1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices

Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices

The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. 

The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds fu…

00:28:57  |   Mon 18 Mar 2024
Radware: Why You Need Advanced Threat Intelligence

Radware: Why You Need Advanced Threat Intelligence

The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attacker…

00:25:49  |   Fri 15 Mar 2024
Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO

Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO

The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.

While digital transformation has brought significant benefits, the reali…

00:30:26  |   Tue 12 Mar 2024
Pentera: Automated Security Validation and Empowering Pen Testing Teams

Pentera: Automated Security Validation and Empowering Pen Testing Teams

Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastru…

00:17:39  |   Mon 19 Feb 2024
Zero Networks: The Problem with VPNs

Zero Networks: The Problem with VPNs

It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks. 

This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities,…

00:13:58  |   Wed 14 Feb 2024
Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options

Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options

Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response…

00:19:01  |   Tue 06 Feb 2024
Thoropass: Fixing the Broken Audit Process

Thoropass: Fixing the Broken Audit Process

The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately need…

00:15:27  |   Wed 31 Jan 2024
CloudSEK: The Future of Software Supply Chain Security

CloudSEK: The Future of Software Supply Chain Security

In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security.

When it comes to proactively stopping threat…

00:14:10  |   Tue 30 Jan 2024
Radware: Moving From Responsive Protection to Proactive Protection

Radware: Moving From Responsive Protection to Proactive Protection

In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a react…

00:18:20  |   Wed 24 Jan 2024
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. 

By integrating relevant threat intelligence feeds, securi…

00:21:57  |   Thu 30 Nov 2023
Radware: 360 Application Protection and Why Companies Need It

Radware: 360 Application Protection and Why Companies Need It

Application security is a complex, wide-ranging field. 

With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?

00:36:50  |   Wed 15 Nov 2023
Huntress: Doing More With Less in Your Cybersecurity Strategy

Huntress: Doing More With Less in Your Cybersecurity Strategy

Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats. 

From assessing and prioritising assets to utilising open s…

00:15:28  |   Tue 14 Nov 2023
Savvy: SaaS Identity Discovery and Visibility

Savvy: SaaS Identity Discovery and Visibility

Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service.

From data encryption and identity manag…

00:23:48  |   Mon 13 Nov 2023
Cyera: Why Data Defence is so Difficult in the TikTok Era

Cyera: Why Data Defence is so Difficult in the TikTok Era

Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries. 

However, data security has long relied on legacy architectures and outdated …

00:21:29  |   Thu 09 Nov 2023
Cyera: How Generative AI is Driving Investments in Data Security

Cyera: How Generative AI is Driving Investments in Data Security

No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact. 

But there are many qu…

00:22:42  |   Mon 06 Nov 2023
Zero Networks: We’re Sick of Zero Trust Too!

Zero Networks: We’re Sick of Zero Trust Too!

Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network. 

Traditionally, network security models operated under the assumption t…

00:20:36  |   Tue 31 Oct 2023
Blumira: Choosing the Right XDR Strategy In The Financial Industry

Blumira: Choosing the Right XDR Strategy In The Financial Industry

XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and reducing response time to safeguard against data bre…

00:17:57  |   Thu 26 Oct 2023
Huntress: The Future of Cybersecurity Leadership

Huntress: The Future of Cybersecurity Leadership

It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity leaders across the globe. 

The unique challenges in the…

00:20:52  |   Wed 25 Oct 2023
Cyera: Revolutionising Data Security for the Cloud Era

Cyera: Revolutionising Data Security for the Cloud Era

Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven." 

The ability to leverage data for day-to-day activi…

00:16:51  |   Tue 10 Oct 2023
CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence

CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence

Monitoring cyber risk is essential in today's interconnected landscape. 

Involving continuous assessment of vulnerabilities, threat detection, and response readiness, companies should be looking at th…

00:18:56  |   Mon 21 Aug 2023
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.