Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Security Strategist

Technology Business News

Episodes

Showing 201-225 of 225
«« ← Prev Page 3 of 3

Navigating a crisis and the benefits of Zero Trust with Infoblox

05 Jan 2021

Contributed by Lukas

The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new ...

The Business Balancing Act – User Experience and Security with Auth0

22 Dec 2020

Contributed by Lukas

For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solut...

The use of external threat intelligence for proactive IT security with IntSights

08 Dec 2020

Contributed by Lukas

Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software v...

Understanding the current state of SOAR and its future with Swimlane

24 Nov 2020

Contributed by Lukas

Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep...

IT Security Policy Management and Automation with FireMon

10 Nov 2020

Contributed by Lukas

As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across al...

Application Security in the age of DevSecOps with WhiteSource

27 Oct 2020

Contributed by Lukas

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surr...

Optimising Application Security with Contrast Security

13 Oct 2020

Contributed by Lukas

Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they ...

Preventing Credential Stuffing Attacks with Shape Security

03 Apr 2020

Contributed by Lukas

Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generatio...

Balancing Privacy and IT Security with Zscaler

03 Apr 2020

Contributed by Lukas

Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – a...

Secure Access in the Age of Zero Trust Networking with Pulse Secure

03 Apr 2020

Contributed by Lukas

Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees ...

Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan

03 Apr 2020

Contributed by Lukas

Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and freq...

Threat Detection, Prevention, and Response with Blackberry Cylance

03 Apr 2020

Contributed by Lukas

Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to busi...

Automated Protection Against Common Vulnerabilities and Exposures with Sixgill

03 Apr 2020

Contributed by Lukas

Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a ...

Social and Digital Endpoint with SafeGuard Cyber

03 Apr 2020

Contributed by Lukas

Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. H...

Continuous Controls Monitoring for Cybersecurity with Panaseer

03 Apr 2020

Contributed by Lukas

The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor...

Securing the DevOps Process with Capsule8

03 Apr 2020

Contributed by Lukas

The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications ...

The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace

03 Apr 2020

Contributed by Lukas

Cybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous...

Cybersecurity Responding to Demand with SecureData

03 Apr 2020

Contributed by Lukas

Assessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more cha...

New Risks Arising for Businesses Through Increased Digitisation with RSA

03 Apr 2020

Contributed by Lukas

The scope of digitisation and the speed of adoption has increased rapidly in the last few decades. Virtually every aspect of any business operation fe...

The role backup and recovery tools can play in enhancing IT security with Unitrends

03 Apr 2020

Contributed by Lukas

Security covers every aspect of IT infrastructure and usage, to ensure the protection of users, data and business processes. Backup and recovery tools...

Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame

03 Apr 2020

Contributed by Lukas

With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...

Part 2: What’s Next for Endpoint Security? with Endgame

03 Apr 2020

Contributed by Lukas

With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...

Part 1: How Endpoint Security Got To Now? with Endgame

03 Apr 2020

Contributed by Lukas

With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking f...

Supporting Technology for Application Security with Rapid7

03 Apr 2020

Contributed by Lukas

New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable ...

Finding Better Methods to Address Application Security with Rapid7

03 Apr 2020

Contributed by Lukas

New software code is released almost as fast as new ideas are conceived in the tech industry. While this growth is necessary, it makes web application...

«« ← Prev Page 3 of 3