HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Defense in Depth: Cyber Harassment

Whether a jilted lover or someone trying to wield their power over another, cyber harassment takes many forms and it doesn't stay in the...

Defense in Depth: CISO Series One Year Review

The CISO/Security Vendor Relationship Podcast is now more than a year old. On this episode, the hosts of both podcasts, reflect on the series...

Defense in Depth: Economics of Data

Do we understand the value of our data? Do our adversaries? And is the way we're protecting it making it too expensive for them...

Defense in Depth: Tool Consolidation

While cybersecurity professionals always want more tools, more often than not they're dealing with too many tools delivering identical services. The redundancy is causing...

Defense in Depth: Camry Security

The Camry is not the fastest car, nor is it the sexiest. But, it is one of the most popular cars because it delivers...

Defense in Depth: Amplifying Your Security Posture

In security, you never have enough of anything. But the scarcest resource are dedicated security people. When you're running lean, what are some creative...

Defense in Depth: ERP Security

For most organizations, their ERP solution holds its crown jewels. Should custom and complex applications that trade such vital customer and corporate data be...

Defense in Depth: Managing Obsolete (Yet Business Critical) Systems

Obsolete systems that are critical to your business. They're abandoned, unpatchable and unmanaged. We've all got them, and often upgrading is not an option....

Defense in Depth: Cybersecurity Hiring

Everyone needs more security talent, but what kind of talent, how specialized, and what kind of pressure is hiring requirements putting on security professionals? Check...

Defense in Depth: How CISOs Discover New Solutions

Are security professionals so burned out by aggressive cybersecurity marketing that they're giving up on discovering new and innovative solutions? What are the best...

Defense in Depth: Is the Cybersecurity Industry Solving Our Problems?

Is the cybersecurity industry solving our problems? We've got lots of new entrants. Are they doing anything new, or just doing the same thing...

Defense in Depth: Vulnerability Management

So many breaches happen through ports of known vulnerabilities. What is the organizational vulnerability in vulnerability management? Check out this post and discussion and...

Defense in Depth: Privileged Access Management (PAM)

Where does privileged access management (PAM) fit in the order of operations? Check out this post and discussion and this one for the basis of our...

Defense in Depth: Machine Learning Failures

Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation? Check out this post and discussion for...

Defense in Depth: Software Fixing Hardware Problems

As we have seen with the Boeing 737 MAX crashes, when software tries to fix hardware flaws, it can turn deadly. What are...