HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

How Must Processes Change to Reduce Risk?

What do we need to do to fix our processes to truly reduce risk and vulnerabilities? Check out this post for the discussion that is...

Reputational Damage from Breaches

Security professionals talk a lot about the reputational damage from breaches. And it seems logical, but major companies still do get breached and their...

Do RFPs Work?

Do RFPs or request for proposals work as intended? It seems they're loaded with flaws. Yet for some organizations who must follow processes, they...

Successful Cloud Security

What are the moves we should be making in the cloud to improve our security? What constitutes a good cloud security posture? Check out this...

How Should Security Vendors Engage With CISOs?

One CISO has had enough of the security vendor marketing emails and cold sales calls. He's blocking them all. But it's not a call...

Gartner Created Product Categories

Do we really need more categories of security products? Every new Gartner magic quadrant complicates the marketplace but at the same time helps us...

How to Always Make a Business Case for Security

How can security leaders and how do they go about matching business case to every security action you want to take? Is this the...

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

Security tools are supposed to do a job. Either they need to alert you, protect you, or remediate an issue. But they don't always...

What We Love About Working in Cybersecurity

We talk a lot on this show about what makes cybersecurity such a hard job, yet there are so many people who are in...

Security That Accounts for Human Fallibility

We expect our users to be perfect security responders even when the adversaries are doing everything in their power to trick them. These scams...

Why YOU Should Be Your Company’s Next CISO

How do you make the argument that your company needs a CISO, and that YOU should be that leader? What do you need to...

How to Become a CISO

How do you become a CISO? It doesn't follow a linear pattern as many other professions. There are many different paths and there are...

Can You Build a Security Program on Open Source?

What would it take to build your entire security program on open source software, tools, and intelligence? Check out this post for the discussion that is...

Third Party Risk vs. Third Party Trust

Businesses grow based on trust, but they have to operate in a world of risk. Even cybersecurity operates this way, but when it comes...

How Can We Improve the Cyber Sales Cycle?

The cybersecurity sales process is so terribly inefficient. And everyone, the targets and cybersecurity leaders, are losing valuable time because of that inefficiency. Where...