The Security Strategist
Episodes
Navigating a crisis and the benefits of Zero Trust with Infoblox
05 Jan 2021
Contributed by Lukas
The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new ...
The Business Balancing Act – User Experience and Security with Auth0
22 Dec 2020
Contributed by Lukas
For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solut...
The use of external threat intelligence for proactive IT security with IntSights
08 Dec 2020
Contributed by Lukas
Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software v...
Understanding the current state of SOAR and its future with Swimlane
24 Nov 2020
Contributed by Lukas
Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep...
IT Security Policy Management and Automation with FireMon
10 Nov 2020
Contributed by Lukas
As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across al...
Application Security in the age of DevSecOps with WhiteSource
27 Oct 2020
Contributed by Lukas
The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surr...
Optimising Application Security with Contrast Security
13 Oct 2020
Contributed by Lukas
Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they ...
Preventing Credential Stuffing Attacks with Shape Security
03 Apr 2020
Contributed by Lukas
Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generatio...
Balancing Privacy and IT Security with Zscaler
03 Apr 2020
Contributed by Lukas
Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – a...
Secure Access in the Age of Zero Trust Networking with Pulse Secure
03 Apr 2020
Contributed by Lukas
Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees ...
Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan
03 Apr 2020
Contributed by Lukas
Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and freq...
Threat Detection, Prevention, and Response with Blackberry Cylance
03 Apr 2020
Contributed by Lukas
Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to busi...
Automated Protection Against Common Vulnerabilities and Exposures with Sixgill
03 Apr 2020
Contributed by Lukas
Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a ...
Social and Digital Endpoint with SafeGuard Cyber
03 Apr 2020
Contributed by Lukas
Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. H...
Continuous Controls Monitoring for Cybersecurity with Panaseer
03 Apr 2020
Contributed by Lukas
The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor...
Securing the DevOps Process with Capsule8
03 Apr 2020
Contributed by Lukas
The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications ...
The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace
03 Apr 2020
Contributed by Lukas
Cybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous...
Cybersecurity Responding to Demand with SecureData
03 Apr 2020
Contributed by Lukas
Assessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more cha...
New Risks Arising for Businesses Through Increased Digitisation with RSA
03 Apr 2020
Contributed by Lukas
The scope of digitisation and the speed of adoption has increased rapidly in the last few decades. Virtually every aspect of any business operation fe...
The role backup and recovery tools can play in enhancing IT security with Unitrends
03 Apr 2020
Contributed by Lukas
Security covers every aspect of IT infrastructure and usage, to ensure the protection of users, data and business processes. Backup and recovery tools...
Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame
03 Apr 2020
Contributed by Lukas
With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...
Part 2: What’s Next for Endpoint Security? with Endgame
03 Apr 2020
Contributed by Lukas
With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...
Part 1: How Endpoint Security Got To Now? with Endgame
03 Apr 2020
Contributed by Lukas
With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...
Supporting Technology for Application Security with Rapid7
03 Apr 2020
Contributed by Lukas
New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable ...
Finding Better Methods to Address Application Security with Rapid7
03 Apr 2020
Contributed by Lukas
New software code is released almost as fast as new ideas are conceived in the tech industry. While this growth is necessary, it makes web application...