HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Defense in Depth: How to Think Like a Cybercrook

"If you want to catch a cybercrook, you need to think like one." But how do you actually go about thinking like a cybercriminal?...

Defense in Depth: Building a Data-First Security Program

Could you build a data-first security program? What would you do if you focused your security program on just the asset? Check out this post for...

Defense in Depth: Offensive Security

Offensive security or "hacking back" has always been seen as either unethical or illegal. But now, we're seeing a resurgence in offensive security solutions....

Defense in Depth: When Vendors Pounce on New CISOs

A security professional announces a new position as CISO. As a vendor you see this as good timing to try a cold outreach to...

Defense in Depth: Building a Cybersecurity Culture

How do you begin building a cybersecurity culture for the whole company? And, more importantly, how do you maintain that? Check out this post for the discussion...

Defense in Depth: How to Pitch a Security Analyst

You're a security vendor and you've got a short briefing with a security analyst from a research firm. What do you want to get...

Defense in Depth: Is Your Data Safer in the Cloud?

We've heard this debate for years. Which computing environment is easier to protect your sensitive data: public cloud or on premise? Check out this...

Defense in Depth: What Should We Stop Doing in Cybersecurity?

Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing to get back some time?...

Defense in Depth: DDoS Solutions

How seamless are Distributed Denial of Service or DDoS solutions today? If you get a denial of service attack, how quickly can these solutions...

Defense in Depth: Making Cybersecurity Faster and More Responsive

Knowing is only one-third the battle. Another third is responding. And the last third is responding quickly. It's not enough to just have the...

Defense in Depth: Promises of Automation

Automation was supposed to make cybersecurity professionals' lives simpler. And it was supposed to solve the talent shortage. Has any of that actually happened? Check...

Defense in Depth: When Social Engineering Bypasses Our Cyber Tools

Your tools can only handle so much defense when it comes to social engineering attacks. What types of social engineering can’t a rule set...

Defense in Depth: How Can We Simplify Security?

Why is cybersecurity becoming so complex? What is one thing we can do, even if it's small, to head us off in the right...

Defense in Depth: Convergence of Physical and Digital Security

Security convergence is the melding of all security functions from physical to digital and personal to business. The concept has been around for 17...

Defense in Depth: How Do You Measure Cybersecurity Success?

In most jobs there's often a clear indicator if you're doing a good job. In security, specifically security leadership, it's not so easy to...