Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays
Categories:
163 Episodes
-
How Can We Fix Alert Fatigue?
Published: 12/12/2024 -
Vulnerability Management ≠ Vulnerability Discovery
Published: 12/5/2024 -
Are Security Awareness Training Platforms Effective?
Published: 11/21/2024 -
The Argument For More Cybersecurity Startups
Published: 11/14/2024 -
How Are New SEC Rules Impacting CISOs?
Published: 11/7/2024 -
Managing the Risk of GenAI Tools
Published: 10/31/2024 -
Defending Against What Criminals Know About You
Published: 10/24/2024 -
Will We Ever Go Back From Work From Home?
Published: 10/17/2024 -
The Lurking Dangers of Neglected Security Tools
Published: 10/10/2024 -
When You Just Can't Take It Anymore in Cyber
Published: 10/3/2024 -
Is It Possible to Inject Integrity Into AI?
Published: 9/26/2024 -
Are Phishing Tests Helping or Hurting Our Security Program?
Published: 9/19/2024 -
Who Is Responsible for Securing SaaS Tools?
Published: 9/12/2024 -
Hiring Cyber Teenagers with Criminal Records
Published: 9/5/2024 -
What's Working With Third-Party Risk Management?
Published: 8/29/2024 -
What Triggers a CISO?
Published: 8/22/2024 -
Information Security vs. Cybersecurity
Published: 8/15/2024 -
Should Deny By Default Be the Cornerstone of Zero Trust?
Published: 8/8/2024 -
What Is a Field CISO?
Published: 8/1/2024 -
Cybersecurity Is a Communications Problem
Published: 7/25/2024
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.