Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life
|
May 14, 2024 |
Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family
|
Apr 30, 2024 |
Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy
|
Apr 16, 2024 |
Reputation as a risk: understanding the security threat of harmful narratives
|
Apr 02, 2024 |
Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches
|
Mar 27, 2024 |
Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence
|
Mar 19, 2024 |
Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses
|
Mar 05, 2024 |
The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity
|
Feb 21, 2024 |
HealthTech, GAMP and 23andMe: A conversation with Stephen Ferrell, security leader in Life Sciences.
|
Feb 08, 2024 |
Secure Talk has a new host! Measuring Security and the impact of AI on Security certification.
|
Jan 20, 2024 |
Self-Sovereign Identities, Zero-Knowledge Credentials, and AI Digital Assistants
|
Aug 21, 2023 |
A Better Way to Deploy Cloud Infrastructure
|
Jul 27, 2023 |
Threat Modeling for Software Design & Development
|
Jul 24, 2023 |
Secure Remote Access with Karen Gondoly, CEO of Leostream
|
Jul 17, 2023 |
Security Technology for De-Fi Investors
|
Jul 12, 2023 |
AI Cameras, Autonomous Vehicles, and More!
|
Jun 30, 2023 |
Service Now Security Advantages
|
Jun 27, 2023 |
Multi-Chain NFT Trading, with Lasha Antadze Founder of Rarify Labs
|
Jun 21, 2023 |
The Cure for a Failing Data Privacy Strategy
|
Jun 15, 2023 |
Mobile Safety: How to Ensure You Aren't Being Tracked
|
May 24, 2023 |
Cybersecurity Risks with SaaS Applications
|
May 22, 2023 |
Engaging Your Team in Cybersecurity
|
May 11, 2023 |
Zero-Trust Content Security
|
May 08, 2023 |
API Security Challenges & Solutions
|
May 02, 2023 |
How to Select a VPN Provider
|
May 01, 2023 |
How to Implement an Effective Cloud Risk Management Strategy
|
Apr 25, 2023 |
2023 OpenText Cybersecurity Threat Report & Recommendations
|
Apr 19, 2023 |
Democratizing Data with Tim Tutt, CEO and Co-Founder of Night Shift Development
|
Apr 17, 2023 |
Data Protection as a Services with "Mr. Backup" W. Curtis Preston
|
Apr 13, 2023 |
Dez Rock, CEO of SIEMonster
|
Apr 07, 2023 |
How Software Developers use Red Teaming & White Box Audits to Improve Security and More!
|
Apr 06, 2023 |
Vendor Risk Management & Compliance in Healthcare
|
Apr 03, 2023 |
Financial Security in Chaotic Times
|
Mar 31, 2023 |
The Evolution of Identity Standards and Identity Orchestration
|
Mar 30, 2023 |
How Online Communities Can Facilitate Information Sharing to Solve IT & Security Challenges
|
Mar 28, 2023 |
Critical Device Security Strategies & Tools
|
Mar 28, 2023 |
How to Optimize Cybersecurity Training
|
Mar 24, 2023 |
The Endpoint Management Vulnerability Gap
|
Mar 23, 2023 |
Becoming an Ethical Hacker
|
Mar 21, 2023 |
How to Prevent Synthetic Identity Theft
|
Mar 20, 2023 |
Cybersecurity Breach Response & More
|
Mar 17, 2023 |
Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions
|
Mar 16, 2023 |
Building Autonomy & Trust in Distributed Engineering Teams
|
Mar 07, 2023 |
Preventing Cyber Attacks Across the Software Supply Chain
|
Mar 02, 2023 |
Security Training for Software Development Teams
|
Feb 20, 2023 |
Automating Data Discovery & Security
|
Feb 16, 2023 |
Best Practices for Cybersecurity Practitioners
|
Feb 10, 2023 |
Optimizing Cyber Threat Detection & Response
|
Feb 06, 2023 |
Cybersecurity Solutions for the Federal Government
|
Feb 01, 2023 |
Using Open Source Linux-Based Software for Identity Management
|
Jan 27, 2023 |
Optimizing the Microsoft Security Stack
|
Jan 25, 2023 |
The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups
|
Jan 20, 2023 |
Managed Security Services for Start-Ups and SMEs
|
Jan 17, 2023 |
A Vaccine Approach to IoT Device Cybersecurity
|
Jan 09, 2023 |
Chat-based Cybersecurity Education
|
Jan 03, 2023 |
Data Security Posture Management vs. Cloud Security Posture Management and more!
|
Dec 20, 2022 |
A Method for Managing Risk
|
Dec 14, 2022 |
Why Compliance Doesn't Equate to Security
|
Dec 06, 2022 |
Compliance and Cybersecurity Issues with Collaboration Platforms such as Zoom, Slack, & Teams
|
Nov 30, 2022 |
Critical Flaws in Legacy Cybersecurity Systems, with Dr. Danny Rittman
|
Nov 29, 2022 |
SMB Ransomware Trends, with Grayson Milbourne of OpenText Security Solutions
|
Nov 29, 2022 |
Cyber Threat Intelligence
|
Nov 17, 2022 |
Replacing Legacy SIEMs, Jack Naglieri CEO at Panther Labs
|
Oct 31, 2022 |
Security Awareness Training with Javvad Malik at KnowBe4
|
Oct 27, 2022 |
Cybersecurity In and Out of the U.S. Military, with Stephen Semmelroth
|
Oct 24, 2022 |
Modern Security Best Practices with George Gerchow, Chief Security Officer at Sumo Logic
|
Oct 19, 2022 |
Security Certifications as Sales Assets, with Justin Beals, CEO of Strike Graph
|
Oct 17, 2022 |
The Importance of a Comprehensive Network Asset Inventory with Huxley Barbee
|
Oct 13, 2022 |
Blockchain Bridges and More with Collin O'Brien of Rubic
|
Oct 10, 2022 |
API Security with Karl Mattson CISO at Noname Security
|
Oct 03, 2022 |
Cybersecurity Focused Hardware Destruction, with John Shegerian
|
Sep 08, 2022 |
Creating a Security Oriented Culture, with Kai Roer
|
Sep 06, 2022 |
Cloud Security Governance with Fausto Lendeborg, CEO of Secberus
|
Aug 26, 2022 |
How to Choose a VPN and more with Yegor Sak, Founder of Windscribe
|
Aug 25, 2022 |
CSIRTs, ASM 2.0, and more with Dave Monnier from Team Cymru
|
Aug 19, 2022 |
Security Risks with Open Source Software, with Steve Wilson, CPO at Contrast Security
|
Aug 10, 2022 |
How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud
|
Jul 29, 2022 |
Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro
|
Jul 21, 2022 |
Protecting Personal Data, Podcasting, and More with Adam Levin Co-Host of the What the Hack Podcast
|
Jul 18, 2022 |
How to Prevent Data Leaks Using a No-Code Platform with Yasir Ali, CEO of Polymer
|
Jul 15, 2022 |
Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security
|
Jul 06, 2022 |
CISO Best Practices and MDM Tips with Chaim Mazal, CISO at Kandji
|
Jun 17, 2022 |
Nation State Cybercrime with Investigative Journalist & Author Geoff White
|
Jun 08, 2022 |
Automated Crypto Trading Tools with Gabriele Musella, Co-Founder & CEO at Coinrule
|
May 31, 2022 |
Preventing Phygital Attacks with Will Plummer, CSO at RaySecur
|
May 16, 2022 |
Identity & Access Management, Digital IDs & More with Sushil Madhukar of TechDemocracy
|
May 13, 2022 |
Justin Beals, Founder & CEO of Strike Graph
|
May 11, 2022 |
Searchable Encryption Technology with Dan Draper, CEO & Founder of CipherStash
|
Mar 30, 2022 |
The Importance of Cyber Resilience with Kiran Vangaveti, CEO of BluSapphire Technologies
|
Mar 25, 2022 |
New Approaches to Application Security with Jeff Williams Co-Founder of Contrast Security
|
Mar 14, 2022 |
Unlimited Decentralized Financial Markets with Eric Chen, CEO of Injective Labs
|
Feb 23, 2022 |
Crypto Mining Equipment with Mason Jappa, CEO of Blockware Solutions
|
Feb 17, 2022 |
Open Source Device Management with Mike McNeil, CEO of Fleet DM
|
Feb 15, 2022 |
DeFi, CeFi, Blockchain and more with Yubo Ruan, Founder of Parallel Finance
|
Feb 03, 2022 |
Security Automation with Eoin Hinchy, CEO of Tines
|
Jan 28, 2022 |
Frances Zelazny, Co-Founder & CEO of Anonybit
|
Jan 25, 2022 |
Storage, Backup, and Recovery, with W. Curtis Preston of Druva
|
Jan 21, 2022 |
How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani
|
Jan 04, 2022 |
Chris Kline, COO & Co-Founder of Bitcoin IRA
|
Dec 15, 2021 |
Data Loss Prevention (DLP) with Rohan Sathe, CTO & Co-Founder of Nightfall
|
Dec 06, 2021 |
VPNs with Brad Hawkins, CEO of SaferNet
|
Dec 01, 2021 |
Security Managed Services with James Fair, SVP of Technical Operations at Executech
|
Nov 23, 2021 |
Application Security for Developers with Harshil Parikh, CEO of TROMZO
|
Nov 16, 2021 |
Steve Ginty, Director of Threat Intelligence at RiskIQ
|
Nov 11, 2021 |
Philippe Humeau, CEO of CrowdSec
|
Nov 08, 2021 |
Maxime Lamothe-Brassard, Founder LimaCharlie
|
Sep 29, 2021 |
Rick Jordan, Founder & CEO of ReachOut Technology
|
Aug 23, 2021 |
Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management
|
Aug 12, 2021 |
Emil Sayegh, CEO of Ntirety
|
Aug 09, 2021 |
Jonathan Moore, CTO of SpiderOak
|
Jul 20, 2021 |
Dr. Chris Spencer on the Secure Use of Passpoint, NGH, and Eavesdropping Teddy Bears!
|
Jul 07, 2021 |
Data Protection via File Level Encryption, Dimitri Nemirovsky, COO of Atakama
|
Jun 29, 2021 |
Kathleen Booth, VP of Marketing at clean.io
|
Jun 24, 2021 |
Scott Schober, CEO of Berkeley Varitronics Systems
|
Jun 17, 2021 |
Mahmoud Abdelkader, CEO and co-founder of Very Good Security
|
Jun 09, 2021 |
Santosh Devaraj, CEO of TrustGrid
|
Jun 09, 2021 |
Bruce Dahlgren, CEO of MetricStream
|
May 18, 2021 |
Dexter Caffey, CEO of Smart Eye Technology
|
May 05, 2021 |
Mark Testoni, CEO at SAP National Security Services (SAP NS2)
|
Apr 19, 2021 |
Michel Tricot, Co-Founder & CEO of Airbyte
|
Apr 13, 2021 |
Dr. Eric Cole
|
Apr 01, 2021 |
Hiram Machado on Identity Governance
|
Mar 30, 2021 |
Zaid Sabih Al Quraishi, CEO at zSecurity
|
Mar 23, 2021 |
Jim Bowers, Security Architect for TBI
|
Feb 22, 2021 |
Self-Sovereign Identity Authors Alex Preukschat & Shannon Appelcline
|
Feb 08, 2021 |
Bina Ramamurthy, Author of Blockchain in Action
|
Jan 22, 2021 |
Neil Madden, Author of API Security in Action
|
Jan 21, 2021 |
Julien Vehent, Author of Securing DevOps
|
Jan 19, 2021 |
Sedat Kapanoglu, Author of Street Coder; The Rules to Break and How to Break Them
|
Jan 07, 2021 |
Laurentiu Spilca Explain Spring Security for Java Applications
|
Jan 04, 2021 |
Rois Ni Thuama, Head of Cyber Governance at Red Sift
|
Nov 30, 2020 |
Paul Clayson, CEO of AgilePQ
|
Nov 17, 2020 |
Privacy Law Update with Attorney Cecilia Jeong
|
Nov 12, 2020 |
Thomas Kranz, Author of Making Sense of Cyber Security
|
Nov 03, 2020 |
The Ins and Outs of Azure Sentinel with Microsoft's Edward Walton
|
Oct 16, 2020 |
Kip Boyle shares advice on how best to find a cybersecurity job and "Your Cyber Path"
|
Oct 05, 2020 |
Cyber Security Education w/Gabriel Friedlander, CEO of Wizer
|
Sep 23, 2020 |
Greg Edwards, CEO of CryptoStopper on Malware Attack Detection & Prevention
|
Aug 31, 2020 |
#35 Hiram Machado, CEO of adaQuest on the Value of Network Scans
|
Aug 24, 2020 |
#34 Paul Katzoff, CEO of WhiteCanyon Software
|
Aug 20, 2020 |
Productivity & Security with Microsoft Teams
|
Jun 26, 2020 |
Jonathan Hiroshi Rossi, CEO of Saya University
|
Jun 19, 2020 |
Windows Autopilot with Christophe Koehl
|
Apr 22, 2019 |
João Couto, Director of Operations adaQuest Brazil
|
Apr 15, 2019 |
The Rise of the Virtual CISO, with Hiram Machado
|
Mar 21, 2019 |
Richard Lewis, Best Practices for Security Minded Organizations & Application Security Development
|
Mar 11, 2019 |
Edward Walton Discusses Shadow IT
|
Mar 04, 2019 |
Cecilia Jeong, Privacy Attorney
|
Feb 05, 2019 |
Kip Boyle, Founder and CEO of Cyber Risk Opportunities
|
Jan 30, 2019 |
Andrea Fisher, Global Cyber Defense Specialist at Microsoft
|
Jan 19, 2019 |
Hiram Machado, adaQuest CEO
|
Dec 27, 2018 |
Andrea Fisher Provides an Overview of Windows 10
|
Oct 01, 2018 |
Plurilock CEO Ian Paterson Talks About Post Login Authentication
|
Aug 31, 2018 |
Matt Soseman Talks About Developments with MFA, Conditional Access, Windows Hello and More!
|
Aug 28, 2018 |
Interview with Rudolph Araujo from Awake Security
|
Aug 26, 2018 |
Interview with Trusona Founder & CEO, Ori Eisen
|
Jul 27, 2018 |
Cyber Insurance - Part 2
|
Jul 09, 2018 |
Cyber Insurance - Part 1
|
Jun 22, 2018 |
#15 Interview with Zaid Al-Quraishi, Ethical Hacker and Founder of zSecurity
|
Jun 07, 2018 |
#14 Office 365 Secure Score & Security Tune-Up
|
May 30, 2018 |
#13 Multi-Factor Authentication (MFA), Conditional Access, & Passwords
|
May 25, 2018 |
A Review of GDPR, Cryptojacking, and More....
|
May 19, 2018 |
How to Get a Cybersecurity Job!
|
May 10, 2018 |
#10 Interview with Cybersecurity Consultant & Station X CEO Nathan House
|
May 02, 2018 |
#9 Interview with ISSA Puget Sound Chapter President Justin White
|
Apr 27, 2018 |
How to Successfully Integrate a Newly Acquired Company onto Your IT Platform
|
Apr 21, 2018 |
#7 Security Architect Matt Soseman
|
Apr 09, 2018 |
#6 Paul Shares His Thoughts About Taking the CISSP Exam
|
Mar 31, 2018 |
GDPR - What is it? How to prepare?
|
Mar 14, 2018 |
#4 - Where do I start?
|
Mar 09, 2018 |
Episode #3 - Threat Detection & Protection
|
Mar 01, 2018 |
Episode #2 - Data Protection
|
Feb 28, 2018 |
The Emerging Paradigm for IT Security
|
Feb 16, 2018 |