The Security Strategist
Episodes
Zero Trust Security: Mastering the Weakest Link
14 Aug 2024
Contributed by Lukas
Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving...
Automated Network Pentesting: Your Secret Weapon in Cybersecurity
09 Aug 2024
Contributed by Lukas
Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightnin...
Cybersecurity Automation: Cutting Through the Manual Clutter
05 Aug 2024
Contributed by Lukas
In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods...
Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance
31 Jul 2024
Contributed by Lukas
Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives ExplainedCompliance with cybersecurity standards is essential for any o...
Improv a Secret Weapon Against Cyber Threats
31 Jul 2024
Contributed by Lukas
Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wi...
Why the Cybersecurity Industry Needs Podcasts
24 Jul 2024
Contributed by Lukas
Podcasts are revolutionising how we raise awareness about cybersecurity. They offer an interactive and engaging way to bring essential topics lik...
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
03 Jul 2024
Contributed by Lukas
Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Secu...
Preventing Account Takeovers in Cloud Applications
02 Jul 2024
Contributed by Lukas
Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today...
Guardz: Empower MSPs to Secure & Insure Small Businesses
18 Jun 2024
Contributed by Lukas
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vuln...
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
17 Jun 2024
Contributed by Lukas
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highl...
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
14 Jun 2024
Contributed by Lukas
As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unma...
Tackling SOC Analyst Burnout
10 Jun 2024
Contributed by Lukas
Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, co...
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
28 May 2024
Contributed by Lukas
The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tacti...
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
20 May 2024
Contributed by Lukas
Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the...
Palo Alto Networks: The State of SOC Platformization
17 May 2024
Contributed by Lukas
The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach t...
HID Global: Leading Through Challenges of Hospital Worker Violence
10 May 2024
Contributed by Lukas
The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As...
The Role of Generative AI in Red Canary's Security Evolution
09 May 2024
Contributed by Lukas
GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of p...
The Role of Generative AI in Red Canary's Security Evolution
09 May 2024
Contributed by Lukas
GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of p...
Cyera: The Future of Data Security in the Age of Artificial Intelligence
11 Apr 2024
Contributed by Lukas
The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed de...
Beyond the Firewall: How Censornet Secures the Modern Enterprise
27 Mar 2024
Contributed by Lukas
Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. F...
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
23 Mar 2024
Contributed by Lukas
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are faili...
Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices
18 Mar 2024
Contributed by Lukas
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exch...
Radware: Why You Need Advanced Threat Intelligence
15 Mar 2024
Contributed by Lukas
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good agai...
Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO
12 Mar 2024
Contributed by Lukas
The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.While digital transform...
Pentera: Automated Security Validation and Empowering Pen Testing Teams
19 Feb 2024
Contributed by Lukas
Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of ...
Zero Networks: The Problem with VPNs
14 Feb 2024
Contributed by Lukas
It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks. This was demonstrated in the ...
Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options
06 Feb 2024
Contributed by Lukas
Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team i...
Thoropass: Fixing the Broken Audit Process
31 Jan 2024
Contributed by Lukas
The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies ar...
CloudSEK: The Future of Software Supply Chain Security
30 Jan 2024
Contributed by Lukas
In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust se...
Radware: Moving From Responsive Protection to Proactive Protection
24 Jan 2024
Contributed by Lukas
In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies ...
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
30 Nov 2023
Contributed by Lukas
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By ...
Radware: 360 Application Protection and Why Companies Need It
15 Nov 2023
Contributed by Lukas
Application security is a complex, wide-ranging field. With attackers using a wide range of attacks from credential stuffing to cookie poisoning,...
Huntress: Doing More With Less in Your Cybersecurity Strategy
14 Nov 2023
Contributed by Lukas
Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats. From...
Savvy: SaaS Identity Discovery and Visibility
13 Nov 2023
Contributed by Lukas
Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of th...
Cyera: Why Data Defence is so Difficult in the TikTok Era
09 Nov 2023
Contributed by Lukas
Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries. However, data security...
Cyera: How Generative AI is Driving Investments in Data Security
06 Nov 2023
Contributed by Lukas
No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure effici...
Zero Networks: We’re Sick of Zero Trust Too!
31 Oct 2023
Contributed by Lukas
Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network. Traditionally, n...
Blumira: Choosing the Right XDR Strategy In The Financial Industry
26 Oct 2023
Contributed by Lukas
XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and r...
Huntress: The Future of Cybersecurity Leadership
25 Oct 2023
Contributed by Lukas
It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity lea...
Cyera: Revolutionising Data Security for the Cloud Era
10 Oct 2023
Contributed by Lukas
Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."&n...
CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence
21 Aug 2023
Contributed by Lukas
Monitoring cyber risk is essential in today's interconnected landscape. Involving continuous assessment of vulnerabilities, threat detection, and...
TrustArc: The Evolution of Privacy Laws
04 Aug 2023
Contributed by Lukas
Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals. Designed to govern the collection, us...
Salvador Technologies: The Art of Cyber Attack Recovery
04 Aug 2023
Contributed by Lukas
The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences. The extent of t...
Red Sift: Brand Protection is Key for Your Security Strategy
29 Jun 2023
Contributed by Lukas
A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer fr...
ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity
08 Jun 2023
Contributed by Lukas
From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ev...
Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success
06 Jun 2023
Contributed by Lukas
Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-o...
Rapid7: Scaling Cybersecurity Into a Business Process
31 May 2023
Contributed by Lukas
In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measur...
BlackFog: DLP is Dead - Long Live Data Exfiltration!
31 May 2023
Contributed by Lukas
Data exfiltration has become a serious issue for companies in today’s world.The unauthorised removal and theft of company data are becoming more com...
HID Global: Physical Identity Challenges in the Healthcare Industry
09 May 2023
Contributed by Lukas
Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprin...
TrustArc: Effectively Managing Third-Party Risk
21 Apr 2023
Contributed by Lukas
Effectively managing third-party risk has become crucial for companies.Not only is it key to helping protect a company's reputation, which is crucial ...
Blumira: Difficulties SMEs Face with Cybersecurity
21 Apr 2023
Contributed by Lukas
Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity. One of the most significant challenges is the ...
Radware: Understanding Supply Chain Attacks and Client Side Protection
20 Mar 2023
Contributed by Lukas
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attack...
Honeycomb: Measuring the Success of an Incident Response Program
02 Mar 2023
Contributed by Lukas
Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage ...
Keyfactor: Why You Need to Care About Machine Identity
21 Nov 2022
Contributed by Lukas
Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of di...
Radware: Bot Mitigation is Key for Application Protection
14 Nov 2022
Contributed by Lukas
Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from ...
Egnyte: Keeping Up With The Next Generation of Data Privacy
27 Oct 2022
Contributed by Lukas
Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated....
Beyond Identity: Software Supply Chain Attacks and the Best Defence
06 Oct 2022
Contributed by Lukas
A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. R...
Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust
23 Sep 2022
Contributed by Lukas
As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbs...
Omada: The Pitfalls of IGA Deployments
23 Sep 2022
Contributed by Lukas
Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For compan...
HID Global: Why Authentication is Still Such an Issue
02 Aug 2022
Contributed by Lukas
Authentication is the art of determining whether something is what it says it is. Passwords provide a great way for customers and consumers to ac...
Anomali: Building a Secure Framework with XDR and MITRE ATTACK
08 Jul 2022
Contributed by Lukas
In this podcast, Chris Steffen, Research Director at Enterprise Management Associates (EMA), joins Mark Alba, Chief Product and St...
Censys: The World of Attack Surface Management
30 May 2022
Contributed by Lukas
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset manag...
Calamu: The Next Generation of Data Protection
27 May 2022
Contributed by Lukas
Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions ...
Darktrace: The Fast and Furious Nature of Cybersecurity
19 May 2022
Contributed by Lukas
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over...
Rapid7: How to Swiftly Respond to Modern Cyber Threats
18 May 2022
Contributed by Lukas
In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make pat...
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain
17 May 2022
Contributed by Lukas
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software ...
Sophos: The World of Cyber Insurance
10 May 2022
Contributed by Lukas
Cyber insurance helps to provide critical cover for those who need protection against digital threats.While businesses are responsible for their own c...
CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange
03 May 2022
Contributed by Lukas
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat i...
Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction
13 Apr 2022
Contributed by Lukas
CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applicatio...
Technimove: The Science Behind Cyber Security & Cyber Resilience
28 Mar 2022
Contributed by Lukas
Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security & Cyber Resiliency Periodic Table and how ...
GitGuardian: Secrets in the Source Code Need Protection
25 Mar 2022
Contributed by Lukas
In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,to explore Secrets...
Testing Application Security Challenges in 2022
02 Feb 2022
Contributed by Lukas
Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations ar...
Quality Automotive Products in an Age of Cyber Crime
24 Nov 2021
Contributed by Lukas
Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be comprom...
Intercepting Attackers with Deceptive Technology
03 Nov 2021
Contributed by Lukas
Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enter...
Cybersecurity: The Orchestration and Automation of Processes
20 Oct 2021
Contributed by Lukas
Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes th...
Building Connections in Your Cybersecurity Job
08 Sep 2021
Contributed by Lukas
Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people...
Best Software Security Practices for 2021
18 Aug 2021
Contributed by Lukas
Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that al...
Top Enterprises are Normalising Data Leaks
21 Jul 2021
Contributed by Lukas
Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it n...
Analysing the Top Indicators of Behaviour
02 Jul 2021
Contributed by Lukas
Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "...
What Cybersecurity Experts Get Wrong
16 Jun 2021
Contributed by Lukas
When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are...
Social Engineering: Psychological Warfare in the Cyberspace
18 May 2021
Contributed by Lukas
From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recog...
Building resiliency through disruption with RSA Security
16 Feb 2021
Contributed by Lukas
As businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT fun...
Secure remote working practices with Menlo Security
02 Feb 2021
Contributed by Lukas
The need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decad...
How inbox defence protects against increasingly sophisticated attacks with Barracuda
19 Jan 2021
Contributed by Lukas
The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand re...
Navigating a crisis and the benefits of Zero Trust with Infoblox
05 Jan 2021
Contributed by Lukas
The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new ...
The Business Balancing Act – User Experience and Security with Auth0
22 Dec 2020
Contributed by Lukas
For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solut...
The use of external threat intelligence for proactive IT security with IntSights
08 Dec 2020
Contributed by Lukas
Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software v...
Understanding the current state of SOAR and its future with Swimlane
24 Nov 2020
Contributed by Lukas
Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep...
IT Security Policy Management and Automation with FireMon
10 Nov 2020
Contributed by Lukas
As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across al...
Application Security in the age of DevSecOps with WhiteSource
27 Oct 2020
Contributed by Lukas
The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surr...
Optimising Application Security with Contrast Security
13 Oct 2020
Contributed by Lukas
Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they ...
Preventing Credential Stuffing Attacks with Shape Security
03 Apr 2020
Contributed by Lukas
Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generatio...
Balancing Privacy and IT Security with Zscaler
03 Apr 2020
Contributed by Lukas
Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – a...
Secure Access in the Age of Zero Trust Networking with Pulse Secure
03 Apr 2020
Contributed by Lukas
Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees ...
Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan
03 Apr 2020
Contributed by Lukas
Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and freq...
Threat Detection, Prevention, and Response with Blackberry Cylance
03 Apr 2020
Contributed by Lukas
Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to busi...
Automated Protection Against Common Vulnerabilities and Exposures with Sixgill
03 Apr 2020
Contributed by Lukas
Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a ...
Social and Digital Endpoint with SafeGuard Cyber
03 Apr 2020
Contributed by Lukas
Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. H...
Continuous Controls Monitoring for Cybersecurity with Panaseer
03 Apr 2020
Contributed by Lukas
The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor...
Securing the DevOps Process with Capsule8
03 Apr 2020
Contributed by Lukas
The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications ...