Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Security Strategist

Technology Business News

Episodes

Showing 101-200 of 209
«« ← Prev Page 2 of 3 Next → »»

Zero Trust Security: Mastering the Weakest Link

14 Aug 2024

Contributed by Lukas

Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving...

Automated Network Pentesting: Your Secret Weapon in Cybersecurity

09 Aug 2024

Contributed by Lukas

Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightnin...

Cybersecurity Automation: Cutting Through the Manual Clutter

05 Aug 2024

Contributed by Lukas

In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods...

Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance

31 Jul 2024

Contributed by Lukas

Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives ExplainedCompliance with cybersecurity standards is essential for any o...

Improv a Secret Weapon Against Cyber Threats

31 Jul 2024

Contributed by Lukas

Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wi...

Why the Cybersecurity Industry Needs Podcasts

24 Jul 2024

Contributed by Lukas

Podcasts are revolutionising how we raise awareness about cybersecurity. They offer an interactive and engaging way to bring essential topics lik...

Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC

03 Jul 2024

Contributed by Lukas

Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Secu...

Preventing Account Takeovers in Cloud Applications

02 Jul 2024

Contributed by Lukas

Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today...

Guardz: Empower MSPs to Secure & Insure Small Businesses

18 Jun 2024

Contributed by Lukas

Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vuln...

Trends and Threats: Rapid7's 2024 Cybersecurity Findings

17 Jun 2024

Contributed by Lukas

The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highl...

Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives

14 Jun 2024

Contributed by Lukas

As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unma...

Tackling SOC Analyst Burnout

10 Jun 2024

Contributed by Lukas

Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, co...

Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI

28 May 2024

Contributed by Lukas

The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tacti...

Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation

20 May 2024

Contributed by Lukas

Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the...

Palo Alto Networks: The State of SOC Platformization

17 May 2024

Contributed by Lukas

The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach t...

HID Global: Leading Through Challenges of Hospital Worker Violence

10 May 2024

Contributed by Lukas

The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As...

The Role of Generative AI in Red Canary's Security Evolution

09 May 2024

Contributed by Lukas

GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of p...

The Role of Generative AI in Red Canary's Security Evolution

09 May 2024

Contributed by Lukas

GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of p...

Cyera: The Future of Data Security in the Age of Artificial Intelligence

11 Apr 2024

Contributed by Lukas

The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed de...

Beyond the Firewall: How Censornet Secures the Modern Enterprise

27 Mar 2024

Contributed by Lukas

Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. F...

Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation

23 Mar 2024

Contributed by Lukas

Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are faili...

Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices

18 Mar 2024

Contributed by Lukas

The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exch...

Radware: Why You Need Advanced Threat Intelligence

15 Mar 2024

Contributed by Lukas

The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good agai...

Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO

12 Mar 2024

Contributed by Lukas

The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.While digital transform...

Pentera: Automated Security Validation and Empowering Pen Testing Teams

19 Feb 2024

Contributed by Lukas

Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of ...

Zero Networks: The Problem with VPNs

14 Feb 2024

Contributed by Lukas

It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks. This was demonstrated in the ...

Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options

06 Feb 2024

Contributed by Lukas

Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team i...

Thoropass: Fixing the Broken Audit Process

31 Jan 2024

Contributed by Lukas

The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies ar...

CloudSEK: The Future of Software Supply Chain Security

30 Jan 2024

Contributed by Lukas

In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust se...

Radware: Moving From Responsive Protection to Proactive Protection

24 Jan 2024

Contributed by Lukas

In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies ...

Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

30 Nov 2023

Contributed by Lukas

Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By ...

Radware: 360 Application Protection and Why Companies Need It

15 Nov 2023

Contributed by Lukas

Application security is a complex, wide-ranging field. With attackers using a wide range of attacks from credential stuffing to cookie poisoning,...

Huntress: Doing More With Less in Your Cybersecurity Strategy

14 Nov 2023

Contributed by Lukas

Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats. From...

Savvy: SaaS Identity Discovery and Visibility

13 Nov 2023

Contributed by Lukas

Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of th...

Cyera: Why Data Defence is so Difficult in the TikTok Era

09 Nov 2023

Contributed by Lukas

Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries. However, data security...

Cyera: How Generative AI is Driving Investments in Data Security

06 Nov 2023

Contributed by Lukas

No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure effici...

Zero Networks: We’re Sick of Zero Trust Too!

31 Oct 2023

Contributed by Lukas

Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network. Traditionally, n...

Blumira: Choosing the Right XDR Strategy In The Financial Industry

26 Oct 2023

Contributed by Lukas

XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and r...

Huntress: The Future of Cybersecurity Leadership

25 Oct 2023

Contributed by Lukas

It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity lea...

Cyera: Revolutionising Data Security for the Cloud Era

10 Oct 2023

Contributed by Lukas

Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."&n...

CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence

21 Aug 2023

Contributed by Lukas

Monitoring cyber risk is essential in today's interconnected landscape. Involving continuous assessment of vulnerabilities, threat detection, and...

TrustArc: The Evolution of Privacy Laws

04 Aug 2023

Contributed by Lukas

Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals. Designed to govern the collection, us...

Salvador Technologies: The Art of Cyber Attack Recovery

04 Aug 2023

Contributed by Lukas

The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences. The extent of t...

Red Sift: Brand Protection is Key for Your Security Strategy

29 Jun 2023

Contributed by Lukas

A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer fr...

ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity

08 Jun 2023

Contributed by Lukas

From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ev...

Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

06 Jun 2023

Contributed by Lukas

Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-o...

Rapid7: Scaling Cybersecurity Into a Business Process

31 May 2023

Contributed by Lukas

In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measur...

BlackFog: DLP is Dead - Long Live Data Exfiltration!

31 May 2023

Contributed by Lukas

Data exfiltration has become a serious issue for companies in today’s world.The unauthorised removal and theft of company data are becoming more com...

HID Global: Physical Identity Challenges in the Healthcare Industry

09 May 2023

Contributed by Lukas

Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprin...

TrustArc: Effectively Managing Third-Party Risk

21 Apr 2023

Contributed by Lukas

Effectively managing third-party risk has become crucial for companies.Not only is it key to helping protect a company's reputation, which is crucial ...

Blumira: Difficulties SMEs Face with Cybersecurity

21 Apr 2023

Contributed by Lukas

Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity. One of the most significant challenges is the ...

Radware: Understanding Supply Chain Attacks and Client Side Protection

20 Mar 2023

Contributed by Lukas

Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attack...

Honeycomb: Measuring the Success of an Incident Response Program

02 Mar 2023

Contributed by Lukas

Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage ...

Keyfactor: Why You Need to Care About Machine Identity

21 Nov 2022

Contributed by Lukas

Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of di...

Radware: Bot Mitigation is Key for Application Protection

14 Nov 2022

Contributed by Lukas

Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from ...

Egnyte: Keeping Up With The Next Generation of Data Privacy

27 Oct 2022

Contributed by Lukas

Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated....

Beyond Identity: Software Supply Chain Attacks and the Best Defence

06 Oct 2022

Contributed by Lukas

A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. R...

Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust

23 Sep 2022

Contributed by Lukas

As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbs...

Omada: The Pitfalls of IGA Deployments

23 Sep 2022

Contributed by Lukas

Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For compan...

HID Global: Why Authentication is Still Such an Issue

02 Aug 2022

Contributed by Lukas

Authentication is the art of determining whether something is what it says it is. Passwords provide a great way for customers and consumers to ac...

Anomali: Building a Secure Framework with XDR and MITRE ATTACK

08 Jul 2022

Contributed by Lukas

In this podcast, Chris Steffen, Research Director at Enterprise Management Associates (EMA), joins Mark Alba, Chief Product and St...

Censys: The World of Attack Surface Management

30 May 2022

Contributed by Lukas

Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset manag...

Calamu: The Next Generation of Data Protection

27 May 2022

Contributed by Lukas

Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions ...

Darktrace: The Fast and Furious Nature of Cybersecurity

19 May 2022

Contributed by Lukas

The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over...

Rapid7: How to Swiftly Respond to Modern Cyber Threats

18 May 2022

Contributed by Lukas

In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make pat...

Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain

17 May 2022

Contributed by Lukas

When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software ...

Sophos: The World of Cyber Insurance

10 May 2022

Contributed by Lukas

Cyber insurance helps to provide critical cover for those who need protection against digital threats.While businesses are responsible for their own c...

CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange

03 May 2022

Contributed by Lukas

Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat i...

Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction

13 Apr 2022

Contributed by Lukas

CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applicatio...

Technimove: The Science Behind Cyber Security & Cyber Resilience

28 Mar 2022

Contributed by Lukas

Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security & Cyber Resiliency Periodic Table and how ...

GitGuardian: Secrets in the Source Code Need Protection

25 Mar 2022

Contributed by Lukas

In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,to explore Secrets...

Testing Application Security Challenges in 2022

02 Feb 2022

Contributed by Lukas

Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations ar...

Quality Automotive Products in an Age of Cyber Crime

24 Nov 2021

Contributed by Lukas

Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be comprom...

Intercepting Attackers with Deceptive Technology

03 Nov 2021

Contributed by Lukas

Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enter...

Cybersecurity: The Orchestration and Automation of Processes

20 Oct 2021

Contributed by Lukas

Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes th...

Building Connections in Your Cybersecurity Job

08 Sep 2021

Contributed by Lukas

Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people...

Best Software Security Practices for 2021

18 Aug 2021

Contributed by Lukas

Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that al...

Top Enterprises are Normalising Data Leaks

21 Jul 2021

Contributed by Lukas

Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it n...

Analysing the Top Indicators of Behaviour

02 Jul 2021

Contributed by Lukas

Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "...

What Cybersecurity Experts Get Wrong

16 Jun 2021

Contributed by Lukas

When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are...

Social Engineering: Psychological Warfare in the Cyberspace

18 May 2021

Contributed by Lukas

From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recog...

Building resiliency through disruption with RSA Security

16 Feb 2021

Contributed by Lukas

As businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT fun...

Secure remote working practices with Menlo Security

02 Feb 2021

Contributed by Lukas

The need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decad...

How inbox defence protects against increasingly sophisticated attacks with Barracuda

19 Jan 2021

Contributed by Lukas

The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand re...

Navigating a crisis and the benefits of Zero Trust with Infoblox

05 Jan 2021

Contributed by Lukas

The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new ...

The Business Balancing Act – User Experience and Security with Auth0

22 Dec 2020

Contributed by Lukas

For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solut...

The use of external threat intelligence for proactive IT security with IntSights

08 Dec 2020

Contributed by Lukas

Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software v...

Understanding the current state of SOAR and its future with Swimlane

24 Nov 2020

Contributed by Lukas

Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep...

IT Security Policy Management and Automation with FireMon

10 Nov 2020

Contributed by Lukas

As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across al...

Application Security in the age of DevSecOps with WhiteSource

27 Oct 2020

Contributed by Lukas

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surr...

Optimising Application Security with Contrast Security

13 Oct 2020

Contributed by Lukas

Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they ...

Preventing Credential Stuffing Attacks with Shape Security

03 Apr 2020

Contributed by Lukas

Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generatio...

Balancing Privacy and IT Security with Zscaler

03 Apr 2020

Contributed by Lukas

Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – a...

Secure Access in the Age of Zero Trust Networking with Pulse Secure

03 Apr 2020

Contributed by Lukas

Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees ...

Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan

03 Apr 2020

Contributed by Lukas

Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and freq...

Threat Detection, Prevention, and Response with Blackberry Cylance

03 Apr 2020

Contributed by Lukas

Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to busi...

Automated Protection Against Common Vulnerabilities and Exposures with Sixgill

03 Apr 2020

Contributed by Lukas

Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a ...

Social and Digital Endpoint with SafeGuard Cyber

03 Apr 2020

Contributed by Lukas

Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. H...

Continuous Controls Monitoring for Cybersecurity with Panaseer

03 Apr 2020

Contributed by Lukas

The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor...

Securing the DevOps Process with Capsule8

03 Apr 2020

Contributed by Lukas

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications ...

«« ← Prev Page 2 of 3 Next → »»