HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Defense in Depth: How Do We Turn the Tables Against the Adversaries?

If we're going to turn the tables against our adversaries, everything from our attitude to our action needs to change to a format where...

Defense in Depth: Ageism in Cybersecurity

Is it too much experience? Is it that they're difficult to work with? Do they want too much money? Will they not be motivated?...

Defense in Depth: Proactive Vulnerability Management

How do we turn the tide from reactive to proactive patch management? Does anyone feel good about where they are with their own patch...

Defense in Depth: Why is Security Recruiting So Broken?

What role should HR play in the hiring process of cybersecurity candidates? Many candidates feel they're being inappropriately filtered out before a knowledgeable security...

Defense in Depth: How to Be a Vendor CISOs Love

The CISO Series launched because of a frustration between the relationships of security practitioners and vendors. But practitioners DO have good relationships with vendors....

Defense in Depth: The “Are We Secure?” Question

When a senior person at your company asks you, "Are we secure?" how should you respond? Check out this post for the basis for our conversation on this...

Defense in Depth: Ransomware Kill Chain

What are the tell tale signs you've got ransomware before you receive the actual ransomware threat? Check out this post and this post for the basis for...

Defense in Depth: Can Technology Solve Phishing?

Technology has been a significant player in reducing phishing, but can it truly solve it? Will we always have to rely on humans to...

Defense in Depth: Convergence of SIEM and SOAR

SIEM tools that ingest and analyze data are ubiquitous in security operations centers. But just knowing what's happening in your environment is not enough....

Defense in Depth: Cybersecurity Is Not Easy to Get Into

Yes, we want more people in cybersecurity. And the lure of great pay is definitely there. But just because there's a great want for...

Defense in Depth: Preventing Ransomware

What is the most critical step to preventing ransomware? Security professionals may be quick to judge users and say it's a lack of cyberawareness....

Defense in Depth: Managing Lateral Movement

For four years in a row, Verizon's DBIR, has touted compromised credentials as the top cause of data breaches. That means bad people are...

Defense in Depth: First Steps as a CISO

You've just joined a company as CISO, what's the very first step you would take to improve the security posture of your new company? Check...

Defense in Depth: How Does Ransomware Enter the Network?

How is ransomware getting into your network? Is the path direct, like via email, or does it take a more circuitous route? Check out this post and...

Defense in Depth: What’s the Value of Certifications?

Why should security professionals get certifications? Do they actually teach you what you need to know to solve cybersecurity challenges? OR do they act...