1. EachPod
EachPod
The Security Strategist - Podcast

The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security .

Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

Business Tech News News Technology
Update frequency
every 5 days
Average duration
22 minutes
Episodes
168
Years Active
2020 - 2025
Share to:
Building resiliency through disruption with RSA Security

Building resiliency through disruption with RSA Security

As businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT functions, and third-party relationships. These fact…

00:18:27  |   Mon 15 Feb 2021
Secure remote working practices with Menlo Security

Secure remote working practices with Menlo Security

The need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decades has been on a spectrum from highly supportive …

00:21:12  |   Mon 01 Feb 2021
How inbox defence protects against increasingly sophisticated attacks with Barracuda

How inbox defence protects against increasingly sophisticated attacks with Barracuda

The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand reputations, and trust within the organisation. Tra…

00:26:27  |   Mon 18 Jan 2021
Navigating a crisis and the benefits of Zero Trust with Infoblox

Navigating a crisis and the benefits of Zero Trust with Infoblox

The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new challenges for organisations to overcome. One of …

00:24:59  |   Mon 04 Jan 2021
The Business Balancing Act – User Experience and Security with Auth0

The Business Balancing Act – User Experience and Security with Auth0

For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solutions are essential. However, ensuring maximum security and …

00:20:57  |   Mon 21 Dec 2020
The use of external threat intelligence for proactive IT security with IntSights

The use of external threat intelligence for proactive IT security with IntSights

Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software vulnerabilities. Intelligence is also required abo…

00:25:00  |   Mon 07 Dec 2020
Understanding the current state of SOAR and its future with Swimlane

Understanding the current state of SOAR and its future with Swimlane

Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep up with the growing volume of alerts. SOAR solut…

00:18:14  |   Mon 23 Nov 2020
IT Security Policy Management and Automation with FireMon

IT Security Policy Management and Automation with FireMon

As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across all relevant security devices regardless of functio…

00:23:33  |   Mon 09 Nov 2020
Application Security in the age of DevSecOps with WhiteSource

Application Security in the age of DevSecOps with WhiteSource

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surrounding security have begun to arise. Many feel t…

00:23:22  |   Mon 26 Oct 2020
Optimising Application Security with Contrast Security

Optimising Application Security with Contrast Security

Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they come with a host of security problems that need s…

00:27:48  |   Mon 12 Oct 2020
Preventing Credential Stuffing Attacks with Shape Security

Preventing Credential Stuffing Attacks with Shape Security

Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generation of threats that they need to worry about. Organ…

00:20:31  |   Fri 03 Apr 2020
Balancing Privacy and IT Security with Zscaler

Balancing Privacy and IT Security with Zscaler

Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – all of which are significantly advantageous for busi…

00:25:16  |   Fri 03 Apr 2020
Secure Access in the Age of Zero Trust Networking with Pulse Secure

Secure Access in the Age of Zero Trust Networking with Pulse Secure

Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees to work how and when they wish. However, this int…

00:25:34  |   Fri 03 Apr 2020
Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan

Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan

Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and frequency necessary for today's landscape. Businesses…

00:26:53  |   Fri 03 Apr 2020
Threat Detection, Prevention, and Response with Blackberry Cylance

Threat Detection, Prevention, and Response with Blackberry Cylance

Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to business is an increasing concern for IT departments …

00:25:43  |   Fri 03 Apr 2020
Automated Protection Against Common Vulnerabilities and Exposures with Sixgill

Automated Protection Against Common Vulnerabilities and Exposures with Sixgill

Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations…

00:19:36  |   Fri 03 Apr 2020
Social and Digital Endpoint with SafeGuard Cyber

Social and Digital Endpoint with SafeGuard Cyber

Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. However, the current network security infrastructu…

00:13:26  |   Fri 03 Apr 2020
Continuous Controls Monitoring for Cybersecurity with Panaseer

Continuous Controls Monitoring for Cybersecurity with Panaseer

The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor to this. This includes more technologies, more p…

00:44:52  |   Fri 03 Apr 2020
Securing the DevOps Process with Capsule8

Securing the DevOps Process with Capsule8

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications and better accountability of developers were amon…

00:23:24  |   Fri 03 Apr 2020
The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace

The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace

Cybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous growing threats. A different approach is necessa…

00:25:34  |   Fri 03 Apr 2020
Disclaimer: The podcast and artwork embedded on this page are the property of EM360Tech. This content is not affiliated with or endorsed by eachpod.com.