
00:19:21  |   Wed 30 Apr 2025
From Peacetime to Wartime: Is Your Cloud Secure?

From Peacetime to Wartime: Is Your Cloud Secure?

Takeaways

  • #Peacetimesecurity is no longer sufficient in modern cloud environments.
  • AI and automation are essential for effective security management.
  • Real-time security platforms can prevent breaches be…
00:32:52  |   Mon 28 Apr 2025
How to Streamline IT Operations and Enhance Security with RMM and Automation

How to Streamline IT Operations and Enhance Security with RMM and Automation

Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tool…

00:37:26  |   Thu 24 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.