Behind the Scenes of Cybersecurity Media and Reporting

Behind the Scenes of Cybersecurity Media and Reporting

|
Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported ... Read More
The Commoditization of Compliance and SOC 2 With Troy Fine and Kendra Cooley

And now for something completely different: GRC Uncensored

|
We're piloting a new podcast about GRC, but not the boring parts. Let us know what you think ... Read More
How to Operationalize Your Company for Adopting Zero Trust

How to Operationalize Your Company for Adopting Zero Trust

|
Season 3, Episode 14: ThreatLocker’s Rob Allen kicks off our mini-series that digs into how companies prepare for adopting a new cybersecurity strategy such as Zero Trust ... Read More
Log4j Continues to act as Organizational Vulnerability

Log4j Continues to act as Organizational Vulnerability

|
Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries ... Read More
Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

|
Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations? ... Read More
Applying Vulnerability Management to Zero Trust: Insights from Fortra’s Tyler Reguly

Applying Vulnerability Management to Zero Trust: Insights from Fortra’s Tyler Reguly

|
Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk ... Read More
The Unstoppable Phish: A Discussion with Vivek Ramachandran

The Unstoppable Phish: A Discussion with Vivek Ramachandran

|
Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering ... Read More
Breaking Down the SMB Threat Landscape and The Value of MSPs

Breaking Down the SMB Threat Landscape and The Value of MSPs

|
Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research ... Read More
Decoding Emerging Threats: MITRE, OWASP, and Threat Intel

Decoding Emerging Threats: MITRE, OWASP, and Threat Intel

|
Season 3, Episode 8: AZT and Dr Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats ... Read More
Navigating the Ever-Changing Landscape of Cybersecurity Regulations

Navigating the Ever-Changing Landscape of Cybersecurity Regulations

|
Season 3, Episode 7: When new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary discuss navigating the latest broad-sweeping regulations ... Read More