Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays
Categories:
153 Episodes
-
Is It Possible to Inject Integrity Into AI?
Published: 9/26/2024 -
Are Phishing Tests Helping or Hurting Our Security Program?
Published: 9/19/2024 -
Who Is Responsible for Securing SaaS Tools?
Published: 9/12/2024 -
Hiring Cyber Teenagers with Criminal Records
Published: 9/5/2024 -
What's Working With Third-Party Risk Management?
Published: 8/29/2024 -
What Triggers a CISO?
Published: 8/22/2024 -
Information Security vs. Cybersecurity
Published: 8/15/2024 -
Should Deny By Default Be the Cornerstone of Zero Trust?
Published: 8/8/2024 -
What Is a Field CISO?
Published: 8/1/2024 -
Cybersecurity Is a Communications Problem
Published: 7/25/2024 -
Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?
Published: 7/18/2024 -
Telling Stories with Security Metrics
Published: 7/11/2024 -
Securing Identities in the Cloud
Published: 6/27/2024 -
How AI Is Making Data Security Possible
Published: 6/20/2024 -
What Makes a Successful CISO?
Published: 6/13/2024 -
We Want a Solution to Remediate, Not Just Detect Problems
Published: 6/6/2024 -
Recruiting from the Help Desk
Published: 5/30/2024 -
How Do We Build a Security Program to Thwart Deepfakes?
Published: 5/23/2024 -
Where Are Secure Web Gateways Falling Short?
Published: 5/16/2024 -
Understanding the Zero-Trust Landscape
Published: 5/9/2024
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.