The Business of Cybersecurity
Episodes
Why Non Human Identities Are The Next Cybersecurity Challenge With Torii CEO Uri Haramati
01 Apr 2026
Contributed by Lukas
How prepared are businesses for a world where AI agents are quietly becoming some of the most powerful users inside their systems?In this episode of B...
AI Security Teams That Work 24/7 With Machine Speed
25 Mar 2026
Contributed by Lukas
What happens when AI makes your security teams faster, but leaves the same people carrying all the risk?In this episode of Business of Cybersecurity, ...
AI, Social Engineering, And The New Browser Attack Surface
18 Mar 2026
Contributed by Lukas
What if the biggest blind spot in cybersecurity today is the place where most work actually happens, the browser?In this episode of the Business of Cy...
How Booz Allen Hamilton Prepares Organizations For A Cyber Crisis
12 Mar 2026
Contributed by Lukas
What really determines whether a company survives a cyberattack, the sophistication of the attacker or how well the organization prepared before the b...
Why Object First Says Most Immutable Backups Are Not Truly Immutable
09 Mar 2026
Contributed by Lukas
What happens when the backup you trusted turns out to be anything but immutable?In this episode of Business of Cybersecurity, I sit down with Anthony ...
Goldilock Secure On Cutting The Blast Radius In Overconnected Networks
03 Mar 2026
Contributed by Lukas
For two decades, the mantra in technology has been simple: connect everything. More APIs, more integrations, more remote access, more cloud. But what ...
How Kiteworks Is Preparing Enterprises For AI-Driven Risk In 2026
28 Feb 2026
Contributed by Lukas
How prepared are enterprises and government agencies for the next wave of AI-driven risk?I sit down with Tim Freestone, Chief Strategy Officer at Kite...
Building Trust Through Cybersecurity in a Zero Trust World
19 Jan 2026
Contributed by Lukas
How can cybersecurity stop being treated as a tax on growth and start becoming something founders actually lean on to win trust, customers, and long-t...
Avanade on Preparing Organizations for a World of Stronger Cybersecurity Expectations
22 Dec 2025
Contributed by Lukas
What does the UK’s new Cyber Security and Resilience Bill actually mean for mid-sized businesses that sit quietly inside complex supply chains, ofte...
When IT Meets OT, Can Endpoint Security Hold The Line
17 Nov 2025
Contributed by Lukas
How do you protect factory floors, utilities, and critical infrastructure when IT and OT finally run on the same nervous system? That is the challenge...
Why Endpoint Resilience Is the Missing Piece in Cybersecurity Strategy
10 Nov 2025
Contributed by Lukas
What does business continuity really mean when thousands of devices across a hospital or enterprise go dark? In this episode, Jason Mafera, Chief Tech...
Corelight’s Brian Dye on Outsmarting AI-Powered Attackers
24 Oct 2025
Contributed by Lukas
In today’s digital battlefield, prevention is no longer enough. Firewalls and endpoint protection might keep the doors locked, but attackers are sli...
Experian’s AI Fraud Report: SIM Swaps, Voice Cloning, and Smarter Countermeasures
29 Sep 2025
Contributed by Lukas
Experian’s Chief Product Officer for Identity and Fraud in the UK and Ireland, Paul Weathersby, joins me to unpack how criminals are using generativ...
Qualys CEO Sumedh Thakar on Moving From SOC to ROC
04 Sep 2025
Contributed by Lukas
Qualys CEO Sumedh Thakar joins me to unpack what cyber risk management really looks like when budgets are tight, signals are noisy, and AI is changing...
CyberArk Explains Why Machine Identities Are the New Attack Surface
11 Aug 2025
Contributed by Lukas
What happens when there are 100 machine identities for every human one in your organisation? This is not a prediction for the future. It is the world ...
How Abnormal AI Detects Threats Before They Hit the Inbox
26 Jul 2025
Contributed by Lukas
In this episode, I sat down with Mike Britton, CIO at Abnormal AI to explore the increasingly urgent overlap between AI governance and cybersecurity. ...
Clari: Why RevOps Is the Hidden Weapon in Cybersecurity’s AI Arms Race
15 Jul 2025
Contributed by Lukas
In this episode of The Business of Cybersecurity, I’m joined by John Queally, Senior Director of Revenue Operations at Clari, for a conversation tha...
From Complexity to Clarity: Cyber Resilience with Cloudflare’s Christian Reilly
07 Jul 2025
Contributed by Lukas
In this episode of The Business of Cybersecurity, I’m joined by Christian Reilly, Field CTO for EMEA at Cloudflare, to unpack what real-world cyber ...
Resilience Over Panic: Rethinking Ransomware with Trevor Dearing of Illumio
21 Jun 2025
Contributed by Lukas
In this episode of The Business of Cybersecurity, I speak with Trevor Dearing, Director of Critical Infrastructure at Illumio, to unpack some eye-open...
Zscaler on Building Cyber Resilience from the Ground Up
07 Jun 2025
Contributed by Lukas
When I spoke with Mark Lluic, CEO in Residence at Zscaler, on the Business of Cybersecurity podcast, we didn't spend time rehashing the basics. We loo...
Immersive Labs’ Max Vetter on Closing the Skills Gap Across Cyber Teams
01 Jun 2025
Contributed by Lukas
Are junior cybersecurity professionals outpacing their senior colleagues in readiness for modern threats?In this episode of The Business of Cybersecur...
Legacy Tech Meets Modern Threats as Kyndryl Rethinks Cybersecurity
24 May 2025
Contributed by Lukas
Legacy systems are everywhere, quietly powering core operations in some of the world’s largest enterprises. But behind that familiarity is risk. In ...
Imperva on the Bot Surge Behind Half of Global Internet Activity
17 May 2025
Contributed by Lukas
Nearly half of all internet traffic is now generated by non-human sources, and a growing share of that activity is driven by increasingly sophisticate...
IGEL at the Edge of Cybersecurity Transformation
10 May 2025
Contributed by Lukas
Recorded live at IGEL Now & Next 2025 in Miami, this conversation with John Walsh, Field CTO for Critical Sectors at IGEL, explores how organizati...
Fortinet on Making Cybersecurity a Business Priority
03 May 2025
Contributed by Lukas
What happens when a country aims to carve its own cybersecurity regulatory path post-Brexit while the rest of the region moves toward harmonized frame...
The Shadow API Threat Explained by Akamai Technologies
25 Apr 2025
Contributed by Lukas
What does it take to protect financial institutions when they're the number one global target for DDoS attacks? In this episode of The Business of Cyb...
Thales Data Threat Report Revals Risks to Critical Infrastructure
20 Apr 2025
Contributed by Lukas
What happens when the digital systems powering our national energy, water, and healthcare services become the next frontline in cybersecurity? As smar...
The Real Meaning of Zero Trust with Its Creator
16 Apr 2025
Contributed by Lukas
What does it really mean to trust nothing and verify everything? In this first episode of The Business of Cybersecurity, Neil is joined by John Kinder...