1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Automated Network Pentesting: Your Secret Weapon in Cybersecurity

Automated Network Pentesting: Your Secret Weapon in Cybersecurity

Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. That’…

00:20:11  |   Fri 09 Aug 2024
Cybersecurity Automation: Cutting Through the Manual Clutter

Cybersecurity Automation: Cutting Through the Manual Clutter

In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods are time-consuming and error-prone and struggle …

00:23:51  |   Mon 05 Aug 2024
Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance

Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance

Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives Explained


Compliance with cybersecurity standards is essential for any organisation to protect sensitive information, mai…

00:23:15  |   Wed 31 Jul 2024
Improv a Secret Weapon Against Cyber Threats

Improv a Secret Weapon Against Cyber Threats

Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wit and adaptability of seasoned improvisers! 

Commu…

00:10:14  |   Wed 31 Jul 2024
Why the Cybersecurity Industry Needs Podcasts

Why the Cybersecurity Industry Needs Podcasts

Podcasts are revolutionising how we raise awareness about cybersecurity. 

They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday …

00:18:32  |   Wed 24 Jul 2024
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC

Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC

Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure…

00:32:31  |   Wed 03 Jul 2024
Preventing Account Takeovers in Cloud Applications

Preventing Account Takeovers in Cloud Applications

Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today are using more cloud applications than ever, and…

00:23:25  |   Tue 02 Jul 2024
Guardz: Empower MSPs to Secure & Insure Small Businesses

Guardz: Empower MSPs to Secure & Insure Small Businesses

Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses,…

00:19:53  |   Tue 18 Jun 2024
Trends and Threats: Rapid7's 2024 Cybersecurity Findings

Trends and Threats: Rapid7's 2024 Cybersecurity Findings

The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated att…

00:13:49  |   Mon 17 Jun 2024
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives

Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives

As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard se…

00:20:38  |   Fri 14 Jun 2024
Tackling SOC Analyst Burnout

Tackling SOC Analyst Burnout

Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead…

00:30:07  |   Mon 10 Jun 2024
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI

Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI

The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses …

00:22:47  |   Tue 28 May 2024
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation

Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation

Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the knowledge base through coordinated bot activity.…

00:19:32  |   Mon 20 May 2024
Palo Alto Networks: The State of SOC Platformization

Palo Alto Networks: The State of SOC Platformization

The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach to managing and mitigating security threats. By co…

00:30:59  |   Fri 17 May 2024
HID Global: Leading Through Challenges of Hospital Worker Violence

HID Global: Leading Through Challenges of Hospital Worker Violence

The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that…

00:26:34  |   Fri 10 May 2024
The Role of Generative AI in Red Canary's Security Evolution

The Role of Generative AI in Red Canary's Security Evolution

GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span…

00:21:20  |   Thu 09 May 2024
The Role of Generative AI in Red Canary's Security Evolution

The Role of Generative AI in Red Canary's Security Evolution

GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span…

00:21:20  |   Thu 09 May 2024
Cyera: The Future of Data Security in the Age of Artificial Intelligence

Cyera: The Future of Data Security in the Age of Artificial Intelligence

The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed decision-making. However, this abundance of data al…

00:19:06  |   Thu 11 Apr 2024
Beyond the Firewall: How Censornet Secures the Modern Enterprise

Beyond the Firewall: How Censornet Secures the Modern Enterprise

Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider fo…

00:27:18  |   Wed 27 Mar 2024
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation

Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation

Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and soph…

00:14:28  |   Sat 23 Mar 2024
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.