HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

How to Level Up Your Cyber Career

Just like getting a job, advancing your career requires more than just technical skills. It requires you building relationships within your organizations, particularly with...

How CISOs Like To Be Approached By Vendors

Vendors need to reach out to CISOs, but what does a successful approach look like? Too often vendors spray and pray with outreach, rather...

How Broad Should Your Third Party Risk Management Program Go?

If third-party risk management becomes too broad, it effectively becomes worthless. But too narrow and you'll miss critical risks. So how do you strike...

Warning Signs You’re About To Be Attacked

What are the things that raise red flags that you're about to experience an attack? We know phishing is one major indicator, but what...

Do We Have to Fix ALL the Critical Vulnerabilities?

For years we've heard mantras like "patch all the things." But with limited resources, how do you actually focus your patching efforts on the...

Mitigating Generative AI Risks

As with any new technology, generative AI comes with a set of risks. So how can we address these risks to take advantage of...

Building A Cyber Strategy For Unknown Unknowns

As security professionals, we know a lot of the things we lack visibility into that can cause security issues. That alone is enough to...

Responsibly Embracing Generative AI

Businesses are walking a tightrope with generative AI. One the one hand, it's a potentially disruptive technology, and no one wants to be the...

People Are the Top Attack Vector (Not the Weakest Link)

In increasingly complex technical defenses, threat actors frequently target the human element. This makes them a top attack vectors, but are they actually the...

What’s Entry Level in Cybersecurity?

We often talk about the contradiction of seemingly entry-level security jobs requiring years of experience. But maybe that's because entry-level jobs don't actually exist. Check...

New SEC Rules for Cyber Security

The Securities and Exchange Commission issued new cyber rules. What do these new rules mean for CISOs and will they ultimately improve our cybersecurity...

The Value of RSA, Black Hat, and Mega Cyber Tradeshows

Are trade shows like RSA getting so big that there's not enough economic value for a CISO to attend? Or do these events have...

Is Remote Work Helping or Hurting Cybersecurity?

Work from home flourished during the pandemic. Many workers love it and don't want to go back. Some organizations are pushing for a return...

How to Manage Users’ Desires for New Technology

Large language models and generative AI are today's disruptive technology. This is not the first time companies just want to ban a new technology...

Cybersecurity Questions Heard Around the Kitchen Table

What do the people least in the know about cyber, want to know? What are they asking? Check out this post for the discussion that...