Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Certifying secure access service edge solutions

Certifying secure access service edge solutions

In this episode of The Security Podcasts featuring Pascal Menezes, CTO at MEF, we discuss the importance of certifying secure access service edge (SASE) solutions. “At the end of the day, what we want to assure is that that these SASE clouds are really holding up to what they’re saying they can do,” Menezes states. “What I think is important is to get everybody into the boat, racing to the top, racing to get the…

Read More

RATs in the tunnel: Uncovering the cyber underworld.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

Cybersecurity at the Paris Summer Olympics

Cybersecurity at the Paris Summer Olympics

In this episode of The Security Podcasts featuring Mark Manglicmot, SVP of Security Services at Arctic Wolf, we discuss how individuals and businesses can defend against cyber threats during the Olympics.  “For this year’s Olympics specifically, the risks of AI being manipulated by bad actors is increasingly high and a new threat for this Olympics compared to the past with the emergence of the technology. This is why individuals, athletes, administrators, coaches and anybody else attending…

Read More

Operation Endgame: The ultimate troll patrol.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

Risk management and mobile devices

Risk management and mobile devices

In this episode of The Security Podcasts featuring Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, we discuss what organizations can do to manage mobile device risks. “A lot of the conversations that we have, most people are under the assumption that having a mobile device management — or some kind of management software on their mobile device — will stop all of these various different threats that we see today. Whether it’s…

Read More
1 2 3 5