1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Courage & Resilience: Bringing FBI Grit to Cybersecurity

Courage & Resilience: Bringing FBI Grit to Cybersecurity

When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions can mean the difference between safeguarding cri…

00:35:03  |   Wed 06 Nov 2024
Closing the Cloud Gap: CDR vs. Traditional Security in the  Fight for Resilience

Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience

With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and how does it fit alongside other advanced security…

00:19:48  |   Wed 06 Nov 2024
Ransom-Repeat: How to Stop Funding Your Favorite Hackers!

Ransom-Repeat: How to Stop Funding Your Favorite Hackers!

Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational damage. Semperis’s Ransomware Risk Report explor…

00:24:02  |   Wed 23 Oct 2024
Ransomware: A Battle for Cyber Security

Ransomware: A Battle for Cyber Security

Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormous, often involving extensive data restoration, s…

00:19:33  |   Wed 16 Oct 2024
The Innovation Paradox: Security and Productivity in a Regulatory World

The Innovation Paradox: Security and Productivity in a Regulatory World

Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to growth. However, as businesses embrace digital t…

00:23:33  |   Wed 16 Oct 2024
Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know

Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know

In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information security, drawing on key findings from their latest rep…

00:18:12  |   Wed 16 Oct 2024
Hackers: Heroes vs Villains – The Code Wars

Hackers: Heroes vs Villains – The Code Wars

Ethical hacking, or penetration testing, plays a key role in protecting businesses from cyber threats by identifying vulnerabilities before malicious hackers can exploit them. As AI becomes more embe…

00:21:30  |   Mon 14 Oct 2024
Identity - a quick win in your Zero Trust roadmap

Identity - a quick win in your Zero Trust roadmap

Traditional security models are no longer enough. Identity and Zero Trust have become essential pillars of modern information security strategies. By focusing on “never trust, always verify,” Zero Tr…

00:17:41  |   Thu 10 Oct 2024
Infiltration Insights: Red Team Operations

Infiltration Insights: Red Team Operations

Red teaming is a proactive cybersecurity approach where ethical hackers simulate real-world attacks to test an organisation’s defences. Unlike traditional testing, red teaming mimics sophisticated th…

00:21:43  |   Wed 09 Oct 2024
AI and Data Security: How to Protect What’s Powering the Future

AI and Data Security: How to Protect What’s Powering the Future

Protecting sensitive data requires a robust approach, with Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) at the forefront. DSPM aligns security policies with data architectur…

00:21:50  |   Fri 04 Oct 2024
Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys

Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys

Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evolve, these industries face growing challenges in id…

00:25:55  |   Thu 26 Sep 2024
Neural Networks at Risk: AI and Cyber Threats

Neural Networks at Risk: AI and Cyber Threats

New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks and Gen-AI. These advanced AI models, while powerfu…

00:19:08  |   Wed 25 Sep 2024
Authenticating Users with Traditional SSO is Not Enough

Authenticating Users with Traditional SSO is Not Enough

Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access. 

Infinipoint addresses these vulnerabilities by offering one-…

00:21:48  |   Fri 20 Sep 2024
SCION: The Future of Critical Infrastructure Defence

SCION: The Future of Critical Infrastructure Defence

As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up with the increasingly sophisticated threats targe…

00:17:32  |   Tue 17 Sep 2024
How is Proactive CDR Revolutionising Cloud Security

How is Proactive CDR Revolutionising Cloud Security

As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the compl…

00:16:13  |   Mon 16 Sep 2024
Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management

Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management

Critical Start's Managed Detection and Response (MDR) service is designed to provide

24x7x365 monitoring, human-driven threat investigation, and flexible deployment across

IT and OT environments.

By…

00:18:47  |   Wed 11 Sep 2024
Cutting Through the Noise: Redefining Detection and Response With Secureworks

Cutting Through the Noise: Redefining Detection and Response With Secureworks

When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations real…

00:23:32  |   Wed 04 Sep 2024
What Would 1% Do to Your Business: ML for Optimal Security Strategies

What Would 1% Do to Your Business: ML for Optimal Security Strategies

Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machi…

00:25:36  |   Fri 23 Aug 2024
Rethinking Security in the Age of Zero Trust

Rethinking Security in the Age of Zero Trust

In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud en…

00:25:55  |   Wed 21 Aug 2024
Zero Trust Security: Mastering the Weakest Link

Zero Trust Security: Mastering the Weakest Link

Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This m…

00:15:43  |   Wed 14 Aug 2024
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.