Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford.
|
May 07, 2024 |
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]
|
May 06, 2024 |
Bonus: Examining the current state of security orchestration. [CyberWire-X]
|
Jan 15, 2024 |
Veterans Day Special.
|
Nov 12, 2023 |
Best practices for MITRE ATT&CK(R) mapping.
|
Aug 26, 2023 |
Cybersecurity risk forecasting.
|
Aug 21, 2023 |
Distributed Denial of Service prevention: Current state.
|
Aug 14, 2023 |
Quantum computing: A threat to asymmetric encryption.
|
Aug 05, 2023 |
First principle strategies with CJ Moses.
|
Jul 31, 2023 |
Zero trust in an app centric world with Okta.
|
Jun 03, 2023 |
Bonus: Memorial Day special.
|
May 29, 2023 |
Cybersecurity moneyball: First principles applied to the workforce gap.
|
May 22, 2023 |
Bonus Episode: 2023 Cybersecurity Canon Hall of Fame Inductee: Superforecasting: The Art and Science of Prediction by Dr Phil Tetlock and Dr Dan Gardner.
|
Apr 26, 2023 |
Bonus: 2023 Cybersecurity Canon Hall of Fame inductee: This Is How They Tell Me the World Ends by Nicole Perlroth.
|
Apr 25, 2023 |
Bonus: 2023 Cybersecurity Canon Hall of Fame inductee: "The Hacker and the State" by Ben Buchanan.
|
Apr 24, 2023 |
Resilience Case Study: Chaos Engineering.
|
Mar 13, 2023 |
Resilience Case Study: Colonial Pipeline attacks of 2021 (Cyber Sandtable).
|
Mar 06, 2023 |
Intelligence sharing: A Rick the Toolman episode.
|
Feb 27, 2023 |
Software Defined Perimeter (SDP): A Rick the Toolman episode.
|
Feb 13, 2023 |
Two-factor authentication: A Rick the Toolman episode.
|
Feb 06, 2023 |
Single Sign-On: A Rick the Toolman episode.
|
Jan 30, 2023 |
A Rick the Toolman Episode on the current state of SBOMs.
|
Jan 23, 2023 |
Andy Greenberg Interview: Tracers in the Dark.
|
Jan 16, 2023 |
History of Infosec: a primer.
|
Jan 09, 2023 |
Security infrastructure as code.
|
Dec 19, 2022 |
Kill chain models.
|
Dec 12, 2022 |
Vulnerability Management: An essential tactic for zero trust from the Rick the Toolman Series.
|
Dec 05, 2022 |
Cyber sand table series: 2014 OPM hack.
|
Nov 28, 2022 |
Pt 2 – Supply chains around the Hash Table.
|
Nov 21, 2022 |
Pt 1 – Supply chains.
|
Nov 14, 2022 |
Pt 2 – Students of the game: What are the Hash Table’s go-to information sources for 2022?
|
Nov 07, 2022 |
Pt 1 – Students of the game: What are your go-to information sources for 2022?
|
Oct 31, 2022 |
Pt 2 – Mitre ATT&CK: from the Rick the Toolman Series.
|
Oct 17, 2022 |
Pt 2 – XDR: from the Rick the Toolman Series.
|
Oct 10, 2022 |
Pt 1 – XDR: from the Rick the Toolman Series.
|
Oct 03, 2022 |
Pt 1 – Introducing Rick the Toolman Series: Mitre ATT&CK.
|
Sep 26, 2022 |
Introducing the cyberspace sand table series: The DNC compromise.
|
Sep 19, 2022 |
Security compliance around the Hash Table.
|
Sep 12, 2022 |
Security compliance and cybersecurity first principles.
|
Sep 05, 2022 |
Adversary playbooks around the Hash Table.
|
Aug 22, 2022 |
Adversary playbooks and cybersecurity first principles.
|
Aug 15, 2022 |
Orchestrating the security stack around the Hash Table.
|
Aug 08, 2022 |
Orchestrating the security stack and cybersecurity first principles.
|
Aug 01, 2022 |
Enterprise backups around the Hash Table.
|
Jul 25, 2022 |
Enterprise backups and cybersecurity first principles.
|
Jul 18, 2022 |
Enterprise encryption around the Hash Table.
|
Jul 11, 2022 |
Enterprise encryption and cybersecurity first principles.
|
Jul 04, 2022 |
CxO professional development.
|
Jun 27, 2022 |
How to buy security products.
|
Jun 20, 2022 |
New CISO responsibilities: supply chain.
|
Jun 13, 2022 |
New CISO responsibilities: identity.
|
Jun 06, 2022 |
New CISO responsibilities: IoT.
|
May 30, 2022 |
Security in different verticals: Energy.
|
May 23, 2022 |
Security in different verticals: Healthcare.
|
May 16, 2022 |
Security in different verticals: Finance.
|
May 09, 2022 |
Third party cloud platforms around the Hash Table.
|
May 02, 2022 |
Third party cloud platforms and cybersecurity first principles.
|
Apr 25, 2022 |
Google Cloud Platform around the Hash Table.
|
Apr 18, 2022 |
Google Cloud Platform and cybersecurity first principles.
|
Apr 11, 2022 |
Amazon AWS around the Hash Table.
|
Apr 04, 2022 |
Amazon AWS and cybersecurity first principles.
|
Mar 28, 2022 |
Microsoft Azure around the Hash Table.
|
Mar 21, 2022 |
Microsoft Azure and cybersecurity first principles.
|
Mar 14, 2022 |
SolarWinds through a first principle lens: around the Hash Table.
|
Mar 07, 2022 |
SolarWinds through a first principle lens.
|
Feb 28, 2022 |
CISO evolution - around the Hash Table.
|
Feb 07, 2022 |
CISO evolution.
|
Jan 31, 2022 |
SOAR - around the Hash Table.
|
Jan 24, 2022 |
SOAR - a first principle idea.
|
Jan 17, 2022 |
Securing containers and serverless functions: around the Hash Table.
|
Jan 10, 2022 |
Securing containers and serverless functions.
|
Jan 03, 2022 |
SD-WAN: around the Hash Table.
|
Dec 27, 2021 |
SD-WAN: What’s the big deal for security leadership?
|
Dec 20, 2021 |
Season 2 wrap.
|
Nov 15, 2021 |
Red team blue team operations: around the Hash Table.
|
Nov 08, 2021 |
Red team, blue team operations: a first principle idea.
|
Nov 01, 2021 |
Identity Management: around the Hash Table.
|
Oct 25, 2021 |
Identity Management: a first principle idea.
|
Oct 18, 2021 |
Data loss protection: around the Hash Table.
|
Oct 11, 2021 |
Data loss protection: a first principle idea.
|
Oct 04, 2021 |
Incident response: around the Hash Table.
|
Sep 27, 2021 |
Incident response: a first principle idea.
|
Sep 20, 2021 |
Security operations centers: around the Hash Table.
|
Sep 13, 2021 |
A CSO's 9/11 Story: CSO Perspectives Bonus.
|
Sep 11, 2021 |
Security operations centers: a first principle idea.
|
Sep 06, 2021 |
Cybersecurity first principles: end of season summary.
|
Jul 12, 2021 |
Cybersecurity first principles: Intelligence operations.
|
Jul 05, 2021 |
Cybersecurity first principles: Risk assessment.
|
Jun 28, 2021 |
Cybersecurity First Principles: DevSecOps.
|
Jun 21, 2021 |
Cybersecurity First Principles: Resilience.
|
Jun 14, 2021 |
Cybersecurity First Principles: Intrusion kill chains.
|
Jun 07, 2021 |
Cybersecurity First Principles: Zero trust.
|
May 31, 2021 |
Cybersecurity First Principles.
|
May 24, 2021 |
Dark web and TOR: What kind of intelligence can you find there?
|
May 17, 2021 |
Metrics and risk: All models are wrong, some are useful.
|
May 10, 2021 |
Four cybersecurity novels to distract you from the current zombie apocalypse.
|
May 03, 2021 |
Alexa, are you actually self-aware? (And, does it matter?)
|
Apr 26, 2021 |
Your security stack is moving: SASE is coming.
|
Apr 19, 2021 |
Introducing CSO Perspectives
|
Apr 14, 2021 |