Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Security Strategist

Technology Business News

Episodes

Showing 1-100 of 225
Page 1 of 3 Next → »»

The Cybersecurity Blind Spot Leaders Are Missing, and Why It’s About to Get Worse

13 May 2026

Contributed by Lukas

Podcast: The Security StrategistGuest: Garrett Hamilton, CEO, Reach Security, and Jay Wilson, CIO & CISO, InsurityHost: Shubhangi Dua, Podcast Pro...

Your API Security Wasn’t Built for AI Agents

13 May 2026

Contributed by Lukas

Podcast: The Security Strategist podcastGuest: Eric Schwake, Director of Cybersecurity Strategy, Salt SecurityHost: Shubhangi Dua, Podcast Producer an...

Why Cybersecurity Policies Fail And How to Fix Them

12 May 2026

Contributed by Lukas

Policy is the backbone of every effective cybersecurity framework. It defines how an organisation protects its data, governs access to critical resour...

How to Fix Microsoft 365 Security

08 May 2026

Contributed by Lukas

In the digital age, securing sensitive business information has never been more critical. Microsoft 365 has become the backbone of operations for orga...

How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground

06 May 2026

Contributed by Lukas

Financial crime is no longer a peripheral concern for banks and fintechs; it is a defining operational challenge. The pressure to grow transaction vol...

Can Real-Time Identity Governance Replace Access Reviews for Good?

30 Apr 2026

Contributed by Lukas

Podcast: The Security StrategistGuest: Rick Wagner, Senior Director, Product Management at SailPointAnalyst: Jonathan Care, Lead Analyst, KuppingerCol...

Non-Human Identities and Agentic AI: The New Frontier in Identity Security

27 Apr 2026

Contributed by Lukas

Over 95 per cent of leaders now say identity security is core to their strategy. A decade ago, this wasn’t even part of the conversation. The awaren...

How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?

21 Apr 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Amit Megiddo, CEO and Co-Founder, NativeHost: Richard Stiennon, Chief Analyst Researcher at IT-HarvestIn...

FedRAMP 20x: The Future of Compliance, Trends, and Best Practices

16 Apr 2026

Contributed by Lukas

If you've ever tried to navigate the FedRAMP authorization process, you already know it's slow, expensive, and tedious when it comes to the documentat...

Why Patch Management Remains the Most Annoying Problem in IT Security

10 Apr 2026

Contributed by Lukas

Keeping your organisation’s systems secure can feel like an endless battle. Patch management and vulnerability mitigation are often seen as tedious ...

The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools

09 Apr 2026

Contributed by Lukas

The way organizations access and use enterprise data has fundamentally changed. Knowledge workers now operate in browser-based environments, relying h...

Why Patch Management Remains the Most Annoying Problem in IT Security

09 Apr 2026

Contributed by Lukas

Keeping your organisation’s systems secure can feel like an endless battle. Patch management and vulnerability mitigation are often seen as tedious ...

Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy

07 Apr 2026

Contributed by Lukas

Podcast Series: The Security StrategistHost: Richard Stiennon, Chief Research Analyst at IT-HarvestGuest: Dr Chris Pierson, Founder and CEO of BlackCl...

Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism

01 Apr 2026

Contributed by Lukas

There is a moment in every investigation where time becomes the deciding factor.Not capability, not intent, but time. In modern counter-terrorism, tha...

Democratising Cybercrime: How AI is Changing Enterprise Security

31 Mar 2026

Contributed by Lukas

AI isn’t introducing entirely new cyber threats, but it is changing how easily they can be executed, and by whom. In this episode of Security S...

Cyber Resilience in Microsoft 365: What Security Leaders Must Know

30 Mar 2026

Contributed by Lukas

Many organisations assume that moving to the cloud means much of their security posture is handled automatically. But that assumption can create blind...

Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?

24 Mar 2026

Contributed by Lukas

Podcast: The Security StrategistHost: Richard Stiennon, Chief Research Analyst at IT-HarvestGuest: Michael Kennedy, Ostra Security FounderFor leaders ...

Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?

20 Mar 2026

Contributed by Lukas

Podcast: The Security StrategistHost: Richard Stiennon, Chief Research Analyst at IT-HarvestGuest: Nathan Rollings, CISO at ZafranThe cybersecurity en...

Are You Testing Cyber Recovery or Just Hoping Your Backups Work

16 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Sam Woodcock, Senior Director of Solutions Architecture at 11:11 SystemsHost: Shubhangi Dua, Podcast Pro...

Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do

11 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Chip Witt, Principal Security Analyst at RadwareHost: Richard Stiennon, Chief Analyst Researcher at IT-H...

Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?

11 Mar 2026

Contributed by Lukas

Cybersecurity, for many years, has functioned on an obvious assumption that attacks repeat themselves. For instance, if a phishing email works once, i...

Are CISOs Blind to the Biggest Cloud Attack Surface?

02 Mar 2026

Contributed by Lukas

Podcast series: The Security StrategistGuest: Doug Merritt, Chairperson, CEO, and President of AviatrixHost: Shubhangi Dua, Podcast Host, Producer and...

Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience

24 Feb 2026

Contributed by Lukas

In an environment where cyber threats evolve faster than regulation, UK organisations are being asked to defend themselves with rules written for a di...

The Human Factor in Cybersecurity: Behavioural Interventions That Work

24 Feb 2026

Contributed by Lukas

Cybersecurity often feels like a battle of technologies—firewalls, AI, monitoring tools, but at its core, it’s human. People are both the first li...

From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026

24 Feb 2026

Contributed by Lukas

In an era of accelerating digital change, understanding the tactics employed by modern attackers is crucial for organisations doing everything in thei...

How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business

24 Feb 2026

Contributed by Lukas

In an era where enterprise data sprawls across cloud platforms, collaboration tools, and SaaS environments, CISOs are under constant pressure to reduc...

Securing AI-Driven Development in Modern Enterprises

23 Feb 2026

Contributed by Lukas

When code is no longer written solely by humans, the way we think about application security has to change. In a recent episode of the Security S...

How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?

16 Feb 2026

Contributed by Lukas

As firms increasingly adopt autonomous AI, a key assumption in cybersecurity seems to be disappearing – data security can be understood through stat...

How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?

05 Feb 2026

Contributed by Lukas

Cybersecurity has traditionally focused on strengthening corporate networks, cloud systems, and devices. However, in the recent episode of The Securit...

Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?

04 Feb 2026

Contributed by Lukas

For decades, identity security relied on the assumption that identities are static, predictable, and mostly human. However, the growing scale and comp...

From Data to Insight: How Enterprises Are Making IoT Secure and Actionable

30 Jan 2026

Contributed by Lukas

Organisations continue to struggle with device management data and fragmented architectures while facing pressure from business and regulators. As the...

Human-Led, AI-Driven: The Next Chapter of Security Operations

29 Jan 2026

Contributed by Lukas

Security leaders are rethinking how detection and response work in practice in 2026 owing to growing complexities in cybersecurity technology and the ...

Why Are Vulnerability Backlogs Still Growing Despite Better Detection?

28 Jan 2026

Contributed by Lukas

Podcast: The Security StrategistGuest: John Amaral, Co-Founder & CTO, Root.ioHost: Chris Steffen, VP of Research, Enterprise Management Associates...

What Happens to API Security When AI Agents Go Autonomous?

16 Jan 2026

Contributed by Lukas

As companies speed up their adoption of AI, an old but increasingly serious problem is resurfacing: lack of visibility. In the recent episode of The S...

Why AI Agents Demand a New Approach to Identity Security

23 Dec 2025

Contributed by Lukas

AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows...

Is Your Holiday Traffic Human—or AI-Driven and Under Attack?

23 Dec 2025

Contributed by Lukas

As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing ...

From IoT to AIoT: Operational and Security Challenges for Modern Enterprises

22 Dec 2025

Contributed by Lukas

Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportun...

Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally

19 Dec 2025

Contributed by Lukas

Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastr...

How Can MSPs Move From Defense to Full Cyber Resilience?

15 Dec 2025

Contributed by Lukas

In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber ...

What If We Could Fix Vulnerabilities Faster Than We Find Them?

15 Dec 2025

Contributed by Lukas

In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with Jo...

Can Identity Security Close the AI Governance Gap?

10 Dec 2025

Contributed by Lukas

As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging. In this...

EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?

08 Dec 2025

Contributed by Lukas

In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s H...

Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM

25 Nov 2025

Contributed by Lukas

Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments...

How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?

19 Nov 2025

Contributed by Lukas

“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said....

Is Current DLP Failing Data Security in the Age of Generative AI?

18 Nov 2025

Contributed by Lukas

With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of&...

The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity

10 Nov 2025

Contributed by Lukas

In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Redd...

Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI

07 Nov 2025

Contributed by Lukas

Can your organization truly trust every identity, human, machine, and AI?The traditional security perimeter is no longer a reliable boundary. As enter...

How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?

06 Nov 2025

Contributed by Lukas

In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind. In the recent episode of The Sec...

Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security

29 Oct 2025

Contributed by Lukas

"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital wor...

Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can't Secure Agentic AI

15 Oct 2025

Contributed by Lukas

"With any new technology, there's always a turning point: we need something new to solve the old problems,” states Jeffrey Hickman, Head o...

AI-Powered Scam Factories: The Industrialisation of Fake Shops & Online Fraud

14 Oct 2025

Contributed by Lukas

"The harsh reality is the site wasn't real. The ad was fake. The reality is you've clicked through to a steward ad that's taken you to a fake site. Th...

Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?

01 Oct 2025

Contributed by Lukas

Identity fabric, a contemporary, flexible identity and access management (IAM) architecture, should “be involved at every stage of authent...

Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence

01 Oct 2025

Contributed by Lukas

Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the sam...

What Does the Rise of Agentic AI Mean for Traditional Security Models?

30 Sep 2025

Contributed by Lukas

In an era of AI, it’s no longer a question of whether we should use it, but instead, we need to understand how it should be used effectively, convey...

Container Security Uncovered: Lessons from NIST SP 800-190

25 Sep 2025

Contributed by Lukas

It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations r...

AI and the New Age of Cyber Threats

23 Sep 2025

Contributed by Lukas

AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddl...

How to Build a Secure Development Workflow in an Era of AI?

19 Sep 2025

Contributed by Lukas

"What we're seeing as a response to coding agents is one of the biggest risks in security vulnerabilities to date,” said Jaime Jorge, Founder and CE...

How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges

10 Sep 2025

Contributed by Lukas

"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,”...

Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary

09 Sep 2025

Contributed by Lukas

“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-f...

Phishing-Resistant Authentication: A Strategic Imperative for CISOs

04 Sep 2025

Contributed by Lukas

Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show tha...

Is Your Workforce Ready for AI-Driven Cyber Threats?

04 Sep 2025

Contributed by Lukas

"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack ...

What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?

01 Aug 2025

Contributed by Lukas

When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything."Think of H...

How Can Global Marketplaces Master Payment Security and Combat Fraud?

29 Jul 2025

Contributed by Lukas

"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is alwa...

From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats

07 Jul 2025

Contributed by Lukas

Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not j...

Why Fraud Prevention Silos Are Holding Your Business Back

26 Jun 2025

Contributed by Lukas

"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses t...

Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?

23 Jun 2025

Contributed by Lukas

"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says K...

Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges

29 May 2025

Contributed by Lukas

In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal S...

Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes

28 May 2025

Contributed by Lukas

Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's confe...

Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?

21 May 2025

Contributed by Lukas

“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett L...

The Never-Ending Chess Game in Personnel Security

16 May 2025

Contributed by Lukas

Takeaways#Personnelsecurity is crucial for organisations and individuals.There is a significant talent shortage in the #cybersecurityindustry.#AI can ...

Beyond The App Store: Cloud Marketplace Security

16 May 2025

Contributed by Lukas

Takeaways#Cloudmarketplaces function like a digital mall for various services.Continuous monitoring and detection of threats are essential.Legislation...

Data Backups: The Digital Safety Deposit Box

15 May 2025

Contributed by Lukas

Takeaways#Databackups are essential for business continuity.The 3-2-1 backup #strategy is crucial for data protection.Testing backup systems is necess...

DDoS Demystified: Understanding the Threat

15 May 2025

Contributed by Lukas

Takeaways#DDoS can mimic legitimate traffic, making detection difficult.#Botnets are often created from compromised IoT devices.Motivations for DDoS a...

Is Traditional Client-Based Access Obsolete? Rethinking Internal Security

01 May 2025

Contributed by Lukas

"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, y...

Can You Afford to Ignore Exploitability?

30 Apr 2025

Contributed by Lukas

Takeaways#ExposureManagement involves assessing multiple factors, not just single scans.Organisations must optimise their remediation capacity due to ...

From Peacetime to Wartime: Is Your Cloud Secure?

28 Apr 2025

Contributed by Lukas

Takeaways#Peacetimesecurity is no longer sufficient in modern cloud environments.AI and automation are essential for effective security management.Rea...

How to Streamline IT Operations and Enhance Security with RMM and Automation

24 Apr 2025

Contributed by Lukas

Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT ope...

Can You Stop an API Business Logic Attack?

17 Apr 2025

Contributed by Lukas

Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between diff...

The Critical Role of MDM in Safeguarding Dedicated Devices

25 Mar 2025

Contributed by Lukas

In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between sec...

Meeting of the Minds: State of Cybersecurity in 2025 Part II

25 Mar 2025

Contributed by Lukas

Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our i...

Why Cyber Needs to Rebrand from a Boys Club

20 Mar 2025

Contributed by Lukas

Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically do...

Reducing Risk with Effective Exposure Management in Enterprise Tech

19 Mar 2025

Contributed by Lukas

“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Foun...

The Evolving Cyber Threat Space: A Geopolitical Perspective

20 Feb 2025

Contributed by Lukas

In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores...

Diversity in Cybersecurity: A Key to Innovation

12 Feb 2025

Contributed by Lukas

In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emph...

Is AI and Zero Trust the Future of Cyber Warfare?

07 Feb 2025

Contributed by Lukas

The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defenc...

Meeting of the Minds: State Of Cybersecurity in 2025

06 Feb 2025

Contributed by Lukas

The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. In the first episode of Meeting of the Minds...

Navigating Cybersecurity: Insights from Jim Liddle

20 Jan 2025

Contributed by Lukas

This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity...

Unlocking the Power of APIs in AI

15 Jan 2025

Contributed by Lukas

Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. AP...

The AI Shift: Transforming Roles and Securing IT Systems

08 Jan 2025

Contributed by Lukas

In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the import...

Unified Defences: Why CDR Matters

18 Dec 2024

Contributed by Lukas

The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as org...

Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve

18 Dec 2024

Contributed by Lukas

Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geo...

Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution

09 Dec 2024

Contributed by Lukas

Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabiliti...

The Cyber Game: Simulations, Ranges, and Digital Twins

04 Dec 2024

Contributed by Lukas

Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To st...

Why Tracking Your Digital Risk is a Big Deal

02 Dec 2024

Contributed by Lukas

Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safe...

The Psychology of Security: Empowering People to Protect

27 Nov 2024

Contributed by Lukas

Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effect...

How do Hackers Collect Intelligence on their Victims?

18 Nov 2024

Contributed by Lukas

Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data min...

Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs

13 Nov 2024

Contributed by Lukas

As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and co...

Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience

06 Nov 2024

Contributed by Lukas

With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and ...

Courage & Resilience: Bringing FBI Grit to Cybersecurity

06 Nov 2024

Contributed by Lukas

When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions...

Ransom-Repeat: How to Stop Funding Your Favorite Hackers!

23 Oct 2024

Contributed by Lukas

Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational...

Page 1 of 3 Next → »»