The Security Strategist

By EM360Tech

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by EM360Tech

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 5
Reviews: 0
Episodes: 219

Description

With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively. Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.

Episode Date
Can Real-Time Identity Governance Replace Access Reviews for Good?
Apr 30, 2026
Non-Human Identities and Agentic AI: The New Frontier in Identity Security
Apr 27, 2026
How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?
Apr 21, 2026
FedRAMP 20x: The Future of Compliance, Trends, and Best Practices
Apr 16, 2026
Why Patch Management Remains the Most Annoying Problem in IT Security
Apr 10, 2026
The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools
Apr 09, 2026
Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy
Apr 07, 2026
Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism
Apr 01, 2026
Democratising Cybercrime: How AI is Changing Enterprise Security
Mar 31, 2026
Cyber Resilience in Microsoft 365: What Security Leaders Must Know
Mar 30, 2026
Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?
Mar 24, 2026
Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?
Mar 20, 2026
Are You Testing Cyber Recovery or Just Hoping Your Backups Work
Mar 16, 2026
Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do
Mar 11, 2026
How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business
Feb 24, 2026
Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience
Feb 24, 2026
From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026
Feb 24, 2026
Are CISOs Blind to the Biggest Cloud Attack Surface?
Feb 24, 2026
The Human Factor in Cybersecurity: Behavioural Interventions That Work
Feb 24, 2026
Securing AI-Driven Development in Modern Enterprises
Feb 23, 2026
Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?
Feb 23, 2026
How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
Feb 16, 2026
How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
Feb 05, 2026
Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?
Feb 04, 2026
From Data to Insight: How Enterprises Are Making IoT Secure and Actionable
Jan 30, 2026
Human-Led, AI-Driven: The Next Chapter of Security Operations
Jan 29, 2026
Why Are Vulnerability Backlogs Still Growing Despite Better Detection?
Jan 28, 2026
What Happens to API Security When AI Agents Go Autonomous?
Jan 16, 2026
Why AI Agents Demand a New Approach to Identity Security
Dec 23, 2025
Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
Dec 23, 2025
From IoT to AIoT: Operational and Security Challenges for Modern Enterprises
Dec 22, 2025
Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally
Dec 19, 2025
How Can MSPs Move From Defense to Full Cyber Resilience?
Dec 15, 2025
What If We Could Fix Vulnerabilities Faster Than We Find Them?
Dec 15, 2025
Can Identity Security Close the AI Governance Gap?
Dec 10, 2025
EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?
Dec 08, 2025
Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM
Nov 25, 2025
How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
Nov 19, 2025
Is Current DLP Failing Data Security in the Age of Generative AI?
Nov 18, 2025
The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity
Nov 10, 2025
Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI
Nov 07, 2025
How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?
Nov 06, 2025
Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security
Oct 29, 2025
Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can't Secure Agentic AI
Oct 15, 2025
AI-Powered Scam Factories: The Industrialisation of Fake Shops & Online Fraud
Oct 14, 2025
Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?
Oct 01, 2025
Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence
Oct 01, 2025
What Does the Rise of Agentic AI Mean for Traditional Security Models?
Sep 30, 2025
Container Security Uncovered: Lessons from NIST SP 800-190
Sep 25, 2025
AI and the New Age of Cyber Threats
Sep 23, 2025
How to Build a Secure Development Workflow in an Era of AI?
Sep 19, 2025
How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges
Sep 10, 2025
Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary
Sep 09, 2025
Phishing-Resistant Authentication: A Strategic Imperative for CISOs
Sep 04, 2025
Is Your Workforce Ready for AI-Driven Cyber Threats?
Sep 04, 2025
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
Aug 01, 2025
How Can Global Marketplaces Master Payment Security and Combat Fraud?
Jul 29, 2025
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
Jul 07, 2025
Why Fraud Prevention Silos Are Holding Your Business Back
Jun 26, 2025
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
Jun 23, 2025
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
May 29, 2025
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
May 28, 2025
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
May 21, 2025
The Never-Ending Chess Game in Personnel Security
May 16, 2025
Beyond The App Store: Cloud Marketplace Security
May 16, 2025
Data Backups: The Digital Safety Deposit Box
May 15, 2025
DDoS Demystified: Understanding the Threat
May 15, 2025
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
May 01, 2025
Can You Afford to Ignore Exploitability?
Apr 30, 2025
From Peacetime to Wartime: Is Your Cloud Secure?
Apr 28, 2025
How to Streamline IT Operations and Enhance Security with RMM and Automation
Apr 24, 2025
Can You Stop an API Business Logic Attack?
Apr 17, 2025
The Critical Role of MDM in Safeguarding Dedicated Devices
Mar 25, 2025
Meeting of the Minds: State of Cybersecurity in 2025 Part II
Mar 25, 2025
Why Cyber Needs to Rebrand from a Boys Club
Mar 20, 2025
Reducing Risk with Effective Exposure Management in Enterprise Tech
Mar 19, 2025
The Evolving Cyber Threat Space: A Geopolitical Perspective
Feb 20, 2025
Diversity in Cybersecurity: A Key to Innovation
Feb 12, 2025
Is AI and Zero Trust the Future of Cyber Warfare?
Feb 07, 2025
Meeting of the Minds: State Of Cybersecurity in 2025
Feb 06, 2025
Navigating Cybersecurity: Insights from Jim Liddle
Jan 20, 2025
Unlocking the Power of APIs in AI
Jan 15, 2025
The AI Shift: Transforming Roles and Securing IT Systems
Jan 08, 2025
Unified Defences: Why CDR Matters
Dec 18, 2024
Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve
Dec 18, 2024
Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution
Dec 09, 2024
The Cyber Game: Simulations, Ranges, and Digital Twins
Dec 04, 2024
Why Tracking Your Digital Risk is a Big Deal
Dec 02, 2024
The Psychology of Security: Empowering People to Protect
Nov 27, 2024
How do Hackers Collect Intelligence on their Victims?
Nov 18, 2024
Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs
Nov 13, 2024
Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience
Nov 06, 2024
Courage & Resilience: Bringing FBI Grit to Cybersecurity
Nov 06, 2024
Ransom-Repeat: How to Stop Funding Your Favorite Hackers!
Oct 23, 2024
The Innovation Paradox: Security and Productivity in a Regulatory World
Oct 16, 2024
Ransomware: A Battle for Cyber Security
Oct 16, 2024
Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know
Oct 16, 2024
Hackers: Heroes vs Villains – The Code Wars
Oct 14, 2024
Identity - a quick win in your Zero Trust roadmap
Oct 10, 2024
Infiltration Insights: Red Team Operations
Oct 09, 2024
AI and Data Security: How to Protect What’s Powering the Future
Oct 04, 2024
Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys
Sep 26, 2024
Neural Networks at Risk: AI and Cyber Threats
Sep 25, 2024
Authenticating Users with Traditional SSO is Not Enough
Sep 20, 2024
SCION: The Future of Critical Infrastructure Defence
Sep 17, 2024
How is Proactive CDR Revolutionising Cloud Security
Sep 16, 2024
Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management
Sep 11, 2024
Cutting Through the Noise: Redefining Detection and Response With Secureworks
Sep 04, 2024
What Would 1% Do to Your Business: ML for Optimal Security Strategies
Aug 23, 2024
Rethinking Security in the Age of Zero Trust
Aug 21, 2024
Zero Trust Security: Mastering the Weakest Link
Aug 14, 2024
Automated Network Pentesting: Your Secret Weapon in Cybersecurity
Aug 09, 2024
Cybersecurity Automation: Cutting Through the Manual Clutter
Aug 05, 2024
Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance
Jul 31, 2024
Improv a Secret Weapon Against Cyber Threats
Jul 31, 2024
Why the Cybersecurity Industry Needs Podcasts
Jul 24, 2024
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
Jul 03, 2024
Preventing Account Takeovers in Cloud Applications
Jul 02, 2024
Guardz: Empower MSPs to Secure & Insure Small Businesses
Jun 18, 2024
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
Jun 17, 2024
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
Jun 14, 2024
Tackling SOC Analyst Burnout
Jun 10, 2024
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
May 28, 2024
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
May 20, 2024
Palo Alto Networks: The State of SOC Platformization
May 17, 2024
HID Global: Leading Through Challenges of Hospital Worker Violence
May 10, 2024
The Role of Generative AI in Red Canary's Security Evolution
May 09, 2024
The Role of Generative AI in Red Canary's Security Evolution
May 09, 2024
Cyera: The Future of Data Security in the Age of Artificial Intelligence
Apr 11, 2024
Beyond the Firewall: How Censornet Secures the Modern Enterprise
Mar 27, 2024
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
Mar 23, 2024
Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices
Mar 18, 2024
Radware: Why You Need Advanced Threat Intelligence
Mar 15, 2024
Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO
Mar 12, 2024
Pentera: Automated Security Validation and Empowering Pen Testing Teams
Feb 19, 2024
Zero Networks: The Problem with VPNs
Feb 14, 2024
Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options
Feb 06, 2024
Thoropass: Fixing the Broken Audit Process
Jan 31, 2024
CloudSEK: The Future of Software Supply Chain Security
Jan 30, 2024
Radware: Moving From Responsive Protection to Proactive Protection
Jan 24, 2024
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Nov 30, 2023
Radware: 360 Application Protection and Why Companies Need It
Nov 15, 2023
Huntress: Doing More With Less in Your Cybersecurity Strategy
Nov 14, 2023
Savvy: SaaS Identity Discovery and Visibility
Nov 13, 2023
Cyera: Why Data Defence is so Difficult in the TikTok Era
Nov 09, 2023
Cyera: How Generative AI is Driving Investments in Data Security
Nov 06, 2023
Zero Networks: We’re Sick of Zero Trust Too!
Oct 31, 2023
Blumira: Choosing the Right XDR Strategy In The Financial Industry
Oct 26, 2023
Huntress: The Future of Cybersecurity Leadership
Oct 25, 2023
Cyera: Revolutionising Data Security for the Cloud Era
Oct 10, 2023
CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence
Aug 21, 2023
Salvador Technologies: The Art of Cyber Attack Recovery
Aug 04, 2023
TrustArc: The Evolution of Privacy Laws
Aug 04, 2023
Red Sift: Brand Protection is Key for Your Security Strategy
Jun 29, 2023
ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity
Jun 08, 2023
Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success
Jun 06, 2023
Rapid7: Scaling Cybersecurity Into a Business Process
May 31, 2023
BlackFog: DLP is Dead - Long Live Data Exfiltration!
May 31, 2023
HID Global: Physical Identity Challenges in the Healthcare Industry
May 09, 2023
TrustArc: Effectively Managing Third-Party Risk
Apr 21, 2023
Blumira: Difficulties SMEs Face with Cybersecurity
Apr 21, 2023
Radware: Understanding Supply Chain Attacks and Client Side Protection
Mar 20, 2023
Honeycomb: Measuring the Success of an Incident Response Program
Mar 02, 2023
Keyfactor: Why You Need to Care About Machine Identity
Nov 21, 2022
Radware: Bot Mitigation is Key for Application Protection
Nov 14, 2022
Egnyte: Keeping Up With The Next Generation of Data Privacy
Oct 27, 2022
Beyond Identity: Software Supply Chain Attacks and the Best Defence
Oct 06, 2022
Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust
Sep 23, 2022
Omada: The Pitfalls of IGA Deployments
Sep 23, 2022
HID Global: Why Authentication is Still Such an Issue
Aug 02, 2022
Anomali: Building a Secure Framework with XDR and MITRE ATTACK
Jul 08, 2022
Censys: The World of Attack Surface Management
May 30, 2022
Calamu: The Next Generation of Data Protection
May 27, 2022
Darktrace: The Fast and Furious Nature of Cybersecurity
May 19, 2022
Rapid7: How to Swiftly Respond to Modern Cyber Threats
May 18, 2022
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain
May 17, 2022
Sophos: The World of Cyber Insurance
May 10, 2022
CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange
May 03, 2022
Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction
Apr 13, 2022
Technimove: The Science Behind Cyber Security & Cyber Resilience
Mar 28, 2022
GitGuardian: Secrets in the Source Code Need Protection
Mar 25, 2022
Testing Application Security Challenges in 2022
Feb 02, 2022
Quality Automotive Products in an Age of Cyber Crime
Nov 24, 2021
Intercepting Attackers with Deceptive Technology
Nov 03, 2021
Cybersecurity: The Orchestration and Automation of Processes
Oct 20, 2021
Building Connections in Your Cybersecurity Job
Sep 08, 2021
Best Software Security Practices for 2021
Aug 18, 2021
Top Enterprises are Normalising Data Leaks
Jul 21, 2021
Analysing the Top Indicators of Behaviour
Jul 02, 2021
What Cybersecurity Experts Get Wrong
Jun 16, 2021
Social Engineering: Psychological Warfare in the Cyberspace
May 18, 2021
Building resiliency through disruption with RSA Security
Feb 15, 2021
Secure remote working practices with Menlo Security
Feb 01, 2021
How inbox defence protects against increasingly sophisticated attacks with Barracuda
Jan 18, 2021
Navigating a crisis and the benefits of Zero Trust with Infoblox
Jan 04, 2021
The Business Balancing Act – User Experience and Security with Auth0
Dec 21, 2020
The use of external threat intelligence for proactive IT security with IntSights
Dec 07, 2020
Understanding the current state of SOAR and its future with Swimlane
Nov 23, 2020
IT Security Policy Management and Automation with FireMon
Nov 09, 2020
Application Security in the age of DevSecOps with WhiteSource
Oct 26, 2020
Optimising Application Security with Contrast Security
Oct 12, 2020
Preventing Credential Stuffing Attacks with Shape Security
Apr 03, 2020
Balancing Privacy and IT Security with Zscaler
Apr 03, 2020
Secure Access in the Age of Zero Trust Networking with Pulse Secure
Apr 03, 2020
Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan
Apr 03, 2020
Threat Detection, Prevention, and Response with Blackberry Cylance
Apr 03, 2020
Automated Protection Against Common Vulnerabilities and Exposures with Sixgill
Apr 03, 2020
Social and Digital Endpoint with SafeGuard Cyber
Apr 03, 2020
Continuous Controls Monitoring for Cybersecurity with Panaseer
Apr 03, 2020
Securing the DevOps Process with Capsule8
Apr 03, 2020
The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace
Apr 03, 2020
Cybersecurity Responding to Demand with SecureData
Apr 03, 2020
New Risks Arising for Businesses Through Increased Digitisation with RSA
Apr 03, 2020
The role backup and recovery tools can play in enhancing IT security with Unitrends
Apr 03, 2020
Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame
Apr 03, 2020
Part 2: What’s Next for Endpoint Security? with Endgame
Apr 03, 2020
Part 1: How Endpoint Security Got To Now? with Endgame
Apr 03, 2020
Finding Better Methods to Address Application Security with Rapid7
Apr 03, 2020
Supporting Technology for Application Security with Rapid7
Apr 03, 2020