HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Defense in Depth: When Red Teams Break Down

What happens when red team engagements go sideways? The idea of real world testing of your defenses sounds great, but how do you close...

Defense in Depth: What Cyber Pro Are You Trying to Hire?

Do companies hiring cybersecurity talent even know what they want? More and more we see management jobs asking for engineering skills, and even CISO...

Defense in Depth: Junior Cyber People

There are so few jobs available for junior cybersecurity professionals. Are these cyber beginners not valued? Or are we as managers not creating the...

Defense in Depth: Trusting Security Vendor Claims

Do security vendors deliver on their claims and heck, are they even explaining what they do clearly so CISOs actually know what they're buying? Check...

Topic Takeover: API Security

When we set out on a "Topic Takeover" program, our goal is to generate a ton of content, across multiple media, in one topic...

Defense in Depth: How Vendors Should Approach CISOs

"How do I approach a CISO?" It's the most common question I get from security vendors. In fact, I have another podcast dedicated to...

Best Moments from “API Security” Episode of Defense in Depth

If you haven't had a chance to listen to the "API Security" episode of Defense in Depth. Watch this short three-minute clip highlighting three of the...

Defense in Depth: Secure Access

What is the Holy Grail of secure access? There are many options, all of which are being strained by our new work from home...

Defense in Depth: InfoSec Fatigue

Have we reached peak InfoSec fatigue? Revolving CISOs and endless cyber recruitment OR the fact that we're spending more money to reduce even greater...

Defense in Depth: Securing a Cloud Migration

You're migrating to the cloud. When did you develop your security plan? Before, during, or after? How aware are you and the board of...

Defense in Depth: API Security

APIs are gateways in and out of our kingdom and thus they're also great access points for malicious hackers. How the heck do we...

Defense in Depth: Shared Threat Intelligence

We all know that shared intelligence has value, yet we're reticent to share our threat intelligence. What prevents us from doing it and what...

Defense in Depth: Drudgery of Cybercrime

Why does the press persist on referring to all cyber breaches as sophisticated attacks? Is it to make the victim look less weak, or...

Defense in Depth: Security Budgets

How do you calculate a security budget? Is it a percentage of the IT budget? Something else? And why does it grow so drastically...

Defense in Depth: Role of the BISO

What is a business information security officer or BISO? Do you need one? Is it just an extension of the CISO or is it...