Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Security Strategist

Technology Business News

Episodes

Showing 1-100 of 209
Page 1 of 3 Next → »»

Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?

24 Mar 2026

Contributed by Lukas

Podcast: The Security StrategistHost: Richard Stiennon, Chief Research Analyst at IT-HarvestGuest: Michael Kennedy, Ostra Security FounderFor leaders ...

Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?

20 Mar 2026

Contributed by Lukas

Podcast: The Security StrategistHost: Richard Stiennon, Chief Research Analyst at IT-HarvestGuest: Nathan Rollings, CISO at ZafranThe cybersecurity en...

Are You Testing Cyber Recovery or Just Hoping Your Backups Work

16 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Sam Woodcock, Senior Director of Solutions Architecture at 11:11 SystemsHost: Shubhangi Dua, Podcast Pro...

Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do

11 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Chip Witt, Principal Security Analyst at RadwareHost: Richard Stiennon, Chief Analyst Researcher at IT-H...

Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?

11 Mar 2026

Contributed by Lukas

Cybersecurity, for many years, has functioned on an obvious assumption that attacks repeat themselves. For instance, if a phishing email works once, i...

Are CISOs Blind to the Biggest Cloud Attack Surface?

02 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Doug Merritt, Chairperson, CEO, and President of AviatrixHost: Shubhangi Dua, Podcast Host, Producer and...

Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience

24 Feb 2026

Contributed by Lukas

In an environment where cyber threats evolve faster than regulation, UK organisations are being asked to defend themselves with rules written for a di...

The Human Factor in Cybersecurity: Behavioural Interventions That Work

24 Feb 2026

Contributed by Lukas

Cybersecurity often feels like a battle of technologies—firewalls, AI, monitoring tools, but at its core, it’s human. People are both the first li...

From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026

24 Feb 2026

Contributed by Lukas

In an era of accelerating digital change, understanding the tactics employed by modern attackers is crucial for organisations doing everything in thei...

How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business

24 Feb 2026

Contributed by Lukas

In an era where enterprise data sprawls across cloud platforms, collaboration tools, and SaaS environments, CISOs are under constant pressure to reduc...

Securing AI-Driven Development in Modern Enterprises

23 Feb 2026

Contributed by Lukas

When code is no longer written solely by humans, the way we think about application security has to change. In a recent episode of the Security S...

How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?

16 Feb 2026

Contributed by Lukas

As firms increasingly adopt autonomous AI, a key assumption in cybersecurity seems to be disappearing – data security can be understood through stat...

How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?

05 Feb 2026

Contributed by Lukas

Cybersecurity has traditionally focused on strengthening corporate networks, cloud systems, and devices. However, in the recent episode of The Securit...

Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?

04 Feb 2026

Contributed by Lukas

For decades, identity security relied on the assumption that identities are static, predictable, and mostly human. However, the growing scale and comp...

From Data to Insight: How Enterprises Are Making IoT Secure and Actionable

30 Jan 2026

Contributed by Lukas

Organisations continue to struggle with device management data and fragmented architectures while facing pressure from business and regulators. As the...

Human-Led, AI-Driven: The Next Chapter of Security Operations

29 Jan 2026

Contributed by Lukas

Security leaders are rethinking how detection and response work in practice in 2026 owing to growing complexities in cybersecurity technology and the ...

Why Are Vulnerability Backlogs Still Growing Despite Better Detection?

28 Jan 2026

Contributed by Lukas

Podcast: The Security StrategistGuest: John Amaral, Co-Founder & CTO, Root.ioHost: Chris Steffen, VP of Research, Enterprise Management Associates...

What Happens to API Security When AI Agents Go Autonomous?

16 Jan 2026

Contributed by Lukas

As companies speed up their adoption of AI, an old but increasingly serious problem is resurfacing: lack of visibility. In the recent episode of The S...

Why AI Agents Demand a New Approach to Identity Security

23 Dec 2025

Contributed by Lukas

AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows...

Is Your Holiday Traffic Human—or AI-Driven and Under Attack?

23 Dec 2025

Contributed by Lukas

As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing ...

From IoT to AIoT: Operational and Security Challenges for Modern Enterprises

22 Dec 2025

Contributed by Lukas

Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportun...

Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally

19 Dec 2025

Contributed by Lukas

Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastr...

How Can MSPs Move From Defense to Full Cyber Resilience?

15 Dec 2025

Contributed by Lukas

In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber ...

What If We Could Fix Vulnerabilities Faster Than We Find Them?

15 Dec 2025

Contributed by Lukas

In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with Jo...

Can Identity Security Close the AI Governance Gap?

10 Dec 2025

Contributed by Lukas

As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging. In this...

EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?

08 Dec 2025

Contributed by Lukas

In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s H...

Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM

25 Nov 2025

Contributed by Lukas

Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments...

How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?

19 Nov 2025

Contributed by Lukas

“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said....

Is Current DLP Failing Data Security in the Age of Generative AI?

18 Nov 2025

Contributed by Lukas

With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of&...

The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity

10 Nov 2025

Contributed by Lukas

In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Redd...

Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI

07 Nov 2025

Contributed by Lukas

Can your organization truly trust every identity, human, machine, and AI?The traditional security perimeter is no longer a reliable boundary. As enter...

How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?

06 Nov 2025

Contributed by Lukas

In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind. In the recent episode of The Sec...

Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security

29 Oct 2025

Contributed by Lukas

"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital wor...

Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can't Secure Agentic AI

15 Oct 2025

Contributed by Lukas

"With any new technology, there's always a turning point: we need something new to solve the old problems,” states Jeffrey Hickman, Head o...

AI-Powered Scam Factories: The Industrialisation of Fake Shops & Online Fraud

14 Oct 2025

Contributed by Lukas

"The harsh reality is the site wasn't real. The ad was fake. The reality is you've clicked through to a steward ad that's taken you to a fake site. Th...

Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?

01 Oct 2025

Contributed by Lukas

Identity fabric, a contemporary, flexible identity and access management (IAM) architecture, should “be involved at every stage of authent...

Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence

01 Oct 2025

Contributed by Lukas

Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the sam...

What Does the Rise of Agentic AI Mean for Traditional Security Models?

30 Sep 2025

Contributed by Lukas

In an era of AI, it’s no longer a question of whether we should use it, but instead, we need to understand how it should be used effectively, convey...

Container Security Uncovered: Lessons from NIST SP 800-190

25 Sep 2025

Contributed by Lukas

It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations r...

AI and the New Age of Cyber Threats

23 Sep 2025

Contributed by Lukas

AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddl...

How to Build a Secure Development Workflow in an Era of AI?

19 Sep 2025

Contributed by Lukas

"What we're seeing as a response to coding agents is one of the biggest risks in security vulnerabilities to date,” said Jaime Jorge, Founder and CE...

How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges

10 Sep 2025

Contributed by Lukas

"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,”...

Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary

09 Sep 2025

Contributed by Lukas

“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-f...

Phishing-Resistant Authentication: A Strategic Imperative for CISOs

04 Sep 2025

Contributed by Lukas

Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show tha...

Is Your Workforce Ready for AI-Driven Cyber Threats?

04 Sep 2025

Contributed by Lukas

"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack ...

What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?

01 Aug 2025

Contributed by Lukas

When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything."Think of H...

How Can Global Marketplaces Master Payment Security and Combat Fraud?

29 Jul 2025

Contributed by Lukas

"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is alwa...

From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats

07 Jul 2025

Contributed by Lukas

Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not j...

Why Fraud Prevention Silos Are Holding Your Business Back

26 Jun 2025

Contributed by Lukas

"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses t...

Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?

23 Jun 2025

Contributed by Lukas

"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says K...

Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges

29 May 2025

Contributed by Lukas

In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal S...

Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes

28 May 2025

Contributed by Lukas

Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's confe...

Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?

21 May 2025

Contributed by Lukas

“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett L...

The Never-Ending Chess Game in Personnel Security

16 May 2025

Contributed by Lukas

Takeaways#Personnelsecurity is crucial for organisations and individuals.There is a significant talent shortage in the #cybersecurityindustry.#AI can ...

Beyond The App Store: Cloud Marketplace Security

16 May 2025

Contributed by Lukas

Takeaways#Cloudmarketplaces function like a digital mall for various services.Continuous monitoring and detection of threats are essential.Legislation...

Data Backups: The Digital Safety Deposit Box

15 May 2025

Contributed by Lukas

Takeaways#Databackups are essential for business continuity.The 3-2-1 backup #strategy is crucial for data protection.Testing backup systems is necess...

DDoS Demystified: Understanding the Threat

15 May 2025

Contributed by Lukas

Takeaways#DDoS can mimic legitimate traffic, making detection difficult.#Botnets are often created from compromised IoT devices.Motivations for DDoS a...

Is Traditional Client-Based Access Obsolete? Rethinking Internal Security

01 May 2025

Contributed by Lukas

"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, y...

Can You Afford to Ignore Exploitability?

30 Apr 2025

Contributed by Lukas

Takeaways#ExposureManagement involves assessing multiple factors, not just single scans.Organisations must optimise their remediation capacity due to ...

From Peacetime to Wartime: Is Your Cloud Secure?

28 Apr 2025

Contributed by Lukas

Takeaways#Peacetimesecurity is no longer sufficient in modern cloud environments.AI and automation are essential for effective security management.Rea...

How to Streamline IT Operations and Enhance Security with RMM and Automation

24 Apr 2025

Contributed by Lukas

Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT ope...

Can You Stop an API Business Logic Attack?

17 Apr 2025

Contributed by Lukas

Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between diff...

The Critical Role of MDM in Safeguarding Dedicated Devices

25 Mar 2025

Contributed by Lukas

In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between sec...

Meeting of the Minds: State of Cybersecurity in 2025 Part II

25 Mar 2025

Contributed by Lukas

Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our i...

Why Cyber Needs to Rebrand from a Boys Club

20 Mar 2025

Contributed by Lukas

Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically do...

Reducing Risk with Effective Exposure Management in Enterprise Tech

19 Mar 2025

Contributed by Lukas

“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Foun...

The Evolving Cyber Threat Space: A Geopolitical Perspective

20 Feb 2025

Contributed by Lukas

In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores...

Diversity in Cybersecurity: A Key to Innovation

12 Feb 2025

Contributed by Lukas

In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emph...

Is AI and Zero Trust the Future of Cyber Warfare?

07 Feb 2025

Contributed by Lukas

The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defenc...

Meeting of the Minds: State Of Cybersecurity in 2025

06 Feb 2025

Contributed by Lukas

The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. In the first episode of Meeting of the Minds...

Navigating Cybersecurity: Insights from Jim Liddle

20 Jan 2025

Contributed by Lukas

This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity...

Unlocking the Power of APIs in AI

15 Jan 2025

Contributed by Lukas

Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. AP...

The AI Shift: Transforming Roles and Securing IT Systems

08 Jan 2025

Contributed by Lukas

In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the import...

Unified Defences: Why CDR Matters

18 Dec 2024

Contributed by Lukas

The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as org...

Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve

18 Dec 2024

Contributed by Lukas

Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geo...

Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution

09 Dec 2024

Contributed by Lukas

Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabiliti...

The Cyber Game: Simulations, Ranges, and Digital Twins

04 Dec 2024

Contributed by Lukas

Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To st...

Why Tracking Your Digital Risk is a Big Deal

02 Dec 2024

Contributed by Lukas

Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safe...

The Psychology of Security: Empowering People to Protect

27 Nov 2024

Contributed by Lukas

Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effect...

How do Hackers Collect Intelligence on their Victims?

18 Nov 2024

Contributed by Lukas

Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data min...

Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs

13 Nov 2024

Contributed by Lukas

As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and co...

Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience

06 Nov 2024

Contributed by Lukas

With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and ...

Courage & Resilience: Bringing FBI Grit to Cybersecurity

06 Nov 2024

Contributed by Lukas

When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions...

Ransom-Repeat: How to Stop Funding Your Favorite Hackers!

23 Oct 2024

Contributed by Lukas

Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational...

The Innovation Paradox: Security and Productivity in a Regulatory World

16 Oct 2024

Contributed by Lukas

Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to...

Ransomware: A Battle for Cyber Security

16 Oct 2024

Contributed by Lukas

Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormo...

Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know

16 Oct 2024

Contributed by Lukas

In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information securi...

Hackers: Heroes vs Villains – The Code Wars

14 Oct 2024

Contributed by Lukas

Ethical hacking, or penetration testing, plays a key role in protecting businesses from cyber threats by identifying vulnerabilities before malicious ...

Identity - a quick win in your Zero Trust roadmap

10 Oct 2024

Contributed by Lukas

Traditional security models are no longer enough. Identity and Zero Trust have become essential pillars of modern information security strategies. By ...

Infiltration Insights: Red Team Operations

09 Oct 2024

Contributed by Lukas

Red teaming is a proactive cybersecurity approach where ethical hackers simulate real-world attacks to test an organisation’s defences. Unlike tradi...

AI and Data Security: How to Protect What’s Powering the Future

04 Oct 2024

Contributed by Lukas

Protecting sensitive data requires a robust approach, with Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) at the forefront. DS...

Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys

26 Sep 2024

Contributed by Lukas

Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evo...

Neural Networks at Risk: AI and Cyber Threats

25 Sep 2024

Contributed by Lukas

New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks an...

Authenticating Users with Traditional SSO is Not Enough

20 Sep 2024

Contributed by Lukas

Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access. Infini...

SCION: The Future of Critical Infrastructure Defence

17 Sep 2024

Contributed by Lukas

As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up ...

How is Proactive CDR Revolutionising Cloud Security

16 Sep 2024

Contributed by Lukas

As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in s...

Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management

11 Sep 2024

Contributed by Lukas

Critical Start's Managed Detection and Response (MDR) service is designed to provide24x7x365 monitoring, human-driven threat investigation, an...

Cutting Through the Noise: Redefining Detection and Response With Secureworks

04 Sep 2024

Contributed by Lukas

When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market to...

What Would 1% Do to Your Business: ML for Optimal Security Strategies

23 Aug 2024

Contributed by Lukas

Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditiona...

Rethinking Security in the Age of Zero Trust

21 Aug 2024

Contributed by Lukas

In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access per...

Page 1 of 3 Next → »»