<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/the-security-strategist/" rel="self" type="application/rss+xml"/><title><![CDATA[The Security Strategist]]></title><podcast:guid>92ddfdac-26f6-5e5d-9dd5-35c592e13dbe</podcast:guid><lastBuildDate>Wed, 06 May 2026 07:26:46 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 EM360Tech]]></copyright><managingEditor>EM360Tech</managingEditor><itunes:summary><![CDATA[With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. 

“The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively.

Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.]]></itunes:summary><image><url>https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg</url><title>The Security Strategist</title><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link></image><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><itunes:owner><itunes:name>EM360Tech</itunes:name></itunes:owner><itunes:author>EM360Tech</itunes:author><description>With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. 

“The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively.

Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.</description><link>https://em360tech.com/podcasts/the-security-strategist</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Stay ahead of cyberthreats with expert insights and practical security .]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground</title><itunes:title>How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground</itunes:title><description><![CDATA[<p>Financial crime is no longer a peripheral concern for banks and fintechs; it is a defining operational challenge. The pressure to grow transaction volumes, onboard customers quickly, and keep pace with increasingly sophisticated fraud actors has placed finance and compliance teams at the very heart of business strategy. For many institutions, the question is no longer how to use artificial intelligence in their fraud detection stack, but how to use it responsibly.</p><p>In this&nbsp;<em>Security Strategist</em>&nbsp;podcast, hosted by&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>, Senior Lead Analyst at&nbsp;<a href="https://www.kuppingercole.com/" rel="noopener noreferrer" target="_blank">KuppingerCole</a>, he speaks with&nbsp;<a href="https://www.linkedin.com/in/kunal-datta/" rel="noopener noreferrer" target="_blank">Kunal Datta</a>, Chief Product Officer at&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Unit21</a>, about the changes in financial crime prevention technology and the gaps that remain in the industry.</p><h2>The role of AI in fraud detection</h2><p>For most of the past two decades, financial crime prevention operated on one of two tracks. Larger, data-rich institutions invested in machine learning models capable of identifying complex behavioural patterns across millions of transactions. Smaller players, or those entering new product categories with thin data histories, tended to rely on rules-based systems, which are explicit, human-authored logic that flags transactions meeting predefined criteria.</p><p>Both approaches have genuine strengths. Rules-based systems are auditable, easy to explain to a regulator, and quick to update when a new fraud typology emerges. Machine learning systems are far more powerful at surfacing non-obvious correlations and adapting to evolving attack patterns, but they require substantial training data and significant engineering effort to deploy.</p><p>The arrival of large language models and generative AI has introduced a third paradigm, one that is fundamentally non-deterministic. Unlike a rule that fires predictably on every run, or an ML model that produces a consistent probability score for a given feature vector, a generative AI system may reason differently across identical inputs. This has profound implications for how institutions build, test, and govern their fraud detection infrastructure.</p><h1>Balancing revenue growth and fraud risk</h1><p>Perhaps the most underappreciated tension in financial crime prevention is not technical; it is commercial. Every fraud control is also a friction point. A transaction declined as suspicious is, from the customer's perspective, simply a transaction that failed. Every false positive erodes trust, damages conversion rates, and risks losing a customer to a competitor with a more permissive onboarding flow. According to Datta:</p><p><em>“Machine learning excels at identifying complex patterns, but rules-based systems can quickly adapt to new types of fraud that humans can spot with minimal examples.”</em></p><p>This means that fraud teams are never simply optimising for fraud prevention in isolation. They are solving a constrained optimisation problem that is minimising fraud losses while simultaneously protecting revenue, preserving customer experience, and staying within the bounds of what regulators require. AI can shift that frontier, enabling more precise risk assessment that reduces both fraud and false positives simultaneously. But only if it is deployed and governed carefully.</p><h2>The future of AI in financial crime</h2><p>Looking forward, Datta sees the trajectory of&nbsp;<a href="https://hubs.li/Q04fy7RZ0" rel="noopener noreferrer" target="_blank">AI in financial crime prevention</a>&nbsp;pointing towards systems that combine the pattern-recognition power of machine learning with increasingly robust mechanisms for transparency and accountability. The goal is not to choose between a powerful AI and an explainable one — it is to build infrastructure that delivers both.</p><p>Several technical approaches are emerging to close this gap. Structured output formatting — requiring AI systems to return decisions in machine-readable formats like JSON, with explicit reasoning chains, makes it possible to audit AI behaviour at scale. Evaluation sets, which establish a curated baseline of labelled cases against which model performance is continuously benchmarked, allow institutions to detect drift and maintain defensible performance records.&nbsp;</p><p>The institutions that will lead this space are those treating AI governance not as a compliance overhead but as a competitive advantage. A well-governed AI system is faster to get regulatory approval, faster to deploy new capabilities, and more resilient when regulatory scrutiny increases.</p><p>The most striking thread in Datta's thinking is his insistence on placing financial crime prevention within a broader moral frame. Financial crime is not merely an operational risk; it is a conduit for some of the most serious harms in the world: human trafficking, modern slavery, terrorist financing, and the systematic exploitation of vulnerable people. Viewed through this lens, the deployment of better AI in financial crime prevention is not primarily a business efficiency story. It is a contribution to a more just and safer world. Datta says:</p><p><em>“AI should be viewed not only as an efficiency driver but as a tool to address broader societal issues like human trafficking and exploitation. Better detection is a moral obligation.”</em></p><p>This framing matters for how organisations think about investment in financial crime technology. If AI in fraud prevention is purely a cost centre, it will always lose budget battles to revenue-generating activities.&nbsp;</p><p>If you would like to find out more, visit:&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Unit21.ai</a>&nbsp;or read more about&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Rules vs. Machine Learning: Finding the Best of Both Worlds</a>&nbsp;by Kunal Datta.</p><p>If you are looking to strengthen how your organisation identifies and manages risk, you can request a&nbsp;<a href="https://hubs.li/Q04fy89F0" rel="noopener noreferrer" target="_blank">personalised demo with Unit21</a>.</p><h2>Takeaways</h2><ul><li>Evolution of financial crime detection over the last decade</li><li>Deterministic vs non-deterministic AI systems in fraud prevention</li><li>The role of generative AI and context engineering in compliance</li><li>Accountability and explainability in AI-driven decision making</li><li>Regulatory perspectives on AI and risk management</li></ul><br/><p>00:00 Navigating Financial Crime Prevention Challenges</p><p>02:54 The Evolution of Fraud Detection Systems</p><p>05:55 The Debate: Explainability vs. Performance in AI</p><p>08:51 Balancing Accuracy and Regulatory Expectations</p><p>12:01 Context Engineering in AI for Financial Crime</p><p>15:04 Rethinking Accountability in AI Systems</p><p>17:55 AI as a Societal Imperative in Risk and Compliance</p>]]></description><content:encoded><![CDATA[<p>Financial crime is no longer a peripheral concern for banks and fintechs; it is a defining operational challenge. The pressure to grow transaction volumes, onboard customers quickly, and keep pace with increasingly sophisticated fraud actors has placed finance and compliance teams at the very heart of business strategy. For many institutions, the question is no longer how to use artificial intelligence in their fraud detection stack, but how to use it responsibly.</p><p>In this&nbsp;<em>Security Strategist</em>&nbsp;podcast, hosted by&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>, Senior Lead Analyst at&nbsp;<a href="https://www.kuppingercole.com/" rel="noopener noreferrer" target="_blank">KuppingerCole</a>, he speaks with&nbsp;<a href="https://www.linkedin.com/in/kunal-datta/" rel="noopener noreferrer" target="_blank">Kunal Datta</a>, Chief Product Officer at&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Unit21</a>, about the changes in financial crime prevention technology and the gaps that remain in the industry.</p><h2>The role of AI in fraud detection</h2><p>For most of the past two decades, financial crime prevention operated on one of two tracks. Larger, data-rich institutions invested in machine learning models capable of identifying complex behavioural patterns across millions of transactions. Smaller players, or those entering new product categories with thin data histories, tended to rely on rules-based systems, which are explicit, human-authored logic that flags transactions meeting predefined criteria.</p><p>Both approaches have genuine strengths. Rules-based systems are auditable, easy to explain to a regulator, and quick to update when a new fraud typology emerges. Machine learning systems are far more powerful at surfacing non-obvious correlations and adapting to evolving attack patterns, but they require substantial training data and significant engineering effort to deploy.</p><p>The arrival of large language models and generative AI has introduced a third paradigm, one that is fundamentally non-deterministic. Unlike a rule that fires predictably on every run, or an ML model that produces a consistent probability score for a given feature vector, a generative AI system may reason differently across identical inputs. This has profound implications for how institutions build, test, and govern their fraud detection infrastructure.</p><h1>Balancing revenue growth and fraud risk</h1><p>Perhaps the most underappreciated tension in financial crime prevention is not technical; it is commercial. Every fraud control is also a friction point. A transaction declined as suspicious is, from the customer's perspective, simply a transaction that failed. Every false positive erodes trust, damages conversion rates, and risks losing a customer to a competitor with a more permissive onboarding flow. According to Datta:</p><p><em>“Machine learning excels at identifying complex patterns, but rules-based systems can quickly adapt to new types of fraud that humans can spot with minimal examples.”</em></p><p>This means that fraud teams are never simply optimising for fraud prevention in isolation. They are solving a constrained optimisation problem that is minimising fraud losses while simultaneously protecting revenue, preserving customer experience, and staying within the bounds of what regulators require. AI can shift that frontier, enabling more precise risk assessment that reduces both fraud and false positives simultaneously. But only if it is deployed and governed carefully.</p><h2>The future of AI in financial crime</h2><p>Looking forward, Datta sees the trajectory of&nbsp;<a href="https://hubs.li/Q04fy7RZ0" rel="noopener noreferrer" target="_blank">AI in financial crime prevention</a>&nbsp;pointing towards systems that combine the pattern-recognition power of machine learning with increasingly robust mechanisms for transparency and accountability. The goal is not to choose between a powerful AI and an explainable one — it is to build infrastructure that delivers both.</p><p>Several technical approaches are emerging to close this gap. Structured output formatting — requiring AI systems to return decisions in machine-readable formats like JSON, with explicit reasoning chains, makes it possible to audit AI behaviour at scale. Evaluation sets, which establish a curated baseline of labelled cases against which model performance is continuously benchmarked, allow institutions to detect drift and maintain defensible performance records.&nbsp;</p><p>The institutions that will lead this space are those treating AI governance not as a compliance overhead but as a competitive advantage. A well-governed AI system is faster to get regulatory approval, faster to deploy new capabilities, and more resilient when regulatory scrutiny increases.</p><p>The most striking thread in Datta's thinking is his insistence on placing financial crime prevention within a broader moral frame. Financial crime is not merely an operational risk; it is a conduit for some of the most serious harms in the world: human trafficking, modern slavery, terrorist financing, and the systematic exploitation of vulnerable people. Viewed through this lens, the deployment of better AI in financial crime prevention is not primarily a business efficiency story. It is a contribution to a more just and safer world. Datta says:</p><p><em>“AI should be viewed not only as an efficiency driver but as a tool to address broader societal issues like human trafficking and exploitation. Better detection is a moral obligation.”</em></p><p>This framing matters for how organisations think about investment in financial crime technology. If AI in fraud prevention is purely a cost centre, it will always lose budget battles to revenue-generating activities.&nbsp;</p><p>If you would like to find out more, visit:&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Unit21.ai</a>&nbsp;or read more about&nbsp;<a href="https://hubs.li/Q04fy7KV0" rel="noopener noreferrer" target="_blank">Rules vs. Machine Learning: Finding the Best of Both Worlds</a>&nbsp;by Kunal Datta.</p><p>If you are looking to strengthen how your organisation identifies and manages risk, you can request a&nbsp;<a href="https://hubs.li/Q04fy89F0" rel="noopener noreferrer" target="_blank">personalised demo with Unit21</a>.</p><h2>Takeaways</h2><ul><li>Evolution of financial crime detection over the last decade</li><li>Deterministic vs non-deterministic AI systems in fraud prevention</li><li>The role of generative AI and context engineering in compliance</li><li>Accountability and explainability in AI-driven decision making</li><li>Regulatory perspectives on AI and risk management</li></ul><br/><p>00:00 Navigating Financial Crime Prevention Challenges</p><p>02:54 The Evolution of Fraud Detection Systems</p><p>05:55 The Debate: Explainability vs. Performance in AI</p><p>08:51 Balancing Accuracy and Regulatory Expectations</p><p>12:01 Context Engineering in AI for Financial Crime</p><p>15:04 Rethinking Accountability in AI Systems</p><p>17:55 AI as a Societal Imperative in Risk and Compliance</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6fc0c10f-0cb9-4fca-9629-9a0fbf4b66f2</guid><itunes:image href="https://artwork.captivate.fm/c616f747-597c-42cc-b2c3-6f6a54a8ddcb/2026-48-Ever-wonder-how-financial-institutions-balance-fraud-ri.jpg"/><pubDate>Wed, 06 May 2026 08:09:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/6fc0c10f-0cb9-4fca-9629-9a0fbf4b66f2.mp3" length="59775337" type="audio/mpeg"/><itunes:duration>24:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>117</itunes:episode><podcast:episode>117</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground"><podcast:source uri="https://youtu.be/mYLr1c_tqnY"/></podcast:alternateEnclosure></item><item><title>Can Real-Time Identity Governance Replace Access Reviews for Good?</title><itunes:title>Can Real-Time Identity Governance Replace Access Reviews for Good?</itunes:title><description><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <em><a href="https://www.linkedin.com/in/rick-wagner-53b0559/" rel="noopener noreferrer" target="_blank">Rick Wagner, Senior Director, Product Management at SailPoint</a></em></strong></p><p><strong>Analyst: Jonathan Care, Lead Analyst, KuppingerCole</strong></p><p>The identity security market is crowded, but a significant change is occurring below the surface. In a recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong> podcast, host Jonathan Care, Lead Analyst at KuppingerCole, sat down with Rick Wagner, Sr. Director Product Management at <strong><a href="https://em360tech.com/solution-providers/sailpoint" rel="noopener noreferrer" target="_blank">SailPoint</a></strong>. </p><p>In this episode, Wagner pointed out a growing gap between how enterprises manage access and how modern systems operate. As AI and <strong><a href="https://em360tech.com/tech-articles/machine-identity-cloud-security" rel="noopener noreferrer" target="_blank">machine identities</a></strong> grow rapidly, traditional models no longer work.</p><h2>Static Access Reviews Are Breaking at Scale</h2><p>For years, enterprises have depended on periodic access certifications to manage access. However, such a model is proving to be weak. “Periodic access reviews only look at appropriate access at a point in time,” says Wagner, noting that “certification fatigue results in rubber stamping.”</p><p>The challenge is both scale and accuracy. With machine identities often outnumbering humans, <strong><a href="https://em360tech.com/tech-articles/what-ai-governance-complete-guide-enterprises" rel="noopener noreferrer" target="_blank">governance processes</a></strong> designed for manual oversight are quickly becoming outdated. “Doing those certifications at agent speed is literally impossible,” he adds, emphasising the need for change.</p><p><strong><em><a href="https://em360tech.com/podcasts/ai-agents-demand-new-approach-identity-security" rel="noopener noreferrer" target="_blank">Also Watch: Why AI Agents Demand a New Approach to Identity Security</a></em></strong></p><h2>How is Real-Time Authorisation &amp; AI Redefining Identity Security?</h2><p>The way ahead is <strong><a href="https://em360tech.com/tech-articles/what-multi-factor-authentication-mfa-and-why-you-need-it" rel="noopener noreferrer" target="_blank">real-time authorisation</a></strong>, which continuously checks if access is appropriate at the moment it is requested. “It’s not only appropriate— is it appropriate right now?” Wagner explains.</p><p>This change depends on context, incorporating information such as device health, user behaviour, and risk level. Frameworks like the <strong><a href="https://documentation.sailpoint.com/saas/help/shared_signals/index.html" rel="noopener noreferrer" target="_blank">Shared Signals Framework</a></strong> help enterprises implement this by allowing real-time data sharing across the security ecosystem. This approach leads to more dynamic, policy-driven access that keeps pace with <strong><a href="https://em360tech.com/top-10/enterprise-ai-model-security-tools" rel="noopener noreferrer" target="_blank">AI systems</a></strong>.</p><h2>How to Tackle Shadow AI?</h2><p>At the same time, CISOs face the rise of <strong><a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">shadow AI</a></strong>, an expanding network of agents operating with little oversight. “You can’t manage what you can’t see or what you don’t know about,” says Wagner, highlighting visibility as the first line of defence.</p><p>The long-term goal is autonomous identity governance, where systems continuously evaluate and adjust access based on risk. “As risk levels start to increase, we might add additional factors up to quarantining that access,” he explains.</p><p>In this new framework, identity becomes the core of cybersecurity strategy. As Wagner puts it, the ongoing challenge is urgent – determining “who has access to what—and is that access appropriate right now.”</p><h3>Key Takeaways</h3><ul><li>Real-time identity governance replacing static access reviews </li><li>AI and machine identities outpace human oversight</li><li>“Certification fatigue” is weakening traditional access controls, increasing risk through unchecked approvals.</li><li>Non-human identities (AI agents, bots) are now the fastest-growing and least visible attack surface.</li><li>Context-aware access decisions—based on risk, behaviour, and environment—are becoming the new standard.</li><li>Visibility into agents and their permissions is critical: “you can’t manage what you can’t see.”</li><li>Autonomous, risk-adaptive identity security is emerging as the end-state for modern enterprise cybersecurity.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Identity Security in AI Era</p><p>06:54 Managing Privileged Access Risks</p><p>13:52 Real-Time Governance and Joiners, Movers, Leavers</p><p>20:14 Strategic Moves for CISOs in Agent-Based Operations</p><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://sailpoint.com/" rel="noopener noreferrer" target="_blank">sailpoint.com</a>. </p><p>To stay updated on B2B Tech front and centre, follow EM360Tech:</p><p>YouTube: <strong><a href="https://www.youtube.com/channel/UCNCS0CL4v38JWbNaqnn0G4w" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p>LinkedIn: <strong><a href="https://www.linkedin.com/company/em360/" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p>X: <strong><a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p>Follow SailPoint on all its major platforms:</p><p>YouTube: <strong><a href="https://www.youtube.com/SailPointTechnologies" rel="noopener noreferrer" target="_blank">@SailPointTechnologies</a></strong></p><p>LinkedIn: <strong><a href="https://www.linkedin.com/company/sailpoint-technologies/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@SailPoint</a></strong></p><p>X: <strong><a href="https://x.com/SailPoint" rel="noopener noreferrer" target="_blank">@SailPoint</a></strong></p><p>#IdentitySecurity #AIAgents #RealTimeGovernance #SailPoint #IAM #ShadowAI #Cybersecurity #EnterpriseTech #TechLeadership #CIOInsights #DigitalTransformation #MachineIdentities</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <em><a href="https://www.linkedin.com/in/rick-wagner-53b0559/" rel="noopener noreferrer" target="_blank">Rick Wagner, Senior Director, Product Management at SailPoint</a></em></strong></p><p><strong>Analyst: Jonathan Care, Lead Analyst, KuppingerCole</strong></p><p>The identity security market is crowded, but a significant change is occurring below the surface. In a recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong> podcast, host Jonathan Care, Lead Analyst at KuppingerCole, sat down with Rick Wagner, Sr. Director Product Management at <strong><a href="https://em360tech.com/solution-providers/sailpoint" rel="noopener noreferrer" target="_blank">SailPoint</a></strong>. </p><p>In this episode, Wagner pointed out a growing gap between how enterprises manage access and how modern systems operate. As AI and <strong><a href="https://em360tech.com/tech-articles/machine-identity-cloud-security" rel="noopener noreferrer" target="_blank">machine identities</a></strong> grow rapidly, traditional models no longer work.</p><h2>Static Access Reviews Are Breaking at Scale</h2><p>For years, enterprises have depended on periodic access certifications to manage access. However, such a model is proving to be weak. “Periodic access reviews only look at appropriate access at a point in time,” says Wagner, noting that “certification fatigue results in rubber stamping.”</p><p>The challenge is both scale and accuracy. With machine identities often outnumbering humans, <strong><a href="https://em360tech.com/tech-articles/what-ai-governance-complete-guide-enterprises" rel="noopener noreferrer" target="_blank">governance processes</a></strong> designed for manual oversight are quickly becoming outdated. “Doing those certifications at agent speed is literally impossible,” he adds, emphasising the need for change.</p><p><strong><em><a href="https://em360tech.com/podcasts/ai-agents-demand-new-approach-identity-security" rel="noopener noreferrer" target="_blank">Also Watch: Why AI Agents Demand a New Approach to Identity Security</a></em></strong></p><h2>How is Real-Time Authorisation &amp; AI Redefining Identity Security?</h2><p>The way ahead is <strong><a href="https://em360tech.com/tech-articles/what-multi-factor-authentication-mfa-and-why-you-need-it" rel="noopener noreferrer" target="_blank">real-time authorisation</a></strong>, which continuously checks if access is appropriate at the moment it is requested. “It’s not only appropriate— is it appropriate right now?” Wagner explains.</p><p>This change depends on context, incorporating information such as device health, user behaviour, and risk level. Frameworks like the <strong><a href="https://documentation.sailpoint.com/saas/help/shared_signals/index.html" rel="noopener noreferrer" target="_blank">Shared Signals Framework</a></strong> help enterprises implement this by allowing real-time data sharing across the security ecosystem. This approach leads to more dynamic, policy-driven access that keeps pace with <strong><a href="https://em360tech.com/top-10/enterprise-ai-model-security-tools" rel="noopener noreferrer" target="_blank">AI systems</a></strong>.</p><h2>How to Tackle Shadow AI?</h2><p>At the same time, CISOs face the rise of <strong><a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">shadow AI</a></strong>, an expanding network of agents operating with little oversight. “You can’t manage what you can’t see or what you don’t know about,” says Wagner, highlighting visibility as the first line of defence.</p><p>The long-term goal is autonomous identity governance, where systems continuously evaluate and adjust access based on risk. “As risk levels start to increase, we might add additional factors up to quarantining that access,” he explains.</p><p>In this new framework, identity becomes the core of cybersecurity strategy. As Wagner puts it, the ongoing challenge is urgent – determining “who has access to what—and is that access appropriate right now.”</p><h3>Key Takeaways</h3><ul><li>Real-time identity governance replacing static access reviews </li><li>AI and machine identities outpace human oversight</li><li>“Certification fatigue” is weakening traditional access controls, increasing risk through unchecked approvals.</li><li>Non-human identities (AI agents, bots) are now the fastest-growing and least visible attack surface.</li><li>Context-aware access decisions—based on risk, behaviour, and environment—are becoming the new standard.</li><li>Visibility into agents and their permissions is critical: “you can’t manage what you can’t see.”</li><li>Autonomous, risk-adaptive identity security is emerging as the end-state for modern enterprise cybersecurity.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Identity Security in AI Era</p><p>06:54 Managing Privileged Access Risks</p><p>13:52 Real-Time Governance and Joiners, Movers, Leavers</p><p>20:14 Strategic Moves for CISOs in Agent-Based Operations</p><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://sailpoint.com/" rel="noopener noreferrer" target="_blank">sailpoint.com</a>. </p><p>To stay updated on B2B Tech front and centre, follow EM360Tech:</p><p>YouTube: <strong><a href="https://www.youtube.com/channel/UCNCS0CL4v38JWbNaqnn0G4w" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p>LinkedIn: <strong><a href="https://www.linkedin.com/company/em360/" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p>X: <strong><a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p>Follow SailPoint on all its major platforms:</p><p>YouTube: <strong><a href="https://www.youtube.com/SailPointTechnologies" rel="noopener noreferrer" target="_blank">@SailPointTechnologies</a></strong></p><p>LinkedIn: <strong><a href="https://www.linkedin.com/company/sailpoint-technologies/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@SailPoint</a></strong></p><p>X: <strong><a href="https://x.com/SailPoint" rel="noopener noreferrer" target="_blank">@SailPoint</a></strong></p><p>#IdentitySecurity #AIAgents #RealTimeGovernance #SailPoint #IAM #ShadowAI #Cybersecurity #EnterpriseTech #TechLeadership #CIOInsights #DigitalTransformation #MachineIdentities</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">84c476b2-6cd2-468c-87b1-a30ba0a805a0</guid><itunes:image href="https://artwork.captivate.fm/4c908b5e-f86b-4f11-bbe8-790ace569423/2026-51-When-Machines-Outnumber-Humans-Identity-Becomes-Your-Bi.jpg"/><pubDate>Thu, 30 Apr 2026 16:45:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/84c476b2-6cd2-468c-87b1-a30ba0a805a0.mp3" length="51629004" type="audio/mpeg"/><itunes:duration>21:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>116</itunes:episode><podcast:episode>116</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Can Real-Time Identity Governance Replace Access Reviews for Good?"><podcast:source uri="https://youtu.be/OGWEmnneSWM"/></podcast:alternateEnclosure></item><item><title>Non-Human Identities and Agentic AI: The New Frontier in Identity Security</title><itunes:title>Non-Human Identities and Agentic AI: The New Frontier in Identity Security</itunes:title><description><![CDATA[<p>Over 95 per cent of leaders now say identity security is core to their strategy. A decade ago, this wasn’t even part of the conversation. The awareness is there, but awareness alone isn’t enough. Many organisations feel secure, yet the metrics they track often tell a different story.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, EM360Tech’s&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;sits down with&nbsp;<a href="https://www.linkedin.com/in/craigramsay86/" rel="noopener noreferrer" target="_blank">Craig Ramsay</a>, Senior Field Strategist, and&nbsp;<a href="https://www.linkedin.com/in/rodlsimmons/" rel="noopener noreferrer" target="_blank">Rod Simmons</a>, VP of Product Strategy at&nbsp;<a href="https://omadaidentity.com/" rel="noopener noreferrer" target="_blank">Omada</a>, to unpack the<a href="https://omadaidentity.com/wp-content/uploads/2026/02/State-of-Identity-Governance-2026.pdf" rel="noopener noreferrer" target="_blank">&nbsp;<em>State of Identity Governance 2026</em></a>&nbsp;report. Together, they explore why confidence in identity security doesn’t always equal true protection and how AI, non-human identities, and fragmented systems are changing the rules.</p><h2>Bridging the Gap Between Perception and Reality</h2><p>Many organisations focus on operational metrics that are easy to measure: provisioning speed, audit readiness, and compliance. These give a sense of efficiency but not necessarily security. Simmons explains: “We can provision identities faster, but that doesn’t tell us about inherent risks. Orphaned accounts, dormant privileges, unmanaged access—these risks often go unseen.”</p><p>Ramsay adds, “It’s like home security. You might feel confident, but when was the last time you checked your back door?”</p><p>The survey revealed a clear disconnect: strategic awareness exists, but organisations are not always measuring the right things. Security leaders should not only track completed tasks, but they must also understand where risk accumulates and how quickly they can respond to incidents. Risk-based metrics, rather than activity-based metrics, are the key to true governance.</p><h2>Zero Trust and the Challenge of Integration</h2><p>Almost every organisation reports adopting Zero Trust principles. The execution often falls short. Policies may exist in pockets, but full implementation requires connected systems that can share signals in real time. Without this integration, Zero Trust becomes a concept rather than a functioning model.</p><p>Rod highlights the issue: “It’s one thing to want continuous evaluation, but another to have systems that actually support it. Shared signal frameworks are essential for consistent enforcement across the enterprise.” Until Zero Trust principles are fully integrated across all platforms, access control and identity governance will remain reactive rather than proactive.</p><h2>Non-Human Identities, AI, and the New Frontline</h2><p>Identity is no longer just about people. Non-human identities, but API keys, service accounts, and AI agents, are multiplying at unprecedented rates. Some organisations see 150 non-human identities for every human. These identities act autonomously, persistently, and at scale. Simmons explains the challenge: “With human identities, we ask what access they have. With non-human identities, we ask what they can do, and what they’ve done.”</p><p>Ramsay adds a crucial reminder: “Artificial intelligence still needs an accountable individual. Human oversight is essential, even as AI agents scale and operate independently.”</p><p>These agents create both risk and opportunity. They can automate governance, improve provisioning, and flag anomalies—but without proper visibility and ownership, they become a blind spot. Over 40 per cent of surveyed organisations admitted their AI agents still use static credentials, a simple but serious vulnerability.</p><p>One thing is for sure: you cannot govern what you cannot see. Visibility is the foundation. Only once organisations know what exists, who owns it, and how it behaves can they secure identities, human and non-human alike, effectively.</p><p>Identity security is no longer a back-office concern—it’s strategic. Organisations must move from confidence to proof, from operational reporting to risk measurement, and from fragmented controls to integrated governance. AI and non-human identities are not just a challenge; they are an opportunity to rethink how identity security can truly enable business, not just protect it.</p><p>For more insights on effective identity governance strategies, check out Omada's State of <a href="https://omadaidentity.com/wp-content/uploads/2026/02/State-of-Identity-Governance-2026.pdf" rel="noopener noreferrer" target="_blank">Identity Governance 2026 Report.</a></p><h1>Takeaways</h1><ul><li>Over 95 per cent of security leaders now see identity as a core strategy. Identity isn’t optional anymore.</li><li>Feeling secure doesn’t equal being secure. Many organisations track efficiency, not actual risk.</li><li>Non-human identities are multiplying fast.&nbsp;</li><li>Zero Trust adoption is growing, but integration gaps remain.&nbsp;</li><li>AI in identity governance works, but always keep a human in the loop.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Identity Governance and Security Challenges</p><p>02:55 Insights from the State of Identity Governance Report</p><p>05:53 The Gap in Security Confidence and Measurement</p><p>08:53 Operational Metrics vs. Risk Indicators</p><p>11:50 Zero Trust Adoption and Implementation Challenges</p><p>14:54 The Role of AI in Identity Governance</p><p>17:52 Non-Human Identities and Governance Challenges</p><p>21:07 Key Takeaways for Security Leaders</p>]]></description><content:encoded><![CDATA[<p>Over 95 per cent of leaders now say identity security is core to their strategy. A decade ago, this wasn’t even part of the conversation. The awareness is there, but awareness alone isn’t enough. Many organisations feel secure, yet the metrics they track often tell a different story.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, EM360Tech’s&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;sits down with&nbsp;<a href="https://www.linkedin.com/in/craigramsay86/" rel="noopener noreferrer" target="_blank">Craig Ramsay</a>, Senior Field Strategist, and&nbsp;<a href="https://www.linkedin.com/in/rodlsimmons/" rel="noopener noreferrer" target="_blank">Rod Simmons</a>, VP of Product Strategy at&nbsp;<a href="https://omadaidentity.com/" rel="noopener noreferrer" target="_blank">Omada</a>, to unpack the<a href="https://omadaidentity.com/wp-content/uploads/2026/02/State-of-Identity-Governance-2026.pdf" rel="noopener noreferrer" target="_blank">&nbsp;<em>State of Identity Governance 2026</em></a>&nbsp;report. Together, they explore why confidence in identity security doesn’t always equal true protection and how AI, non-human identities, and fragmented systems are changing the rules.</p><h2>Bridging the Gap Between Perception and Reality</h2><p>Many organisations focus on operational metrics that are easy to measure: provisioning speed, audit readiness, and compliance. These give a sense of efficiency but not necessarily security. Simmons explains: “We can provision identities faster, but that doesn’t tell us about inherent risks. Orphaned accounts, dormant privileges, unmanaged access—these risks often go unseen.”</p><p>Ramsay adds, “It’s like home security. You might feel confident, but when was the last time you checked your back door?”</p><p>The survey revealed a clear disconnect: strategic awareness exists, but organisations are not always measuring the right things. Security leaders should not only track completed tasks, but they must also understand where risk accumulates and how quickly they can respond to incidents. Risk-based metrics, rather than activity-based metrics, are the key to true governance.</p><h2>Zero Trust and the Challenge of Integration</h2><p>Almost every organisation reports adopting Zero Trust principles. The execution often falls short. Policies may exist in pockets, but full implementation requires connected systems that can share signals in real time. Without this integration, Zero Trust becomes a concept rather than a functioning model.</p><p>Rod highlights the issue: “It’s one thing to want continuous evaluation, but another to have systems that actually support it. Shared signal frameworks are essential for consistent enforcement across the enterprise.” Until Zero Trust principles are fully integrated across all platforms, access control and identity governance will remain reactive rather than proactive.</p><h2>Non-Human Identities, AI, and the New Frontline</h2><p>Identity is no longer just about people. Non-human identities, but API keys, service accounts, and AI agents, are multiplying at unprecedented rates. Some organisations see 150 non-human identities for every human. These identities act autonomously, persistently, and at scale. Simmons explains the challenge: “With human identities, we ask what access they have. With non-human identities, we ask what they can do, and what they’ve done.”</p><p>Ramsay adds a crucial reminder: “Artificial intelligence still needs an accountable individual. Human oversight is essential, even as AI agents scale and operate independently.”</p><p>These agents create both risk and opportunity. They can automate governance, improve provisioning, and flag anomalies—but without proper visibility and ownership, they become a blind spot. Over 40 per cent of surveyed organisations admitted their AI agents still use static credentials, a simple but serious vulnerability.</p><p>One thing is for sure: you cannot govern what you cannot see. Visibility is the foundation. Only once organisations know what exists, who owns it, and how it behaves can they secure identities, human and non-human alike, effectively.</p><p>Identity security is no longer a back-office concern—it’s strategic. Organisations must move from confidence to proof, from operational reporting to risk measurement, and from fragmented controls to integrated governance. AI and non-human identities are not just a challenge; they are an opportunity to rethink how identity security can truly enable business, not just protect it.</p><p>For more insights on effective identity governance strategies, check out Omada's State of <a href="https://omadaidentity.com/wp-content/uploads/2026/02/State-of-Identity-Governance-2026.pdf" rel="noopener noreferrer" target="_blank">Identity Governance 2026 Report.</a></p><h1>Takeaways</h1><ul><li>Over 95 per cent of security leaders now see identity as a core strategy. Identity isn’t optional anymore.</li><li>Feeling secure doesn’t equal being secure. Many organisations track efficiency, not actual risk.</li><li>Non-human identities are multiplying fast.&nbsp;</li><li>Zero Trust adoption is growing, but integration gaps remain.&nbsp;</li><li>AI in identity governance works, but always keep a human in the loop.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Identity Governance and Security Challenges</p><p>02:55 Insights from the State of Identity Governance Report</p><p>05:53 The Gap in Security Confidence and Measurement</p><p>08:53 Operational Metrics vs. Risk Indicators</p><p>11:50 Zero Trust Adoption and Implementation Challenges</p><p>14:54 The Role of AI in Identity Governance</p><p>17:52 Non-Human Identities and Governance Challenges</p><p>21:07 Key Takeaways for Security Leaders</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c0d1fa4d-4350-43d7-b01d-5503e933a7d2</guid><itunes:image href="https://artwork.captivate.fm/4e7461b1-cc7f-4219-8336-6860310462ed/2026-40-Are-we-measuring-security-confidence-or-just-feeling-se.jpg"/><pubDate>Mon, 27 Apr 2026 10:01:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c0d1fa4d-4350-43d7-b01d-5503e933a7d2.mp3" length="69510637" type="audio/mpeg"/><itunes:duration>28:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>115</itunes:episode><podcast:episode>115</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Non-Human Identities and Agentic AI: The New Frontier in Identity Security"><podcast:source uri="https://youtu.be/Ebg_b6_lf_M"/></podcast:alternateEnclosure></item><item><title>How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?</title><itunes:title>How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?</itunes:title><description><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/amit-megiddo/" rel="noopener noreferrer" target="_blank">Amit Megiddo, CEO and Co-Founder, Native</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Analyst Researcher at IT-Harvest</a></strong></p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist Podcast</a></strong>, Amit Megiddo, CEO and Co-Founder, Native, joins host Richard Stiennon, Chief Research Analyst at IT-Harvest, to discuss a growing challenge in enterprise cloud security. Enterprises are investing heavily in cloud providers’ built-in controls, yet risk persists when those controls are not consistently enforced across complex environments.</p><p>According to Megiddo, the problem isn't a lack of tools, but a failure to make them work effectively. Drawing on his experience launching Amazon GuardDuty at <strong><a href="https://em360tech.com/tech-articles/openai-aws-partnership-enterprise-ai-strategy" rel="noopener noreferrer" target="_blank">Amazon Web Services</a></strong>, the Native CEO explains that enterprises have hit a tipping point. The challenge is no longer about visibility. It is about executing at scale across complex multi-cloud environments.</p><h2>What is the Execution Gap in Cloud Security?</h2><p>Cloud providers such as <strong><a href="https://em360tech.com/tech-articles/aws-vs-azure-whats-difference-2024" rel="noopener noreferrer" target="_blank">Amazon Web Services</a></strong>, Microsoft Azure, Google Cloud, and Oracle Cloud offer a wide range of built-in security features. Yet, as Megiddo points out, most enterprises are only using a small part of what is available.</p><p>“The easy part is turning controls on,” he says. “The hard part is making sure they consistently deliver security results.” This is where many enterprises struggle. Security teams create policies, but platform teams carry them out. In the process, vital context is lost. The result is a disjointed approach where risks are identified but not effectively managed.</p><p>Megiddo calls this the “execution gap.” It is a fundamental issue in how enterprises handle cloud security. Even with <strong><a href="https://em360tech.com/top-10/cloud-security-posture-management-cspm-tools" rel="noopener noreferrer" target="_blank">sophisticated CSPM</a></strong> and <strong>CNAP tools</strong>, organisations remain mostly reactive. They are relying on detection and fixing problems instead of preventing them.</p><h2>How to Move From Detection to Policy-Driven Enforcement</h2><p>The podcast spotlights a key shift in enterprise security strategy – moving from detection controls to proactive, <strong>policy-driven enforcement</strong>. Conventional methods focus on spotting issues—like unencrypted or publicly exposed data—and then starting remediation processes. However, as cloud environments grow, this method becomes untenable.</p><p>Megiddo suggests embedding security directly into the architecture:</p><ul><li>Preventing non-compliant resources from being created</li><li>Designating approved regions for workloads</li><li>Enforcing network isolation rules for sensitive environments, such as AI training workloads</li></ul><br/><p>This “secure-by-design” approach turns security from a reactive task into a core operational control. However, implementing this is not easy. Enterprises must translate high-level policy goals into thousands of low-level settings across various cloud providers, each with its own <strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">APIs</a></strong>, services, and policy frameworks.</p><p>“It’s not just about writing the policy,” Megiddo emphasises. “It’s about safely rolling it out, simulating impact, managing exceptions, and ensuring it stays enforced over time.”</p><p>It creates new operational needs such as simulation tools, drift detection, real-time developer feedback, and automated exception handling. Essentially, cloud security becomes a continuous process rather than a one-time setup.</p><h2>Why is the Unified Control System Critical?</h2><p>The main takeaway for enterprise leaders is that cloud security is no longer just about managing risks; it is becoming an edge in the market. As major providers continue to invest heavily in native security features, the real differentiator will be the ability to coordinate and enforce those tools effectively.</p><p>Megiddo’s vision is straightforward: a <strong><a href="https://em360tech.com/top-10/top-10-best-unified-endpoint-management-uem-solutions" rel="noopener noreferrer" target="_blank">unified control system</a></strong> that lets enterprises define security intent once and apply it consistently across cloud and hybrid environments.</p><p>In an industry shaped by AI, multi-cloud complexity, and rapid digital changes, this ability could determine how quickly—and securely—enterprises can progress. For CISOs and IT leaders, the message is clear: the future of cloud security lies not in observing more, but in doing more—with precision, consistency, and scale.</p><h3>Key Takeaways</h3><ul><li>Shift from detection to proactive, policy-driven cloud security to reduce risk.</li><li>Multi-cloud across Amazon Web Services, Microsoft Azure, and Google Cloud requires unified enforcement.</li><li>CISOs need tools that turn security policy into automated controls.</li><li>Secure-by-design cloud architecture protects AI and enterprise workloads.</li><li>Strong cloud security execution drives scalability and resilience.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 The Cloud Security Landscape</li><li>03:11 Challenges in Implementing Cloud Security</li><li>08:00 Transitioning to Proactive Security</li><li>12:26 The Evolving Role of Security Leaders</li><li>16:42 Future Trends in Cloud Security</li></ul><br/><p><strong>For more information, please visit <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="https://native.security/" rel="noopener noreferrer" target="_blank">native.security</a>. </strong></p><p><strong>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p><strong>Native LinkedIn: <a href="https://www.linkedin.com/company/native-security/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/native-security/</a></strong></p><p>#CloudSecurity #PolicyDrivenSecurity #CloudEnforcement #MultiCloudSecurity #SecurityByDesign #ExecutionGap #CISOs #TheSecurityStrategist #NativeSecurity #CSPM #CNAP #EnterpriseSecurity #NativeSecurity #AmitMegiddo</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/amit-megiddo/" rel="noopener noreferrer" target="_blank">Amit Megiddo, CEO and Co-Founder, Native</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Analyst Researcher at IT-Harvest</a></strong></p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist Podcast</a></strong>, Amit Megiddo, CEO and Co-Founder, Native, joins host Richard Stiennon, Chief Research Analyst at IT-Harvest, to discuss a growing challenge in enterprise cloud security. Enterprises are investing heavily in cloud providers’ built-in controls, yet risk persists when those controls are not consistently enforced across complex environments.</p><p>According to Megiddo, the problem isn't a lack of tools, but a failure to make them work effectively. Drawing on his experience launching Amazon GuardDuty at <strong><a href="https://em360tech.com/tech-articles/openai-aws-partnership-enterprise-ai-strategy" rel="noopener noreferrer" target="_blank">Amazon Web Services</a></strong>, the Native CEO explains that enterprises have hit a tipping point. The challenge is no longer about visibility. It is about executing at scale across complex multi-cloud environments.</p><h2>What is the Execution Gap in Cloud Security?</h2><p>Cloud providers such as <strong><a href="https://em360tech.com/tech-articles/aws-vs-azure-whats-difference-2024" rel="noopener noreferrer" target="_blank">Amazon Web Services</a></strong>, Microsoft Azure, Google Cloud, and Oracle Cloud offer a wide range of built-in security features. Yet, as Megiddo points out, most enterprises are only using a small part of what is available.</p><p>“The easy part is turning controls on,” he says. “The hard part is making sure they consistently deliver security results.” This is where many enterprises struggle. Security teams create policies, but platform teams carry them out. In the process, vital context is lost. The result is a disjointed approach where risks are identified but not effectively managed.</p><p>Megiddo calls this the “execution gap.” It is a fundamental issue in how enterprises handle cloud security. Even with <strong><a href="https://em360tech.com/top-10/cloud-security-posture-management-cspm-tools" rel="noopener noreferrer" target="_blank">sophisticated CSPM</a></strong> and <strong>CNAP tools</strong>, organisations remain mostly reactive. They are relying on detection and fixing problems instead of preventing them.</p><h2>How to Move From Detection to Policy-Driven Enforcement</h2><p>The podcast spotlights a key shift in enterprise security strategy – moving from detection controls to proactive, <strong>policy-driven enforcement</strong>. Conventional methods focus on spotting issues—like unencrypted or publicly exposed data—and then starting remediation processes. However, as cloud environments grow, this method becomes untenable.</p><p>Megiddo suggests embedding security directly into the architecture:</p><ul><li>Preventing non-compliant resources from being created</li><li>Designating approved regions for workloads</li><li>Enforcing network isolation rules for sensitive environments, such as AI training workloads</li></ul><br/><p>This “secure-by-design” approach turns security from a reactive task into a core operational control. However, implementing this is not easy. Enterprises must translate high-level policy goals into thousands of low-level settings across various cloud providers, each with its own <strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">APIs</a></strong>, services, and policy frameworks.</p><p>“It’s not just about writing the policy,” Megiddo emphasises. “It’s about safely rolling it out, simulating impact, managing exceptions, and ensuring it stays enforced over time.”</p><p>It creates new operational needs such as simulation tools, drift detection, real-time developer feedback, and automated exception handling. Essentially, cloud security becomes a continuous process rather than a one-time setup.</p><h2>Why is the Unified Control System Critical?</h2><p>The main takeaway for enterprise leaders is that cloud security is no longer just about managing risks; it is becoming an edge in the market. As major providers continue to invest heavily in native security features, the real differentiator will be the ability to coordinate and enforce those tools effectively.</p><p>Megiddo’s vision is straightforward: a <strong><a href="https://em360tech.com/top-10/top-10-best-unified-endpoint-management-uem-solutions" rel="noopener noreferrer" target="_blank">unified control system</a></strong> that lets enterprises define security intent once and apply it consistently across cloud and hybrid environments.</p><p>In an industry shaped by AI, multi-cloud complexity, and rapid digital changes, this ability could determine how quickly—and securely—enterprises can progress. For CISOs and IT leaders, the message is clear: the future of cloud security lies not in observing more, but in doing more—with precision, consistency, and scale.</p><h3>Key Takeaways</h3><ul><li>Shift from detection to proactive, policy-driven cloud security to reduce risk.</li><li>Multi-cloud across Amazon Web Services, Microsoft Azure, and Google Cloud requires unified enforcement.</li><li>CISOs need tools that turn security policy into automated controls.</li><li>Secure-by-design cloud architecture protects AI and enterprise workloads.</li><li>Strong cloud security execution drives scalability and resilience.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 The Cloud Security Landscape</li><li>03:11 Challenges in Implementing Cloud Security</li><li>08:00 Transitioning to Proactive Security</li><li>12:26 The Evolving Role of Security Leaders</li><li>16:42 Future Trends in Cloud Security</li></ul><br/><p><strong>For more information, please visit <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="https://native.security/" rel="noopener noreferrer" target="_blank">native.security</a>. </strong></p><p><strong>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p><strong>Native LinkedIn: <a href="https://www.linkedin.com/company/native-security/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/native-security/</a></strong></p><p>#CloudSecurity #PolicyDrivenSecurity #CloudEnforcement #MultiCloudSecurity #SecurityByDesign #ExecutionGap #CISOs #TheSecurityStrategist #NativeSecurity #CSPM #CNAP #EnterpriseSecurity #NativeSecurity #AmitMegiddo</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0a073a21-bf77-457d-8425-6ab9420fcd82</guid><itunes:image href="https://artwork.captivate.fm/5370ea6d-31d9-472c-9668-4cce637d9d0a/2026-33-The-Biggest-Cloud-Security-Mistake-Nobody-Talks-About-A.jpg"/><pubDate>Tue, 21 Apr 2026 12:50:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/0a073a21-bf77-457d-8425-6ab9420fcd82.mp3" length="52557121" type="audio/mpeg"/><itunes:duration>21:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>114</itunes:episode><podcast:episode>114</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="native security 2"><podcast:source uri="https://youtu.be/qHbdRh1jk0M"/></podcast:alternateEnclosure></item><item><title>FedRAMP 20x: The Future of Compliance, Trends, and Best Practices</title><itunes:title>FedRAMP 20x: The Future of Compliance, Trends, and Best Practices</itunes:title><description><![CDATA[<p>If you've ever tried to navigate the FedRAMP authorization process, you already know it's slow, expensive, and tedious when it comes to the documentation. For cloud service providers (CSPs) hoping to sell to the federal government, it has long been one of the biggest barriers to entry. That’s now changing. FedRAMP 20x is the most significant modernization of the Federal Risk and Authorization Management Program in its history and is reshaping how CSPs can achieve compliance.</p><p>In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>&nbsp;podcast,&nbsp;<a href="https://www.linkedin.com/in/kenny-g-scott/" rel="noopener noreferrer" target="_blank">Kenny Scott</a>, founder and CEO of&nbsp;<a href="https://www.paramify.com/" rel="noopener noreferrer" target="_blank">Paramify</a>, joins host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, to unpack what’s changing, why it matters, and how it could redefine the path to federal authorization.</p><p>FedRAMP 20x is set to help CSPs approach compliance by cutting costs, reducing timelines, and shifting the focus from paperwork to verifiable security evidence.</p><p>What Is FedRAMP And Why Did It Need to Change?</p><p>FedRAMP, the Federal Risk and Authorization Management Program, provides a standardised framework for the security assessment, authorisation, and continuous monitoring of cloud products and services used by U.S. federal agencies. In theory, it's a smart idea: one unified security standard that any agency can rely on.</p><p>In practice, the traditional process became a bottleneck. Scott puts it bluntly: "FedRAMP's original design had a fatal flaw; it prioritized documentation over deterministic security evidence."</p><p>The result? CSPs were spending months, sometimes years, and hundreds of thousands of dollars compiling documentation packages that didn't necessarily make their systems more secure. Agencies weren't getting the real-time, verifiable security assurance they needed. And smaller, innovative CSPs were priced out entirely.</p><h3>Problems with Traditional FedRAMP</h3><ul><li>Lengthy approval times as authorisation could take 12–18+ months, delaying market entry for cloud providers.</li><li>High compliance costs with smaller CSPs often couldn't afford the financial burden of full FedRAMP authorization.</li><li>Documentation overload with extensive paperwork, distracted from actual security practices and outcomes.</li></ul><br/><h2>FedRAMP 20x</h2><p>FedRAMP 20x goes beyond a version update; it signals a fundamental shift in how compliance is defined in modern cloud environments. Announced by the General Services Administration, the initiative is designed to make authorizations faster, cheaper, and more meaningful.</p><h3>Changes in FedRAMP 20x:</h3><ul><li>Streamlined authorization processes, which means faster pathways to approval, reducing time-to-market for CSPs.</li><li>Automation-first compliance that replaces manual documentation with automated, machine-readable security evidence.</li><li>Risk-based flexibility that tailors requirements to the actual risk profile of a service, rather than a one-size-fits-all model.</li></ul><br/><p>As Scott explains, the shift is from compliance as a paper exercise to compliance as a continuous, evidence-based practice. Agencies want real, deterministic security evidence, and FedRAMP 20x is built to deliver exactly that.</p><h2>What FedRAMP 20x Means for Cloud Service Providers</h2><p>For CSPs, the modernization is a double-edged opportunity; those who adapt quickly will gain a significant competitive advantage; those who don't may find themselves falling behind as the compliance landscape evolves.</p><p>On the opportunity side, the most immediate impact is a faster time to market. With streamlined approval processes, CSPs can move through authorisation more efficiently and reach federal customers sooner than before. This acceleration is paired with lower compliance costs, as reduced documentation and administrative burden free up resources that can instead be directed toward innovation and strengthening security capabilities. Perhaps most significantly, the changes help level the playing field, enabling smaller CSPs with strong security practices to compete more effectively against larger, established incumbents.</p><p>At the same time, these benefits come with new demands. CSPs will need to stay closely aligned with an evolving framework, continuously tracking updates and guidance as FedRAMP 20x matures. In addition, fully realising the advantages of the new model will require investment in automation. Organizations that adopt compliance and security automation tooling will be better positioned to keep pace, reduce manual effort, and maintain consistent alignment with the updated requirements.</p><p>If you would like to find out about this visit<a href="https://paramify.com/" rel="noopener noreferrer" target="_blank">&nbsp;paramify.com</a>&nbsp;and connect with Scott on<a href="https://linkedin.com/in/kennyscott" rel="noopener noreferrer" target="_blank">&nbsp;LinkedIn</a>.</p><h2>Chapters</h2><ul><li>00:00 — Introduction to FedRAMP 20x</li><li>13:42 — The Need for Change in FedRAMP</li><li>20:20 — FedRAMP 20x: A New Approach</li><li>28:27 — Success Stories with FedRAMP 20x</li></ul><br/><h2>Takeaways</h2><ul><li>FedRAMP 20x modernizes federal cloud security compliance by replacing documentation-heavy processes with automation and evidence-based security.</li><li>The traditional FedRAMP process was slow, costly, and document-intensive — a barrier that limited innovation and market access for CSPs.</li><li>CSPs that invest in automation and stay ahead of evolving requirements will gain a clear competitive edge in the federal marketplace.</li><li>Kenny Scott and Paramify are at the forefront of helping organizations navigate this shift intelligently and efficiently.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>If you've ever tried to navigate the FedRAMP authorization process, you already know it's slow, expensive, and tedious when it comes to the documentation. For cloud service providers (CSPs) hoping to sell to the federal government, it has long been one of the biggest barriers to entry. That’s now changing. FedRAMP 20x is the most significant modernization of the Federal Risk and Authorization Management Program in its history and is reshaping how CSPs can achieve compliance.</p><p>In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>&nbsp;podcast,&nbsp;<a href="https://www.linkedin.com/in/kenny-g-scott/" rel="noopener noreferrer" target="_blank">Kenny Scott</a>, founder and CEO of&nbsp;<a href="https://www.paramify.com/" rel="noopener noreferrer" target="_blank">Paramify</a>, joins host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, to unpack what’s changing, why it matters, and how it could redefine the path to federal authorization.</p><p>FedRAMP 20x is set to help CSPs approach compliance by cutting costs, reducing timelines, and shifting the focus from paperwork to verifiable security evidence.</p><p>What Is FedRAMP And Why Did It Need to Change?</p><p>FedRAMP, the Federal Risk and Authorization Management Program, provides a standardised framework for the security assessment, authorisation, and continuous monitoring of cloud products and services used by U.S. federal agencies. In theory, it's a smart idea: one unified security standard that any agency can rely on.</p><p>In practice, the traditional process became a bottleneck. Scott puts it bluntly: "FedRAMP's original design had a fatal flaw; it prioritized documentation over deterministic security evidence."</p><p>The result? CSPs were spending months, sometimes years, and hundreds of thousands of dollars compiling documentation packages that didn't necessarily make their systems more secure. Agencies weren't getting the real-time, verifiable security assurance they needed. And smaller, innovative CSPs were priced out entirely.</p><h3>Problems with Traditional FedRAMP</h3><ul><li>Lengthy approval times as authorisation could take 12–18+ months, delaying market entry for cloud providers.</li><li>High compliance costs with smaller CSPs often couldn't afford the financial burden of full FedRAMP authorization.</li><li>Documentation overload with extensive paperwork, distracted from actual security practices and outcomes.</li></ul><br/><h2>FedRAMP 20x</h2><p>FedRAMP 20x goes beyond a version update; it signals a fundamental shift in how compliance is defined in modern cloud environments. Announced by the General Services Administration, the initiative is designed to make authorizations faster, cheaper, and more meaningful.</p><h3>Changes in FedRAMP 20x:</h3><ul><li>Streamlined authorization processes, which means faster pathways to approval, reducing time-to-market for CSPs.</li><li>Automation-first compliance that replaces manual documentation with automated, machine-readable security evidence.</li><li>Risk-based flexibility that tailors requirements to the actual risk profile of a service, rather than a one-size-fits-all model.</li></ul><br/><p>As Scott explains, the shift is from compliance as a paper exercise to compliance as a continuous, evidence-based practice. Agencies want real, deterministic security evidence, and FedRAMP 20x is built to deliver exactly that.</p><h2>What FedRAMP 20x Means for Cloud Service Providers</h2><p>For CSPs, the modernization is a double-edged opportunity; those who adapt quickly will gain a significant competitive advantage; those who don't may find themselves falling behind as the compliance landscape evolves.</p><p>On the opportunity side, the most immediate impact is a faster time to market. With streamlined approval processes, CSPs can move through authorisation more efficiently and reach federal customers sooner than before. This acceleration is paired with lower compliance costs, as reduced documentation and administrative burden free up resources that can instead be directed toward innovation and strengthening security capabilities. Perhaps most significantly, the changes help level the playing field, enabling smaller CSPs with strong security practices to compete more effectively against larger, established incumbents.</p><p>At the same time, these benefits come with new demands. CSPs will need to stay closely aligned with an evolving framework, continuously tracking updates and guidance as FedRAMP 20x matures. In addition, fully realising the advantages of the new model will require investment in automation. Organizations that adopt compliance and security automation tooling will be better positioned to keep pace, reduce manual effort, and maintain consistent alignment with the updated requirements.</p><p>If you would like to find out about this visit<a href="https://paramify.com/" rel="noopener noreferrer" target="_blank">&nbsp;paramify.com</a>&nbsp;and connect with Scott on<a href="https://linkedin.com/in/kennyscott" rel="noopener noreferrer" target="_blank">&nbsp;LinkedIn</a>.</p><h2>Chapters</h2><ul><li>00:00 — Introduction to FedRAMP 20x</li><li>13:42 — The Need for Change in FedRAMP</li><li>20:20 — FedRAMP 20x: A New Approach</li><li>28:27 — Success Stories with FedRAMP 20x</li></ul><br/><h2>Takeaways</h2><ul><li>FedRAMP 20x modernizes federal cloud security compliance by replacing documentation-heavy processes with automation and evidence-based security.</li><li>The traditional FedRAMP process was slow, costly, and document-intensive — a barrier that limited innovation and market access for CSPs.</li><li>CSPs that invest in automation and stay ahead of evolving requirements will gain a clear competitive edge in the federal marketplace.</li><li>Kenny Scott and Paramify are at the forefront of helping organizations navigate this shift intelligently and efficiently.</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a7272fc5-62d7-4134-9ef3-a307be2ebc2e</guid><itunes:image href="https://artwork.captivate.fm/bc63bc97-5a82-4a4f-83df-172116a0ded7/2026-46-Why-is-FedRAMP-20X-a-game-changer-for-cloud-security-Ke.jpg"/><pubDate>Thu, 16 Apr 2026 10:10:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/a7272fc5-62d7-4134-9ef3-a307be2ebc2e.mp3" length="73336897" type="audio/mpeg"/><itunes:duration>30:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>113</itunes:episode><podcast:episode>113</podcast:episode><podcast:season>1</podcast:season></item><item><title>Why Patch Management Remains the Most Annoying Problem in IT Security</title><itunes:title>Why Patch Management Remains the Most Annoying Problem in IT Security</itunes:title><description><![CDATA[<p>Keeping your organisation’s systems secure can feel like an endless battle. Patch management and vulnerability mitigation are often seen as tedious tasks, but they form the backbone of effective cybersecurity. In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>&nbsp;podcast, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/cyberwalters" rel="noopener noreferrer" target="_blank">Mike Walters</a>, co-founder of Action1, break down why patching remains challenging and share practical strategies to make the process simpler, smarter, and more effective.</p><h2>Patch Management Remains a Challenge</h2><p>Patch management has been a concern since the earliest days of computing, dating back to mainframes and early PCs. Despite technological advances, it remains a "busy work" task that many IT teams find overwhelming.&nbsp;</p><p>So what makes patching so hard today? One of the main reasons patching is still so difficult is the constant evolution of IT ecosystems. As Walters explains, "The biggest challenge is the ever-evolving nature of software with different applications, sources, and methodologies."&nbsp;</p><p>Operating systems, third-party apps, and custom configurations all require tailored approaches for updates and patches, making uniform processes impossible. Large organisations often have hundreds or thousands of devices, each running different software versions requiring specific patches and testing before deployment. The COVID-19 pandemic has dramatically shifted traditional patching strategies. Pre-pandemic, enterprises could rely on corporate networks and distribution points for patches. Now, a dispersed workforce, VPNs, and hybrid cloud architectures have made remote patching more complex.</p><p>As Walters notes, "Remote endpoints become a big challenge. You need network-agnostic solutions that work regardless of whether a device is connected to the corporate network or a coffee shop." Connection issues, bandwidth limitations, and endpoint diversity all impact security teams' ability to apply patches swiftly.</p><h2>Innovative Solutions for Streamlining Patch Management</h2><p>To address these challenges, organisations are moving towards more intelligent and automated patching strategies. As Walters puts it, the starting point is simple: automation. By removing repetitive manual tasks, teams reduce the risk of human error and create space to focus on higher-value security work. Done properly, automation allows for scheduled updates, controlled testing, and the ability to roll back quickly if something goes wrong.</p><p>At the same time, how patches are delivered matters just as much as when. Large updates can put significant strain on networks if pushed out all at once, which is why approaches like peer-to-peer distribution are gaining traction. By allowing endpoints to share updates locally, organisations can reduce bandwidth pressure and avoid bottlenecks. Flexible “catch-up” windows also ensure that devices which miss an update cycle can still be brought into compliance without disrupting operations.</p><p>Modern environments are also driving a shift towards cloud-native, agent-based architectures. Instead of relying on a fixed network or VPN, these agents connect directly to cloud services, allowing patches to be deployed consistently across remote, mobile, and distributed devices. This approach reflects the reality of how people work today, where endpoints are no longer confined to a single network.</p><p>Finally, effective patching is as much about control as it is about speed. Progressive rollouts—testing updates on a small group before expanding—help organisations avoid widespread disruption. By identifying issues early and isolating them quickly, teams can maintain stability while still ensuring that critical vulnerabilities are addressed without delay.</p><h2>Action1’s Unique Approach</h2><p>Action1’s innovative model offers 200 free endpoints forever with no feature limitations, facilitating all sizes and types of organisations to implement effective patching solutions. By removing entry barriers, Action1 enables organisations to test, scale, and secure their patches more affordably.&nbsp;</p><p>As Walters shares, "Offering free endpoints helps small IT teams get started, and as they grow, they stay with the platform."This approach promotes widespread adoption, accelerates security improvements, and creates a community of organisations committed to better vulnerability management.</p><p>As cybersecurity environments become more complex and distributed, patching will remain a critical task—if not the critical task—of your security strategy.</p><p>If you would like to find out more, visit:&nbsp;<a href="https://www.action1.com/?utm_source=paidmedia&amp;refid=Art_Q126_EM360" rel="noopener noreferrer" target="_blank">https://www.action1.com/</a></p><h2>Takeaways</h2><ul><li>The history and persistent nature of patch management issues</li><li>How remote and hybrid work models impact patching strategies</li><li>The importance of network-agnostic, agent-based patching solutions</li><li>How to leverage automation and orchestration to reduce IT workload</li><li>Peer-to-peer distribution to optimise bandwidth during large-scale updates</li><li>Developing a phased, ring-based approach to patch deployment</li><li>Real-world challenges of patching high-availability systems and remote endpoints</li><li>Action1’s unique offer of 200 free endpoints without feature limitations</li><li>The significance of thinking like an attacker to anticipate vulnerabilities</li></ul><br/><h2>Chapters:</h2><p>00:40 - Mike Walters’ background and company journey</p><p>02:00 - Why patching remains a complex, evolving task</p><p>04:35 - The need for specialisation and solving patching for good</p><p>05:11 - Why patch management feels like busy work and its inherent difficulties</p><p>06:44 - Lessons from early vulnerability management experiences</p><p>09:38 - Handling patching challenges for remote and mobile users</p><p>10:15 - The implementation of agent deployment and catch-up windows</p><p>12:22 - Innovative bandwidth management using peer-to-peer distribution</p><p>14:55 - The value of automation and trust in large-scale environments</p><p>16:50 - Utilising update rings for safer, staged patch deployment</p><p>17:45 - Prioritising patching for zero-day vulnerabilities and rapid response</p><p>18:43 - Action1’s free tier for small IT environments supporting smaller organisations</p><p>21:35 - Practical insights for IT leaders: automation, application patching, and attacker mindset</p><p>24:53 - Closing thoughts: automation and proactive attack thinking</p>]]></description><content:encoded><![CDATA[<p>Keeping your organisation’s systems secure can feel like an endless battle. Patch management and vulnerability mitigation are often seen as tedious tasks, but they form the backbone of effective cybersecurity. In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>&nbsp;podcast, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/cyberwalters" rel="noopener noreferrer" target="_blank">Mike Walters</a>, co-founder of Action1, break down why patching remains challenging and share practical strategies to make the process simpler, smarter, and more effective.</p><h2>Patch Management Remains a Challenge</h2><p>Patch management has been a concern since the earliest days of computing, dating back to mainframes and early PCs. Despite technological advances, it remains a "busy work" task that many IT teams find overwhelming.&nbsp;</p><p>So what makes patching so hard today? One of the main reasons patching is still so difficult is the constant evolution of IT ecosystems. As Walters explains, "The biggest challenge is the ever-evolving nature of software with different applications, sources, and methodologies."&nbsp;</p><p>Operating systems, third-party apps, and custom configurations all require tailored approaches for updates and patches, making uniform processes impossible. Large organisations often have hundreds or thousands of devices, each running different software versions requiring specific patches and testing before deployment. The COVID-19 pandemic has dramatically shifted traditional patching strategies. Pre-pandemic, enterprises could rely on corporate networks and distribution points for patches. Now, a dispersed workforce, VPNs, and hybrid cloud architectures have made remote patching more complex.</p><p>As Walters notes, "Remote endpoints become a big challenge. You need network-agnostic solutions that work regardless of whether a device is connected to the corporate network or a coffee shop." Connection issues, bandwidth limitations, and endpoint diversity all impact security teams' ability to apply patches swiftly.</p><h2>Innovative Solutions for Streamlining Patch Management</h2><p>To address these challenges, organisations are moving towards more intelligent and automated patching strategies. As Walters puts it, the starting point is simple: automation. By removing repetitive manual tasks, teams reduce the risk of human error and create space to focus on higher-value security work. Done properly, automation allows for scheduled updates, controlled testing, and the ability to roll back quickly if something goes wrong.</p><p>At the same time, how patches are delivered matters just as much as when. Large updates can put significant strain on networks if pushed out all at once, which is why approaches like peer-to-peer distribution are gaining traction. By allowing endpoints to share updates locally, organisations can reduce bandwidth pressure and avoid bottlenecks. Flexible “catch-up” windows also ensure that devices which miss an update cycle can still be brought into compliance without disrupting operations.</p><p>Modern environments are also driving a shift towards cloud-native, agent-based architectures. Instead of relying on a fixed network or VPN, these agents connect directly to cloud services, allowing patches to be deployed consistently across remote, mobile, and distributed devices. This approach reflects the reality of how people work today, where endpoints are no longer confined to a single network.</p><p>Finally, effective patching is as much about control as it is about speed. Progressive rollouts—testing updates on a small group before expanding—help organisations avoid widespread disruption. By identifying issues early and isolating them quickly, teams can maintain stability while still ensuring that critical vulnerabilities are addressed without delay.</p><h2>Action1’s Unique Approach</h2><p>Action1’s innovative model offers 200 free endpoints forever with no feature limitations, facilitating all sizes and types of organisations to implement effective patching solutions. By removing entry barriers, Action1 enables organisations to test, scale, and secure their patches more affordably.&nbsp;</p><p>As Walters shares, "Offering free endpoints helps small IT teams get started, and as they grow, they stay with the platform."This approach promotes widespread adoption, accelerates security improvements, and creates a community of organisations committed to better vulnerability management.</p><p>As cybersecurity environments become more complex and distributed, patching will remain a critical task—if not the critical task—of your security strategy.</p><p>If you would like to find out more, visit:&nbsp;<a href="https://www.action1.com/?utm_source=paidmedia&amp;refid=Art_Q126_EM360" rel="noopener noreferrer" target="_blank">https://www.action1.com/</a></p><h2>Takeaways</h2><ul><li>The history and persistent nature of patch management issues</li><li>How remote and hybrid work models impact patching strategies</li><li>The importance of network-agnostic, agent-based patching solutions</li><li>How to leverage automation and orchestration to reduce IT workload</li><li>Peer-to-peer distribution to optimise bandwidth during large-scale updates</li><li>Developing a phased, ring-based approach to patch deployment</li><li>Real-world challenges of patching high-availability systems and remote endpoints</li><li>Action1’s unique offer of 200 free endpoints without feature limitations</li><li>The significance of thinking like an attacker to anticipate vulnerabilities</li></ul><br/><h2>Chapters:</h2><p>00:40 - Mike Walters’ background and company journey</p><p>02:00 - Why patching remains a complex, evolving task</p><p>04:35 - The need for specialisation and solving patching for good</p><p>05:11 - Why patch management feels like busy work and its inherent difficulties</p><p>06:44 - Lessons from early vulnerability management experiences</p><p>09:38 - Handling patching challenges for remote and mobile users</p><p>10:15 - The implementation of agent deployment and catch-up windows</p><p>12:22 - Innovative bandwidth management using peer-to-peer distribution</p><p>14:55 - The value of automation and trust in large-scale environments</p><p>16:50 - Utilising update rings for safer, staged patch deployment</p><p>17:45 - Prioritising patching for zero-day vulnerabilities and rapid response</p><p>18:43 - Action1’s free tier for small IT environments supporting smaller organisations</p><p>21:35 - Practical insights for IT leaders: automation, application patching, and attacker mindset</p><p>24:53 - Closing thoughts: automation and proactive attack thinking</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">733cc164-ebeb-4a1a-a8fb-265973de70c8</guid><itunes:image href="https://artwork.captivate.fm/90db839b-094d-4bd9-98e2-413d103c22c7/2026-37-Is-patch-management-still-the-biggest-headache-in-cyber.jpg"/><pubDate>Fri, 10 Apr 2026 08:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/733cc164-ebeb-4a1a-a8fb-265973de70c8.mp3" length="54593965" type="audio/mpeg"/><itunes:duration>22:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>112</itunes:episode><podcast:episode>112</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Patch Management Remains the Most Annoying Problem in IT Security"><podcast:source uri="https://youtu.be/FBlnmTAmpb8"/></podcast:alternateEnclosure></item><item><title>The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools</title><itunes:title>The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools</itunes:title><description><![CDATA[<p>The way organizations access and use enterprise data has fundamentally changed. Knowledge workers now operate in browser-based environments, relying heavily on SaaS applications and increasingly experimenting with AI-powered tools to boost productivity.</p><p>In the Security Strategist podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, Vice President of Research at&nbsp;<a href="https://em360tech.com/podcasts/ep-30-order-taker-change-agent" rel="noopener noreferrer" target="_blank">Enterprise Management Associates (EMA)</a>, spoke with&nbsp;<a href="https://www.island.io/author/michael-leland" rel="noopener noreferrer" target="_blank">Michael Leland</a>, Field Chief Technology Officer at&nbsp;<a href="https://www.island.io/" rel="noopener noreferrer" target="_blank">Island</a>, about the growing cybersecurity challenges associated with browsers, SaaS platforms and AI tools and how organizations can adapt their enterprise security strategies.</p><p>While this shift has accelerated innovation, it has also introduced new cybersecurity risks. Sensitive information now flows through consumer browsers, AI assistants, browser extensions and cloud platforms; often outside the visibility of traditional security controls. As a result, enterprise security teams must rethink how they approach data protection, governance and access control in a browser-driven workplace.</p><h2>Why Browser-Based Workflows Are Creating New Enterprise Security Risks</h2><p>Enterprise security models were historically built around network perimeters, firewalls and on-premise infrastructure. Today, however, most work happens inside web browsers, where employees interact with SaaS platforms, cloud storage systems and AI tools.</p><p>According to Leland, this shift has significantly expanded the attack surface.</p><p>“The majority of knowledge workers are accessing business applications primarily via the web, whether it’s a SaaS application or a web front end to a legacy application. But they’ve been doing so in a consumer browser,” he explains.&nbsp;</p><p>Consumer-grade browsers were designed for convenience and personal use, not enterprise security. As a result, they often introduce vulnerabilities that can expose sensitive corporate data.</p><p>Traditional enterprise controls such as VPNs, secure web gateways and zero trust architectures attempt to mitigate these risks. However, these tools frequently operate outside the browser itself, leaving gaps in visibility and control.</p><p>The challenge becomes even more complex when browser extensions are added to the mix. Many extensions request extensive permissions and can access sensitive information inside SaaS applications.</p><p>“In the last 18 months, almost 40 per cent of browser extensions published have something to do with AI. Some offer real productivity gains, but the provenance of many of these tools is questionable,” Leland notes.&nbsp;</p><p>This growing ecosystem of extensions and cloud tools has created a new security frontier where enterprise data protection must operate directly at the user interaction layer.</p><h2>How AI Sprawl Is Complicating Data Governance</h2><p>Alongside browser-driven workflows, organizations are also dealing with a rapid surge in AI adoption. From tools like ChatGPT and Copilot to embedded AI features inside SaaS platforms, AI is becoming a standard part of the modern workplace.</p><p>However, this rapid adoption is also creating a phenomenon known as AI sprawl. Knowledge workers increasingly select their own AI tools based on preference or convenience, leading to a patchwork of unsanctioned platforms operating across the enterprise.</p><p>“Each knowledge worker may have their own AI tool of choice. So the whole BYO AI—bring your own AI—trend is becoming very real,” says Leland.&nbsp;</p><p>While these tools can deliver productivity gains, they also create serious data governance risks. Many AI platforms process prompts and inputs in external cloud environments, meaning that sensitive information could be inadvertently shared or stored outside company-controlled systems. Even seemingly harmless productivity tools may capture user data.</p><h2>Why Visibility and Data Boundaries Are Critical for Protecting Enterprise Data</h2><p>With browser usage and AI adoption accelerating, many cybersecurity teams are shifting their focus toward controlling data at the point of interaction rather than relying solely on network-based controls.</p><p>One emerging concept is the use of data boundaries—defined environments where organizations can control how sensitive information moves between applications.</p><p>A data boundary acts as a secure enclave that determines which applications are trusted and what data can flow between them.</p><p>“If you trust application A and application B, you might allow data to move freely between them,” Leland explains. “But you still enforce guardrails that prevent data from leaving that boundary.”</p><p>This approach allows organizations to balance security and productivity, an increasingly important consideration as knowledge workers rely on multiple SaaS platforms and AI assistants to complete daily tasks.</p><p>Another critical component of modern enterprise security is visibility. Security leaders cannot govern AI tools or protect sensitive data if they do not understand how employees are using them. As enterprises continue to embrace cloud applications and AI tools, protecting sensitive data will require a shift in cybersecurity thinking.</p><p>If you would like to find out more, visit&nbsp;<a href="http://island.io/" rel="noopener noreferrer" target="_blank">island.io</a></p><h2><strong>Takeaways:</strong></h2><ul><li>Establish a secure data boundary to control data flow between trusted applications.</li><li>Utilize AI to automate data protection and enhance real-time monitoring.</li><li>Foster a culture of security awareness among employees to strengthen your organization’s security posture.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity and AI</p><p>03:07 The Evolution of Browsers for Knowledge Workers</p><p>06:03 Challenges in Enterprise Security</p><p>09:04 Balancing Data Protection and Productivity</p><p>11:48 Navigating AI Risks in the Workplace</p><p>14:59 Understanding AI Sprawl and Governance</p><p>17:50 The Role of Presentation Layer in Data Protection</p><p>21:10 Real-World Applications in Financial Services</p><p>23:57 Final Thoughts on Securing Knowledge Workers</p>]]></description><content:encoded><![CDATA[<p>The way organizations access and use enterprise data has fundamentally changed. Knowledge workers now operate in browser-based environments, relying heavily on SaaS applications and increasingly experimenting with AI-powered tools to boost productivity.</p><p>In the Security Strategist podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, Vice President of Research at&nbsp;<a href="https://em360tech.com/podcasts/ep-30-order-taker-change-agent" rel="noopener noreferrer" target="_blank">Enterprise Management Associates (EMA)</a>, spoke with&nbsp;<a href="https://www.island.io/author/michael-leland" rel="noopener noreferrer" target="_blank">Michael Leland</a>, Field Chief Technology Officer at&nbsp;<a href="https://www.island.io/" rel="noopener noreferrer" target="_blank">Island</a>, about the growing cybersecurity challenges associated with browsers, SaaS platforms and AI tools and how organizations can adapt their enterprise security strategies.</p><p>While this shift has accelerated innovation, it has also introduced new cybersecurity risks. Sensitive information now flows through consumer browsers, AI assistants, browser extensions and cloud platforms; often outside the visibility of traditional security controls. As a result, enterprise security teams must rethink how they approach data protection, governance and access control in a browser-driven workplace.</p><h2>Why Browser-Based Workflows Are Creating New Enterprise Security Risks</h2><p>Enterprise security models were historically built around network perimeters, firewalls and on-premise infrastructure. Today, however, most work happens inside web browsers, where employees interact with SaaS platforms, cloud storage systems and AI tools.</p><p>According to Leland, this shift has significantly expanded the attack surface.</p><p>“The majority of knowledge workers are accessing business applications primarily via the web, whether it’s a SaaS application or a web front end to a legacy application. But they’ve been doing so in a consumer browser,” he explains.&nbsp;</p><p>Consumer-grade browsers were designed for convenience and personal use, not enterprise security. As a result, they often introduce vulnerabilities that can expose sensitive corporate data.</p><p>Traditional enterprise controls such as VPNs, secure web gateways and zero trust architectures attempt to mitigate these risks. However, these tools frequently operate outside the browser itself, leaving gaps in visibility and control.</p><p>The challenge becomes even more complex when browser extensions are added to the mix. Many extensions request extensive permissions and can access sensitive information inside SaaS applications.</p><p>“In the last 18 months, almost 40 per cent of browser extensions published have something to do with AI. Some offer real productivity gains, but the provenance of many of these tools is questionable,” Leland notes.&nbsp;</p><p>This growing ecosystem of extensions and cloud tools has created a new security frontier where enterprise data protection must operate directly at the user interaction layer.</p><h2>How AI Sprawl Is Complicating Data Governance</h2><p>Alongside browser-driven workflows, organizations are also dealing with a rapid surge in AI adoption. From tools like ChatGPT and Copilot to embedded AI features inside SaaS platforms, AI is becoming a standard part of the modern workplace.</p><p>However, this rapid adoption is also creating a phenomenon known as AI sprawl. Knowledge workers increasingly select their own AI tools based on preference or convenience, leading to a patchwork of unsanctioned platforms operating across the enterprise.</p><p>“Each knowledge worker may have their own AI tool of choice. So the whole BYO AI—bring your own AI—trend is becoming very real,” says Leland.&nbsp;</p><p>While these tools can deliver productivity gains, they also create serious data governance risks. Many AI platforms process prompts and inputs in external cloud environments, meaning that sensitive information could be inadvertently shared or stored outside company-controlled systems. Even seemingly harmless productivity tools may capture user data.</p><h2>Why Visibility and Data Boundaries Are Critical for Protecting Enterprise Data</h2><p>With browser usage and AI adoption accelerating, many cybersecurity teams are shifting their focus toward controlling data at the point of interaction rather than relying solely on network-based controls.</p><p>One emerging concept is the use of data boundaries—defined environments where organizations can control how sensitive information moves between applications.</p><p>A data boundary acts as a secure enclave that determines which applications are trusted and what data can flow between them.</p><p>“If you trust application A and application B, you might allow data to move freely between them,” Leland explains. “But you still enforce guardrails that prevent data from leaving that boundary.”</p><p>This approach allows organizations to balance security and productivity, an increasingly important consideration as knowledge workers rely on multiple SaaS platforms and AI assistants to complete daily tasks.</p><p>Another critical component of modern enterprise security is visibility. Security leaders cannot govern AI tools or protect sensitive data if they do not understand how employees are using them. As enterprises continue to embrace cloud applications and AI tools, protecting sensitive data will require a shift in cybersecurity thinking.</p><p>If you would like to find out more, visit&nbsp;<a href="http://island.io/" rel="noopener noreferrer" target="_blank">island.io</a></p><h2><strong>Takeaways:</strong></h2><ul><li>Establish a secure data boundary to control data flow between trusted applications.</li><li>Utilize AI to automate data protection and enhance real-time monitoring.</li><li>Foster a culture of security awareness among employees to strengthen your organization’s security posture.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity and AI</p><p>03:07 The Evolution of Browsers for Knowledge Workers</p><p>06:03 Challenges in Enterprise Security</p><p>09:04 Balancing Data Protection and Productivity</p><p>11:48 Navigating AI Risks in the Workplace</p><p>14:59 Understanding AI Sprawl and Governance</p><p>17:50 The Role of Presentation Layer in Data Protection</p><p>21:10 Real-World Applications in Financial Services</p><p>23:57 Final Thoughts on Securing Knowledge Workers</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">683124d0-8f2f-4748-97e7-b9cd137c8342</guid><itunes:image href="https://artwork.captivate.fm/2b2ed26a-95f2-41c7-9b76-7afa86ebe9de/2026-34-Are-you-trusting-your-browser-with-sensitive-data-Micha.jpg"/><pubDate>Thu, 09 Apr 2026 11:55:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/683124d0-8f2f-4748-97e7-b9cd137c8342.mp3" length="57749977" type="audio/mpeg"/><itunes:duration>24:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>111</itunes:episode><podcast:episode>111</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools"><podcast:source uri="https://youtu.be/fmZDWWZw-kE"/></podcast:alternateEnclosure></item><item><title>Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy</title><itunes:title>Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy</itunes:title><description><![CDATA[<p><strong>Podcast Series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/drchristopherpierson/" rel="noopener noreferrer" target="_blank">Dr Chris Pierson, Founder and CEO of BlackCloak</a></strong></p><p>There has always been a boundary in the enterprise technology corporate network. However, that boundary has been fading for a while, and now it may have completely vanished.</p><p>In the recent conversation on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, cybersecurity expert Dr Chris Pierson, also the Founder and CEO of <strong><a href="https://em360tech.com/solution-providers/blackcloak" rel="noopener noreferrer" target="_blank">BlackCloak</a></strong>, joined host Richard Stiennon, Chief Research Analyst at IT-Harvest.</p><p>The BlackCloak CEO presented a reality that many CISOs are only now facing. The most critical vulnerabilities in an enterprise may lie far beyond corporate control, embedded in the personal lives of its leadership.</p><h2>Why Attackers are After Soft Targets?</h2><p>Pierson explains that attackers are no longer focused on directly breaching secure enterprise systems. Instead, they are targeting individuals with the highest levels of access in a more effective way.</p><p>Executives and board members have always been appealing targets, but the strategies have changed. Personal email accounts, home Wi-Fi networks, and even family members are now part of the <strong><a href="https://em360tech.com/tech-articles/what-is-attack-surface-management" rel="noopener noreferrer" target="_blank">attack surface</a></strong>. These environments generally lack the layered defences of corporate infrastructure, making them easier to exploit.</p><p>The stakes are high. A compromised home network or personal device can quickly provide access to enterprise systems. Even simple attacks, such as text messages pretending to be from a CEO, can work when aimed at those outside formal security measures.</p><p>What makes this trend especially dangerous is its subtlety. These attacks rarely look like the major breaches that make the news. Instead, they happen quietly, taking advantage of everyday behaviours in settings that were never meant to withstand sophisticated threats.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-attackers-exploit-executives-personal-lives-breach-companies" rel="noopener noreferrer" target="_blank">Also Watch: How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?</a></em></strong></p><h2>Why Privacy Measures Aren’t Enough</h2><p>In response, many enterprises have implemented privacy-focused solutions to reduce the digital footprint of executives by removing personal data from broker sites. This is a logical first step, but as Pierson points out, it only offers partial protection.</p><p>Today, personal data isn’t limited to a single source. It is constantly collected, sold, leaked, and reshuffled across many channels. Even when successfully removed from one platform, it often reappears elsewhere—sometimes accidentally, through everyday activities like online shopping or registration for accounts.</p><p>More importantly, cutting down visibility does little to tackle active threats. An attacker doesn’t need complete information to succeed; they just need enough.</p><p>This creates a misleading sense of progress for security leaders. Privacy efforts may reduce the attack surface, but they don’t eliminate the underlying risks. Without additional layers of protection, executives remain vulnerable in environments where attackers increasingly target them.</p><p><strong><em><a href="https://em360tech.com/tech-articles/executive-cyber-risk-2026" rel="noopener noreferrer" target="_blank">Also Read: Deepfakes, Data Brokers, and Home Networks: The Executive Threat Landscape CISOs Can’t Ignore in 2026</a></em></strong></p><h2>What is the New Layer of Enterprise Security?</h2><p>What is developing is not merely an extension of existing cybersecurity practices but a new discipline. It’s an approach that treats executives as a critical, high-risk perimeter on their own.</p><p>The CEO of BlackCloak describes this as a more comprehensive protection model that covers all aspects of an executive’s digital life. It goes beyond corporate endpoints to include personal devices, home networks, and the wider ecosystem where executives and their families live.</p><p>Enterprise security can no longer focus solely on corporate assets. The home network, personal devices, and even the family environment are now part of the overall risk landscape. At the same time, the line between cyber and physical threats continues to blur, increasing the stakes further.</p><p>For IT leaders in enterprise technology, the question is no longer whether these risks exist but how they are being managed. As attackers continue to adapt, the path into the enterprise is not through the front door but through the people who have the keys and everything that surrounds them.</p><h3>Key Takeaways</h3><ul><li>Executives are the new cybersecurity perimeter and top attack targets.</li><li>Personal devices and home networks increase enterprise cyber risk.</li><li>Data broker removal alone cannot protect executive privacy.</li><li><strong><a href="https://em360tech.com/whitepapers/ponemon-research-report-digital-executive-protection-2025" rel="noopener noreferrer" target="_blank">Digital executive protection</a></strong> requires multi-layered security solutions.</li><li>Cybersecurity strategies must address physical and cyber threat convergence.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity Challenges for Executives</li><li>01:02 Understanding Executive Risk and Attack Surfaces</li><li>06:31 The Role of Data Brokers in Cybersecurity</li><li>10:13 Home Networks as New Battlegrounds</li><li>13:00 Comprehensive Digital Executive Protection Strategies</li><li>18:40 The Importance of Outsourcing Executive Protection</li></ul><br/><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://blackcloak.io/" rel="noopener noreferrer" target="_blank">blackcloak.io</a>.</p><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech LinkedIn: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Follow: @EM360Tech on <a href="https://youtube.com/channel/UCNCS0CL4v38JWbNaqnn0G4w/" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p><strong>BlackCloak YT: <a href="https://www.youtube.com/@blackcloakcyber" rel="noopener noreferrer" target="_blank">@blackcloakcyber</a></strong></p><p><strong>LinkedIn: <a href="https://www.linkedin.com/company/blackcloak/%20BlackCloak" rel="noopener noreferrer" target="_blank">@BLACKCLOAK</a></strong></p><p><strong>BlackCloak X: <a href="https://x.com/BlackCloakCyber" rel="noopener noreferrer" target="_blank">@BlackCloakCyber</a></strong></p><p>#ExecutiveCybersecurity #DigitalExecutiveProtection #CyberRisk #BlackCloak #CISO #HomeNetworkSecurity #Cybersecurity #ExecutiveRisk #CorporateBreaches #CyberStrategy #CEORisk #HomeNetwork #PersonalLives #AttackSurface #DataBrokers #CyberThreats #PhysicalThreats #TheSecurityStrategist #DrChrisPierson #RichardStiennon #EM360Tech #SecurityStrategy #CorporateSecurity #AccountTakeover #SoftTargets #HomeWiFiBreach</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast Series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/drchristopherpierson/" rel="noopener noreferrer" target="_blank">Dr Chris Pierson, Founder and CEO of BlackCloak</a></strong></p><p>There has always been a boundary in the enterprise technology corporate network. However, that boundary has been fading for a while, and now it may have completely vanished.</p><p>In the recent conversation on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, cybersecurity expert Dr Chris Pierson, also the Founder and CEO of <strong><a href="https://em360tech.com/solution-providers/blackcloak" rel="noopener noreferrer" target="_blank">BlackCloak</a></strong>, joined host Richard Stiennon, Chief Research Analyst at IT-Harvest.</p><p>The BlackCloak CEO presented a reality that many CISOs are only now facing. The most critical vulnerabilities in an enterprise may lie far beyond corporate control, embedded in the personal lives of its leadership.</p><h2>Why Attackers are After Soft Targets?</h2><p>Pierson explains that attackers are no longer focused on directly breaching secure enterprise systems. Instead, they are targeting individuals with the highest levels of access in a more effective way.</p><p>Executives and board members have always been appealing targets, but the strategies have changed. Personal email accounts, home Wi-Fi networks, and even family members are now part of the <strong><a href="https://em360tech.com/tech-articles/what-is-attack-surface-management" rel="noopener noreferrer" target="_blank">attack surface</a></strong>. These environments generally lack the layered defences of corporate infrastructure, making them easier to exploit.</p><p>The stakes are high. A compromised home network or personal device can quickly provide access to enterprise systems. Even simple attacks, such as text messages pretending to be from a CEO, can work when aimed at those outside formal security measures.</p><p>What makes this trend especially dangerous is its subtlety. These attacks rarely look like the major breaches that make the news. Instead, they happen quietly, taking advantage of everyday behaviours in settings that were never meant to withstand sophisticated threats.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-attackers-exploit-executives-personal-lives-breach-companies" rel="noopener noreferrer" target="_blank">Also Watch: How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?</a></em></strong></p><h2>Why Privacy Measures Aren’t Enough</h2><p>In response, many enterprises have implemented privacy-focused solutions to reduce the digital footprint of executives by removing personal data from broker sites. This is a logical first step, but as Pierson points out, it only offers partial protection.</p><p>Today, personal data isn’t limited to a single source. It is constantly collected, sold, leaked, and reshuffled across many channels. Even when successfully removed from one platform, it often reappears elsewhere—sometimes accidentally, through everyday activities like online shopping or registration for accounts.</p><p>More importantly, cutting down visibility does little to tackle active threats. An attacker doesn’t need complete information to succeed; they just need enough.</p><p>This creates a misleading sense of progress for security leaders. Privacy efforts may reduce the attack surface, but they don’t eliminate the underlying risks. Without additional layers of protection, executives remain vulnerable in environments where attackers increasingly target them.</p><p><strong><em><a href="https://em360tech.com/tech-articles/executive-cyber-risk-2026" rel="noopener noreferrer" target="_blank">Also Read: Deepfakes, Data Brokers, and Home Networks: The Executive Threat Landscape CISOs Can’t Ignore in 2026</a></em></strong></p><h2>What is the New Layer of Enterprise Security?</h2><p>What is developing is not merely an extension of existing cybersecurity practices but a new discipline. It’s an approach that treats executives as a critical, high-risk perimeter on their own.</p><p>The CEO of BlackCloak describes this as a more comprehensive protection model that covers all aspects of an executive’s digital life. It goes beyond corporate endpoints to include personal devices, home networks, and the wider ecosystem where executives and their families live.</p><p>Enterprise security can no longer focus solely on corporate assets. The home network, personal devices, and even the family environment are now part of the overall risk landscape. At the same time, the line between cyber and physical threats continues to blur, increasing the stakes further.</p><p>For IT leaders in enterprise technology, the question is no longer whether these risks exist but how they are being managed. As attackers continue to adapt, the path into the enterprise is not through the front door but through the people who have the keys and everything that surrounds them.</p><h3>Key Takeaways</h3><ul><li>Executives are the new cybersecurity perimeter and top attack targets.</li><li>Personal devices and home networks increase enterprise cyber risk.</li><li>Data broker removal alone cannot protect executive privacy.</li><li><strong><a href="https://em360tech.com/whitepapers/ponemon-research-report-digital-executive-protection-2025" rel="noopener noreferrer" target="_blank">Digital executive protection</a></strong> requires multi-layered security solutions.</li><li>Cybersecurity strategies must address physical and cyber threat convergence.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity Challenges for Executives</li><li>01:02 Understanding Executive Risk and Attack Surfaces</li><li>06:31 The Role of Data Brokers in Cybersecurity</li><li>10:13 Home Networks as New Battlegrounds</li><li>13:00 Comprehensive Digital Executive Protection Strategies</li><li>18:40 The Importance of Outsourcing Executive Protection</li></ul><br/><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://blackcloak.io/" rel="noopener noreferrer" target="_blank">blackcloak.io</a>.</p><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech LinkedIn: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Follow: @EM360Tech on <a href="https://youtube.com/channel/UCNCS0CL4v38JWbNaqnn0G4w/" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p><strong>BlackCloak YT: <a href="https://www.youtube.com/@blackcloakcyber" rel="noopener noreferrer" target="_blank">@blackcloakcyber</a></strong></p><p><strong>LinkedIn: <a href="https://www.linkedin.com/company/blackcloak/%20BlackCloak" rel="noopener noreferrer" target="_blank">@BLACKCLOAK</a></strong></p><p><strong>BlackCloak X: <a href="https://x.com/BlackCloakCyber" rel="noopener noreferrer" target="_blank">@BlackCloakCyber</a></strong></p><p>#ExecutiveCybersecurity #DigitalExecutiveProtection #CyberRisk #BlackCloak #CISO #HomeNetworkSecurity #Cybersecurity #ExecutiveRisk #CorporateBreaches #CyberStrategy #CEORisk #HomeNetwork #PersonalLives #AttackSurface #DataBrokers #CyberThreats #PhysicalThreats #TheSecurityStrategist #DrChrisPierson #RichardStiennon #EM360Tech #SecurityStrategy #CorporateSecurity #AccountTakeover #SoftTargets #HomeWiFiBreach</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f8ebfec4-aa15-41ef-ae77-2777cbe365dc</guid><itunes:image href="https://artwork.captivate.fm/e1c16340-0aef-4b84-b590-91b18a94ade6/2026-42-This-Is-Where-Security-Completely-Breaks-Dr-Christopher.jpg"/><pubDate>Tue, 07 Apr 2026 11:11:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/f8ebfec4-aa15-41ef-ae77-2777cbe365dc.mp3" length="52875541" type="audio/mpeg"/><itunes:duration>22:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>110</itunes:episode><podcast:episode>110</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy"><podcast:source uri="https://youtu.be/37pgiTlJXm0"/></podcast:alternateEnclosure></item><item><title>Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism</title><itunes:title>Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism</itunes:title><description><![CDATA[<p>There is a moment in every investigation where time becomes the deciding factor.</p><p>Not capability, not intent, but time. In modern counter-terrorism, that moment arrives faster than ever because the evidence is no longer waiting to be found. It already exists, scattered across devices, platforms, and networks, growing silently in volume.</p><p>The question is no longer whether the data is there. It’s whether it can be understood quickly enough to matter.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>, EM360Tech host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay&nbsp;</a>and&nbsp;<a href="https://www.linkedin.com/in/christopher-johnson-477257110/" rel="noopener noreferrer" target="_blank">Chris Johnson</a>, CEO of&nbsp;<a href="https://www.cyacomb.com/" rel="noopener noreferrer" target="_blank">Cyacomb</a>, explore how digital evidence is reshaping counter-terrorism and why the real challenge isn’t access to information, but the ability to act on it without crossing the line into overreach.</p><h2>Why Digital Evidence Is Reshaping Counter-Terrorism</h2><p>Digital evidence has become central to modern counter-terrorism investigations. From mobile devices and encrypted messaging platforms to online communities, nearly every case now involves large-scale digital analysis. The challenge is not access, it’s volume and complexity.</p><p>A single device can hold vast amounts of data, and across thousands of investigations, this creates significant backlogs. Investigators must sift through irrelevant, fragmented, and often encrypted information to identify credible threats.</p><p>At the same time, the threat landscape is changing drastically. Terrorist networks are more decentralised, digitally enabled, and adaptive in how they communicate. This forces law enforcement to rethink how investigations are conducted basically shifting toward digital forensics, data analysis, and real-time intelligence gathering. As Johnson highlights, the ability to deal with data quickly is not new, but the scale of the problem has changed dramatically.</p><h2>Managing Data, Risk and Operational Pressure</h2><p>Speed sits at the centre of modern counter-terrorism operations, where even minor delays in analysing digital evidence can result in missed warning signs or postponed intervention. The increasing speed is far from straightforward. Investigators must contend with vast volumes of data spread across multiple devices, alongside a growing diversity of formats and platforms that complicate analysis.&nbsp;</p><p>Layered on top of this are manual processes that slow case progression and persistent operational backlogs that delay access to critical insights. The result is a bottleneck in which time-sensitive intelligence risks being lost in a sea of noise. In response, organisations are turning to advanced digital forensics tools and automation to&nbsp;<a href="https://em360tech.com/podcasts/revenue-ready-data-not-magic-its-engineering" rel="noopener noreferrer" target="_blank">streamline workflows</a>, prioritise relevant data, and reduce the burden of manual investigation. However, efficiency alone does not solve the problem. Accelerating processes without robust controls introduces new risks, particularly when handling sensitive personal data, where speed must be carefully balanced with accuracy, oversight, and compliance.</p><h2>Privacy and Security with AI in Digital Investigations</h2><p>Artificial intelligence is becoming an increasingly significant tool in digital forensics and counter-terrorism investigations, largely due to its ability to process data at scale, identify patterns, and rapidly surface relevant insights. This capability enables faster identification of high-risk material, more informed decision-making during investigations, and a reduced dependence on manual data review, which has traditionally been time-consuming and resource-intensive.&nbsp;</p><p>However, the&nbsp;<a href="https://em360tech.com/podcasts/democratising-cybercrime-how-ai-changing-enterprise-security" rel="noopener noreferrer" target="_blank">integration of AI</a>&nbsp;into law enforcement also introduces important ethical and legal challenges that cannot be overlooked. Counter-terrorism operations must remain firmly within established frameworks that safeguard privacy and civil liberties, as failing to do so risks undermining public trust in both the technology and the institutions that deploy it. In response, privacy-assured AI and specialist investigative tools are emerging, designed to minimise exposure to irrelevant personal data, concentrate only on content linked to potential threats, and support transparent, compliant investigative processes. As Johnson notes, while AI has a clear and valuable role in modern law enforcement, its effectiveness ultimately depends on the responsibility and governance with which it is implemented.</p><h2>The Future of Counter-Terrorism</h2><p>The next phase of counter-terrorism will be defined by the ability to turn data into actionable intelligence quickly and responsibly.</p><p>This means:</p><ul><li>Reducing investigative backlogs;</li><li>Integrating AI into core workflows;</li><li>Improving collaboration across systems and teams;</li><li>Embedding privacy into the design of investigative technologies.</li></ul><br/><p>Digital evidence will only continue to grow. The organisations that succeed will be those that can navigate the intersection of speed, scale, and privacy without compromising any one of them. In modern counter-terrorism, advantage is no longer just about access to information; it’s about how effectively you can act on it.</p><h2>Takeaways</h2><ul><li>Digital evidence and data volumes in investigations</li><li>Evolving threat landscape and global tensions</li><li>Privacy, civil liberties, and ethical considerations</li><li>Operational efficiency and technological innovations</li><li>Future trends in law enforcement technology</li></ul><br/><h2>Chapters</h2><p>00:00 The Evolving Role of Digital Evidence in Counter-Terrorism</p><p>07:10 Challenges in Analysing Digital Evidence</p><p>13:02 Balancing Privacy and Security in Investigations</p><p>20:09 Future of Counter-Terrorism and Technology</p>]]></description><content:encoded><![CDATA[<p>There is a moment in every investigation where time becomes the deciding factor.</p><p>Not capability, not intent, but time. In modern counter-terrorism, that moment arrives faster than ever because the evidence is no longer waiting to be found. It already exists, scattered across devices, platforms, and networks, growing silently in volume.</p><p>The question is no longer whether the data is there. It’s whether it can be understood quickly enough to matter.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>, EM360Tech host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay&nbsp;</a>and&nbsp;<a href="https://www.linkedin.com/in/christopher-johnson-477257110/" rel="noopener noreferrer" target="_blank">Chris Johnson</a>, CEO of&nbsp;<a href="https://www.cyacomb.com/" rel="noopener noreferrer" target="_blank">Cyacomb</a>, explore how digital evidence is reshaping counter-terrorism and why the real challenge isn’t access to information, but the ability to act on it without crossing the line into overreach.</p><h2>Why Digital Evidence Is Reshaping Counter-Terrorism</h2><p>Digital evidence has become central to modern counter-terrorism investigations. From mobile devices and encrypted messaging platforms to online communities, nearly every case now involves large-scale digital analysis. The challenge is not access, it’s volume and complexity.</p><p>A single device can hold vast amounts of data, and across thousands of investigations, this creates significant backlogs. Investigators must sift through irrelevant, fragmented, and often encrypted information to identify credible threats.</p><p>At the same time, the threat landscape is changing drastically. Terrorist networks are more decentralised, digitally enabled, and adaptive in how they communicate. This forces law enforcement to rethink how investigations are conducted basically shifting toward digital forensics, data analysis, and real-time intelligence gathering. As Johnson highlights, the ability to deal with data quickly is not new, but the scale of the problem has changed dramatically.</p><h2>Managing Data, Risk and Operational Pressure</h2><p>Speed sits at the centre of modern counter-terrorism operations, where even minor delays in analysing digital evidence can result in missed warning signs or postponed intervention. The increasing speed is far from straightforward. Investigators must contend with vast volumes of data spread across multiple devices, alongside a growing diversity of formats and platforms that complicate analysis.&nbsp;</p><p>Layered on top of this are manual processes that slow case progression and persistent operational backlogs that delay access to critical insights. The result is a bottleneck in which time-sensitive intelligence risks being lost in a sea of noise. In response, organisations are turning to advanced digital forensics tools and automation to&nbsp;<a href="https://em360tech.com/podcasts/revenue-ready-data-not-magic-its-engineering" rel="noopener noreferrer" target="_blank">streamline workflows</a>, prioritise relevant data, and reduce the burden of manual investigation. However, efficiency alone does not solve the problem. Accelerating processes without robust controls introduces new risks, particularly when handling sensitive personal data, where speed must be carefully balanced with accuracy, oversight, and compliance.</p><h2>Privacy and Security with AI in Digital Investigations</h2><p>Artificial intelligence is becoming an increasingly significant tool in digital forensics and counter-terrorism investigations, largely due to its ability to process data at scale, identify patterns, and rapidly surface relevant insights. This capability enables faster identification of high-risk material, more informed decision-making during investigations, and a reduced dependence on manual data review, which has traditionally been time-consuming and resource-intensive.&nbsp;</p><p>However, the&nbsp;<a href="https://em360tech.com/podcasts/democratising-cybercrime-how-ai-changing-enterprise-security" rel="noopener noreferrer" target="_blank">integration of AI</a>&nbsp;into law enforcement also introduces important ethical and legal challenges that cannot be overlooked. Counter-terrorism operations must remain firmly within established frameworks that safeguard privacy and civil liberties, as failing to do so risks undermining public trust in both the technology and the institutions that deploy it. In response, privacy-assured AI and specialist investigative tools are emerging, designed to minimise exposure to irrelevant personal data, concentrate only on content linked to potential threats, and support transparent, compliant investigative processes. As Johnson notes, while AI has a clear and valuable role in modern law enforcement, its effectiveness ultimately depends on the responsibility and governance with which it is implemented.</p><h2>The Future of Counter-Terrorism</h2><p>The next phase of counter-terrorism will be defined by the ability to turn data into actionable intelligence quickly and responsibly.</p><p>This means:</p><ul><li>Reducing investigative backlogs;</li><li>Integrating AI into core workflows;</li><li>Improving collaboration across systems and teams;</li><li>Embedding privacy into the design of investigative technologies.</li></ul><br/><p>Digital evidence will only continue to grow. The organisations that succeed will be those that can navigate the intersection of speed, scale, and privacy without compromising any one of them. In modern counter-terrorism, advantage is no longer just about access to information; it’s about how effectively you can act on it.</p><h2>Takeaways</h2><ul><li>Digital evidence and data volumes in investigations</li><li>Evolving threat landscape and global tensions</li><li>Privacy, civil liberties, and ethical considerations</li><li>Operational efficiency and technological innovations</li><li>Future trends in law enforcement technology</li></ul><br/><h2>Chapters</h2><p>00:00 The Evolving Role of Digital Evidence in Counter-Terrorism</p><p>07:10 Challenges in Analysing Digital Evidence</p><p>13:02 Balancing Privacy and Security in Investigations</p><p>20:09 Future of Counter-Terrorism and Technology</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c0fddc24-91a1-4230-8806-e253377e8d5c</guid><itunes:image href="https://artwork.captivate.fm/a2851210-725d-45f1-aec2-acebc599eb29/ry-2.png"/><pubDate>Wed, 01 Apr 2026 13:58:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c0fddc24-91a1-4230-8806-e253377e8d5c.mp3" length="55645272" type="audio/mpeg"/><itunes:duration>23:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>109</itunes:episode><podcast:episode>109</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism"><podcast:source uri="https://youtu.be/F4EY1DyTCD8"/></podcast:alternateEnclosure></item><item><title>Democratising Cybercrime: How AI is Changing Enterprise Security</title><itunes:title>Democratising Cybercrime: How AI is Changing Enterprise Security</itunes:title><description><![CDATA[<p>AI isn’t introducing entirely new cyber threats, but it is changing how easily they can be executed, and by whom. In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em>,</a>&nbsp;<a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech</a>&nbsp;host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/?skipRedirect=true" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/darren-anstee-934825a/" rel="noopener noreferrer" target="_blank">Darren Anstee</a>, Chief Technology Officer for Security at&nbsp;<a href="https://www.netscout.com/" rel="noopener noreferrer" target="_blank">NETSCOUT</a>, about how conversational AI is lowering the barrier to entry for cyberattacks.&nbsp;</p><p>Drawing on real-world telemetry from thousands of enterprises and service providers, Anstee outlines how the threat landscape is shifting not through new attack types, but through scale, speed, and accessibility. At the centre of that shift are two forces, in his words, simplification and automation.</p><h2>How AI is Changing Cyber Attacks</h2><p>From a Distributed Denial-of-Service (DDoS) perspective, Anstee says, “AI isn’t creating fundamentally new attack vectors. Instead, it’s making existing ones easier to execute”. Historically, launching a sophisticated attack required time, expertise, and intent. Attackers would need to scan a target, identify vulnerabilities, select the right attack vectors, and continuously adapt based on how defences responded. That process demanded both technical knowledge and active decision-making. Now, much of that can be abstracted away.</p><p>As a result, conversational interfaces are increasingly being integrated into attack tools, allowing users to issue simple, natural language instructions. Behind the scenes, those tools can run reconnaissance, analyse results, select attack methods, and even adapt in real time if defences respond. As Anstee puts it, “the whole need for there being any knowledge in the seat has gone away.” The result is not necessarily more advanced attackers, but more attackers capable of attempting advanced techniques.</p><h2>The Democratisation of Cyber Attacks</h2><p>This shift has direct implications for enterprise risk. As sophisticated capabilities become more accessible, the volume and distribution of attacks change. Organisations that were previously unlikely targets are now within scope, not because they are high-value, but because they are reachable.</p><p>Anstee points to a growing trend, and that is attackers moving beyond heavily defended primary targets and focusing on secondary organisations within the digital supply chain. Suppliers, service providers, and partners often present a weaker entry point, while still offering indirect access to larger ecosystems. In practical terms, this expands the attack surface.</p><p>It also exposes a gap in how many organisations think about risk. Dependencies are not always fully mapped, and the resilience of third-party services is often assumed rather than verified. When those dependencies fail, be it through DDoS disruption or another incident, the impact can cascade quickly. What’s changing is not just who gets targeted, but how risk propagates across interconnected systems. This shift is being accelerated by automation.</p><h2>Automation and Efficiency in Cybercrime</h2><p>Automation is what turns accessibility into scale. The steps involved in launching an attack, reconnaissance, analysis, execution, and adaptation, can be structured as decision trees. AI systems can follow those paths quickly and consistently, removing the need for manual intervention at each stage. This has two consequences. First, it increases the frequency of attacks. More actors can launch them, and they can do so with less effort. Second, it compresses response time. Attacks can adapt dynamically, forcing defenders to react faster and with greater precision.</p><p>For many organisations, this exposes a mismatch between perceived and actual readiness. As Anstee notes, having defensive tools in place is not the same as knowing how they perform under real conditions. Firewalls and baseline protections may handle simple attacks, but they are often insufficient against multi-vector, adaptive threats. This is where his emphasis on certainty becomes critical.</p><p>Confidence—based on vendor claims or assumed coverage is not enough. Organisations need real visibility into how their defences behave in practice, across environments, and under pressure. Without that, decision-making is based on assumptions rather than evidence. In a landscape shaped by automation, that gap becomes harder to sustain.</p><p>For more information, visit&nbsp;<a href="http://netscout.com/" rel="noopener noreferrer" target="_blank">netscout.com</a></p><h2>Takeaways</h2><ul><li>AI is simplifying and automating cyber attacks, making them accessible to a broader range of attackers</li><li>Enterprises must reassess their risk management strategies&nbsp;</li><li>The cost of cybersecurity is likely to rise as organisations enhance their defences</li><li>AI's impact on cyber attack sophistication</li><li>Democratisation of attack capabilities</li><li>Automation in attack execution</li><li>Supply chain vulnerabilities and third-party risks</li><li>Certainty vs. confidence in cybersecurity decision-making&nbsp;</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity and AI</p><p>02:28 The Evolving Threat Landscape</p><p>06:36 Automation and Cost Implications of AI in Cybercrime</p><p>11:20 AI's Role in Existing and New Attack Vectors</p><p>13:36 Understanding Supply Chain Risks</p><p>17:25 The Importance of Certainty Over Confidence</p><p>20:33 Strategic Actions for C-Suite Leaders</p>]]></description><content:encoded><![CDATA[<p>AI isn’t introducing entirely new cyber threats, but it is changing how easily they can be executed, and by whom. In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em>,</a>&nbsp;<a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech</a>&nbsp;host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/?skipRedirect=true" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/darren-anstee-934825a/" rel="noopener noreferrer" target="_blank">Darren Anstee</a>, Chief Technology Officer for Security at&nbsp;<a href="https://www.netscout.com/" rel="noopener noreferrer" target="_blank">NETSCOUT</a>, about how conversational AI is lowering the barrier to entry for cyberattacks.&nbsp;</p><p>Drawing on real-world telemetry from thousands of enterprises and service providers, Anstee outlines how the threat landscape is shifting not through new attack types, but through scale, speed, and accessibility. At the centre of that shift are two forces, in his words, simplification and automation.</p><h2>How AI is Changing Cyber Attacks</h2><p>From a Distributed Denial-of-Service (DDoS) perspective, Anstee says, “AI isn’t creating fundamentally new attack vectors. Instead, it’s making existing ones easier to execute”. Historically, launching a sophisticated attack required time, expertise, and intent. Attackers would need to scan a target, identify vulnerabilities, select the right attack vectors, and continuously adapt based on how defences responded. That process demanded both technical knowledge and active decision-making. Now, much of that can be abstracted away.</p><p>As a result, conversational interfaces are increasingly being integrated into attack tools, allowing users to issue simple, natural language instructions. Behind the scenes, those tools can run reconnaissance, analyse results, select attack methods, and even adapt in real time if defences respond. As Anstee puts it, “the whole need for there being any knowledge in the seat has gone away.” The result is not necessarily more advanced attackers, but more attackers capable of attempting advanced techniques.</p><h2>The Democratisation of Cyber Attacks</h2><p>This shift has direct implications for enterprise risk. As sophisticated capabilities become more accessible, the volume and distribution of attacks change. Organisations that were previously unlikely targets are now within scope, not because they are high-value, but because they are reachable.</p><p>Anstee points to a growing trend, and that is attackers moving beyond heavily defended primary targets and focusing on secondary organisations within the digital supply chain. Suppliers, service providers, and partners often present a weaker entry point, while still offering indirect access to larger ecosystems. In practical terms, this expands the attack surface.</p><p>It also exposes a gap in how many organisations think about risk. Dependencies are not always fully mapped, and the resilience of third-party services is often assumed rather than verified. When those dependencies fail, be it through DDoS disruption or another incident, the impact can cascade quickly. What’s changing is not just who gets targeted, but how risk propagates across interconnected systems. This shift is being accelerated by automation.</p><h2>Automation and Efficiency in Cybercrime</h2><p>Automation is what turns accessibility into scale. The steps involved in launching an attack, reconnaissance, analysis, execution, and adaptation, can be structured as decision trees. AI systems can follow those paths quickly and consistently, removing the need for manual intervention at each stage. This has two consequences. First, it increases the frequency of attacks. More actors can launch them, and they can do so with less effort. Second, it compresses response time. Attacks can adapt dynamically, forcing defenders to react faster and with greater precision.</p><p>For many organisations, this exposes a mismatch between perceived and actual readiness. As Anstee notes, having defensive tools in place is not the same as knowing how they perform under real conditions. Firewalls and baseline protections may handle simple attacks, but they are often insufficient against multi-vector, adaptive threats. This is where his emphasis on certainty becomes critical.</p><p>Confidence—based on vendor claims or assumed coverage is not enough. Organisations need real visibility into how their defences behave in practice, across environments, and under pressure. Without that, decision-making is based on assumptions rather than evidence. In a landscape shaped by automation, that gap becomes harder to sustain.</p><p>For more information, visit&nbsp;<a href="http://netscout.com/" rel="noopener noreferrer" target="_blank">netscout.com</a></p><h2>Takeaways</h2><ul><li>AI is simplifying and automating cyber attacks, making them accessible to a broader range of attackers</li><li>Enterprises must reassess their risk management strategies&nbsp;</li><li>The cost of cybersecurity is likely to rise as organisations enhance their defences</li><li>AI's impact on cyber attack sophistication</li><li>Democratisation of attack capabilities</li><li>Automation in attack execution</li><li>Supply chain vulnerabilities and third-party risks</li><li>Certainty vs. confidence in cybersecurity decision-making&nbsp;</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity and AI</p><p>02:28 The Evolving Threat Landscape</p><p>06:36 Automation and Cost Implications of AI in Cybercrime</p><p>11:20 AI's Role in Existing and New Attack Vectors</p><p>13:36 Understanding Supply Chain Risks</p><p>17:25 The Importance of Certainty Over Confidence</p><p>20:33 Strategic Actions for C-Suite Leaders</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8322e29f-697f-4fe2-af6b-84584ab8f5d3</guid><itunes:image href="https://artwork.captivate.fm/72e604a8-3c5c-4e65-a554-d263faf1dcc1/2026-41-Are-AI-driven-cyber-attacks-just-a-new-spin-on-old-thre.jpg"/><pubDate>Tue, 31 Mar 2026 09:05:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/8322e29f-697f-4fe2-af6b-84584ab8f5d3.mp3" length="53000821" type="audio/mpeg"/><itunes:duration>22:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>108</itunes:episode><podcast:episode>108</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Democratising Cybercrime: How AI is Changing Enterprise Security"><podcast:source uri="https://youtu.be/vP5ZOFDQ4Ok"/></podcast:alternateEnclosure></item><item><title>Cyber Resilience in Microsoft 365: What Security Leaders Must Know</title><itunes:title>Cyber Resilience in Microsoft 365: What Security Leaders Must Know</itunes:title><description><![CDATA[<p>Many organisations assume that moving to the cloud means much of their security posture is handled automatically. But that assumption can create blind spots. In the latest episode of the Security Strategist Podcast, <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> from EM360Tech speaks with <a href="https://www.linkedin.com/in/rob-edmondson/" rel="noopener noreferrer" target="_blank">Rob Edmondson</a>, Senior Director of Product Marketing at <a href="https://www.coreview.com/" rel="noopener noreferrer" target="_blank">CoreView</a>, about cyber resilience in Microsoft 365 environments and what tenant hardening means in practice.</p><p>As organisations rely more heavily on Microsoft 365 for collaboration, identity management, and device control, understanding how the environment is configured becomes increasingly important for security teams.</p><h2>Microsoft 365 Has Grown Beyond Its Original Scope</h2><p>When Microsoft first introduced Microsoft 365 as Office 365, it primarily focused on email and productivity tools. Security strategies often revolved around protecting inboxes and ensuring that business data was backed up. According to Edmondson, that model no longer reflects how the platform is used today. Microsoft 365 now includes a wide range of services that support identity management, device management, compliance, and collaboration. Many of these services sit at the centre of daily business operations.</p><p>This shift means that security risks are no longer limited to email or file storage. Identity platforms, collaboration tools, and endpoint management capabilities all operate within the same tenant. If critical settings are misconfigured, the impact can extend across multiple systems at once. For security leaders, the challenge is recognising that the platform has evolved into something far more complex than many organisations initially planned for.</p><h2>Why Visibility Into Configurations Is Still Limited</h2><p>One of the main themes in the discussion is visibility. Edmondson explains that many organisations simply do not have a clear view of how configurations change within their Microsoft 365 tenants.</p><p>Attackers often exploit these blind spots. If they gain access to an environment, they may modify configurations that allow them to regain access later. Because some of these changes are subtle, they may go unnoticed for long periods. However, not all configuration drift comes from attackers. Administrative errors or platform updates can also change settings in ways that affect security or operations.</p><p>This is why documentation still plays a role. Edmondson suggests that even basic records of key configurations can help organisations understand their environment and recover faster during incidents. While documenting every setting in a large tenant may not always be practical, identifying and tracking the most critical configurations can provide a starting point for stronger oversight.</p><h2>Reducing Privilege and Strengthening Tenant Resilience</h2><p>Another concern discussed in the episode is the issue of excessive privileges. Many administrator roles in Microsoft 365 grant access across an entire tenant, which can increase risk if those accounts are compromised. Edmondson argues that reducing standing privileges should be a priority. Instead of granting broad permissions by default, organisations should consider limiting administrative access to only what is necessary.</p><p>Tenant hardening plays an important role here. By tightening configuration controls and carefully managing privileges, organisations can reduce the likelihood that a single compromised account leads to a wider security incident.</p><p>The goal is not simply to add more security controls, but to build a clearer understanding of how the tenant operates and how it could be restored if something goes wrong. The full conversation on the Security Strategist Podcast explores these challenges in greater depth, including configuration visibility, tenant recovery scenarios, and the practical steps security teams can take to improve resilience in Microsoft 365 environments.</p><p>If you would like to find out more, visit <a href="http://coreview.com/" rel="noopener noreferrer" target="_blank">coreview.com</a></p><h2>Chapters</h2><p>00:00 Introduction to Cyber Resilience in Microsoft 365</p><p>01:01 Guest Introduction: Rob Edmison and His Role at CoreView</p><p>02:17 Why Confidence in Microsoft 365 Security Falls Short</p><p>04:24 The Expanding Scope of Microsoft 365 Services</p><p>05:27 Visibility Challenges in Microsoft 365 Security</p><p>07:20 Bridging the Gap: Improving Visibility and Configuration Management</p><p>11:05 Risks of Configuration Drift and Tenant Hardening</p><p>16:23 Importance of Configuration Backup in Cyber Resilience</p><p>21:28 Overprivileged Accounts and Tenant Security Risks</p><p>26:04 Balancing Security and Innovation with AI and Automation</p><p>28:37 Tips for Decision Makers</p><h2>Takeaways</h2><ul><li>Microsoft 365 now covers identity, device, compliance, and collaboration tools.</li><li>Security risks extend far beyond just email and file storage.</li><li>Limited visibility into configuration changes creates blind spots.</li><li>Excessive administrative privileges increase the potential impact of a compromise.</li><li>Strengthening configurations and planning for recovery helps organisations respond more quickly.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Many organisations assume that moving to the cloud means much of their security posture is handled automatically. But that assumption can create blind spots. In the latest episode of the Security Strategist Podcast, <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> from EM360Tech speaks with <a href="https://www.linkedin.com/in/rob-edmondson/" rel="noopener noreferrer" target="_blank">Rob Edmondson</a>, Senior Director of Product Marketing at <a href="https://www.coreview.com/" rel="noopener noreferrer" target="_blank">CoreView</a>, about cyber resilience in Microsoft 365 environments and what tenant hardening means in practice.</p><p>As organisations rely more heavily on Microsoft 365 for collaboration, identity management, and device control, understanding how the environment is configured becomes increasingly important for security teams.</p><h2>Microsoft 365 Has Grown Beyond Its Original Scope</h2><p>When Microsoft first introduced Microsoft 365 as Office 365, it primarily focused on email and productivity tools. Security strategies often revolved around protecting inboxes and ensuring that business data was backed up. According to Edmondson, that model no longer reflects how the platform is used today. Microsoft 365 now includes a wide range of services that support identity management, device management, compliance, and collaboration. Many of these services sit at the centre of daily business operations.</p><p>This shift means that security risks are no longer limited to email or file storage. Identity platforms, collaboration tools, and endpoint management capabilities all operate within the same tenant. If critical settings are misconfigured, the impact can extend across multiple systems at once. For security leaders, the challenge is recognising that the platform has evolved into something far more complex than many organisations initially planned for.</p><h2>Why Visibility Into Configurations Is Still Limited</h2><p>One of the main themes in the discussion is visibility. Edmondson explains that many organisations simply do not have a clear view of how configurations change within their Microsoft 365 tenants.</p><p>Attackers often exploit these blind spots. If they gain access to an environment, they may modify configurations that allow them to regain access later. Because some of these changes are subtle, they may go unnoticed for long periods. However, not all configuration drift comes from attackers. Administrative errors or platform updates can also change settings in ways that affect security or operations.</p><p>This is why documentation still plays a role. Edmondson suggests that even basic records of key configurations can help organisations understand their environment and recover faster during incidents. While documenting every setting in a large tenant may not always be practical, identifying and tracking the most critical configurations can provide a starting point for stronger oversight.</p><h2>Reducing Privilege and Strengthening Tenant Resilience</h2><p>Another concern discussed in the episode is the issue of excessive privileges. Many administrator roles in Microsoft 365 grant access across an entire tenant, which can increase risk if those accounts are compromised. Edmondson argues that reducing standing privileges should be a priority. Instead of granting broad permissions by default, organisations should consider limiting administrative access to only what is necessary.</p><p>Tenant hardening plays an important role here. By tightening configuration controls and carefully managing privileges, organisations can reduce the likelihood that a single compromised account leads to a wider security incident.</p><p>The goal is not simply to add more security controls, but to build a clearer understanding of how the tenant operates and how it could be restored if something goes wrong. The full conversation on the Security Strategist Podcast explores these challenges in greater depth, including configuration visibility, tenant recovery scenarios, and the practical steps security teams can take to improve resilience in Microsoft 365 environments.</p><p>If you would like to find out more, visit <a href="http://coreview.com/" rel="noopener noreferrer" target="_blank">coreview.com</a></p><h2>Chapters</h2><p>00:00 Introduction to Cyber Resilience in Microsoft 365</p><p>01:01 Guest Introduction: Rob Edmison and His Role at CoreView</p><p>02:17 Why Confidence in Microsoft 365 Security Falls Short</p><p>04:24 The Expanding Scope of Microsoft 365 Services</p><p>05:27 Visibility Challenges in Microsoft 365 Security</p><p>07:20 Bridging the Gap: Improving Visibility and Configuration Management</p><p>11:05 Risks of Configuration Drift and Tenant Hardening</p><p>16:23 Importance of Configuration Backup in Cyber Resilience</p><p>21:28 Overprivileged Accounts and Tenant Security Risks</p><p>26:04 Balancing Security and Innovation with AI and Automation</p><p>28:37 Tips for Decision Makers</p><h2>Takeaways</h2><ul><li>Microsoft 365 now covers identity, device, compliance, and collaboration tools.</li><li>Security risks extend far beyond just email and file storage.</li><li>Limited visibility into configuration changes creates blind spots.</li><li>Excessive administrative privileges increase the potential impact of a compromise.</li><li>Strengthening configurations and planning for recovery helps organisations respond more quickly.</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a8848289-b3fe-4d93-a0c8-d82d698cf55a</guid><itunes:image href="https://artwork.captivate.fm/bf87c6b2-8b60-4bec-8660-875b756ce865/2026-32-Think-your-Microsoft-365-is-secure-Think-again-Rob-Edmo.jpg"/><pubDate>Mon, 30 Mar 2026 15:56:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/a8848289-b3fe-4d93-a0c8-d82d698cf55a.mp3" length="71490061" type="audio/mpeg"/><itunes:duration>29:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>107</itunes:episode><podcast:episode>107</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Cyber Resilience in Microsoft 365: What Security Leaders Must Know"><podcast:source uri="https://youtu.be/Xp0qHjkgjcg"/></podcast:alternateEnclosure></item><item><title>Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?</title><itunes:title>Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?</itunes:title><description><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Michael Kennedy</a></strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">, </a><strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank"> </a><strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Founder</a></strong></p><p>For leaders in enterprise technology, the pressure to show measurable cybersecurity outcomes has never been greater. Boards are asking tougher questions, attackers are moving faster, and conventional security awareness metrics aren’t telling the whole story.</p><p>In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, is joined by <strong><a href="https://www.ostrasecurity.com/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong> <strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Founder Michael Kennedy</a></strong>, who pointed out a growing gap in how enterprises measure success. Despite years of investment in phishing training and user awareness, breaches keep happening—not because employees are failing on a large scale, but because enterprise systems aren’t designed to handle inevitable mistakes.</p><p>For CIOs, CISOs, and CTOs, this signals a major transition toward outcome-based security.</p><h2>Why Traditional Security Awareness Metrics Fall Short</h2><p>Phishing simulations, reduced click rates, and increased reporting are often seen as proof of a strong cybersecurity strategy. The metrics are easy to track, too.</p><p>However, as Kennedy notes, they provide limited insight into actual risk reduction. Even the most effective awareness programs leave some room for error. In reality, attackers only need one successful attempt to gain access. “If one gets through, that’s enough,” Kennedy suggests, highlighting a truth most security leaders understand but find difficult to measure.</p><p>What these metrics don’t capture is the downstream impact of that failure.</p><p>Two identical <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing attacks </a></strong>can lead to vastly different results depending on the enterprise security setup. In one situation, the threat is neutralised quickly. In another, it escalates into lateral movement, credential theft, or ransomware deployment. For enterprise settings, this gap reveals a basic problem – user-focused metrics assess behaviour.</p><h2>What Outcome-Based Cybersecurity Looks Like?</h2><p>The more effective approach, Kennedy argues, is to frame cybersecurity around engineering outcomes instead of user behaviour.</p><p>This means evaluating how well systems perform during attacks—not how well users avoid making mistakes.</p><p>The key markers of a strong enterprise cybersecurity strategy include how quickly threats are detected, how effectively security teams respond, and how well incidents are contained before they spread. These operational metrics give a clearer view of real-world readiness.</p><p>This shift lines up with the growing adoption of zero trust architectures, <strong><a href="https://em360tech.com/tech-articles/what-xdr-complete-guide-extended-detection-and-response" rel="noopener noreferrer" target="_blank">extended detection and response (XDR)</a></strong>, and AI-driven security operations. All these frameworks focus on containment, visibility, and fast responses rather than the unrealistic goal of perfect user behaviour.</p><p>It also changes how breaches are examined. High-profile incidents are often simplified to stories about weak passwords or phishing clicks, while the more vital question—why controls failed to limit the impact—gets overlooked.</p><p>For enterprise buyers and decision-makers, this can lead to misaligned investments, over-prioritising awareness training while underfunding detection engineering, identity controls, and network segmentation.</p><h2>Why is it Necessary to Create a No-Blame Culture?</h2><p>While the focus shifts away from blaming users, Kennedy emphasises that people still play a vital role in enterprise cybersecurity—just not in the way many enterprises think.</p><p>In enterprise environments where employees fear blame, reporting delays are common. Suspicious emails go unreported, incidents remain unnoticed longer, and response times increase.</p><p>In contrast, organisations that create a no-blame security culture see users acting as an extension of their detection capabilities. Employees who feel safe reporting anomalies can identify threats earlier, often before automated systems escalate them.</p><p>This cultural change has measurable operational benefits. Faster reporting reduces dwell time, limits damage, and improves overall incident response effectiveness.</p><p>Some enterprises are formalising this approach through internal collaboration platforms, enabling <strong><a href="https://em360tech.com/top-10/top-10-threat-intelligence-platforms" rel="noopener noreferrer" target="_blank">real-time threat</a></strong> sharing across teams. In doing so, they turn their workforce into a distributed security layer—one that complements, rather than replaces, technical controls.</p><p>The enterprises that succeed in this next phase of cybersecurity maturity will be those that move beyond the “human error” narrative and embrace a truly outcome-based approach to security engineering.</p><p>Because in modern enterprise environments, the question is no longer who clicked—it’s how well the system absorbed the impact.</p><h3>Key Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity failures are system design issues—not user mistakes.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Click-rate metrics are misleading</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Real success is measured by containment speed and impact reduction.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Strong security culture encourages users to report threats without fear of blame.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engineering outcomes (like detection speed and blast radius control) matter more than user behaviour metrics.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is reshaping both attacks and defence, making faster, smarter response capabilities essential.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity's Human Element</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:15 Reevaluating User Responsibility in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:44 Creating a Culture of Reporting</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:25 Measuring Security Outcomes Beyond Click Rates</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:05 The Role of AI in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:06 Adapting to Evolving Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:44 Key Takeaways for Decision Makers</li></ol><br/><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://ostrasecurity.com/" rel="noopener noreferrer" target="_blank">ostrasecurity.com</a>.</p><h3><strong>Follow: </strong></h3><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a>: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Ostra LinkedIn: <a href="https://www.linkedin.com/company/ostrasecurity/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong></p><p><strong>Ostra X: <a href="https://x.com/ostra_security" rel="noopener noreferrer" target="_blank">@ostra_security</a></strong></p><p><strong>Ostra YouTube: <a href="https://www.youtube.com/channel/UCNCAVMwqcfUdsYQ7oG2dw1g/videos" rel="noopener noreferrer" target="_blank">@OstraCybersecurity</a></strong></p><p>#Cybersecurity #CISO #EnterpriseSecurity #OutcomeBasedSecurity #SecurityMetrics #Phishing #ZeroTrust #AIinSecurity #NoBlameCulture #SecurityStrategist #OstraSecurity</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Michael Kennedy</a></strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">, </a><strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank"> </a><strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Founder</a></strong></p><p>For leaders in enterprise technology, the pressure to show measurable cybersecurity outcomes has never been greater. Boards are asking tougher questions, attackers are moving faster, and conventional security awareness metrics aren’t telling the whole story.</p><p>In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, is joined by <strong><a href="https://www.ostrasecurity.com/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong> <strong><a href="https://www.linkedin.com/in/michaelkennedymn/" rel="noopener noreferrer" target="_blank">Founder Michael Kennedy</a></strong>, who pointed out a growing gap in how enterprises measure success. Despite years of investment in phishing training and user awareness, breaches keep happening—not because employees are failing on a large scale, but because enterprise systems aren’t designed to handle inevitable mistakes.</p><p>For CIOs, CISOs, and CTOs, this signals a major transition toward outcome-based security.</p><h2>Why Traditional Security Awareness Metrics Fall Short</h2><p>Phishing simulations, reduced click rates, and increased reporting are often seen as proof of a strong cybersecurity strategy. The metrics are easy to track, too.</p><p>However, as Kennedy notes, they provide limited insight into actual risk reduction. Even the most effective awareness programs leave some room for error. In reality, attackers only need one successful attempt to gain access. “If one gets through, that’s enough,” Kennedy suggests, highlighting a truth most security leaders understand but find difficult to measure.</p><p>What these metrics don’t capture is the downstream impact of that failure.</p><p>Two identical <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing attacks </a></strong>can lead to vastly different results depending on the enterprise security setup. In one situation, the threat is neutralised quickly. In another, it escalates into lateral movement, credential theft, or ransomware deployment. For enterprise settings, this gap reveals a basic problem – user-focused metrics assess behaviour.</p><h2>What Outcome-Based Cybersecurity Looks Like?</h2><p>The more effective approach, Kennedy argues, is to frame cybersecurity around engineering outcomes instead of user behaviour.</p><p>This means evaluating how well systems perform during attacks—not how well users avoid making mistakes.</p><p>The key markers of a strong enterprise cybersecurity strategy include how quickly threats are detected, how effectively security teams respond, and how well incidents are contained before they spread. These operational metrics give a clearer view of real-world readiness.</p><p>This shift lines up with the growing adoption of zero trust architectures, <strong><a href="https://em360tech.com/tech-articles/what-xdr-complete-guide-extended-detection-and-response" rel="noopener noreferrer" target="_blank">extended detection and response (XDR)</a></strong>, and AI-driven security operations. All these frameworks focus on containment, visibility, and fast responses rather than the unrealistic goal of perfect user behaviour.</p><p>It also changes how breaches are examined. High-profile incidents are often simplified to stories about weak passwords or phishing clicks, while the more vital question—why controls failed to limit the impact—gets overlooked.</p><p>For enterprise buyers and decision-makers, this can lead to misaligned investments, over-prioritising awareness training while underfunding detection engineering, identity controls, and network segmentation.</p><h2>Why is it Necessary to Create a No-Blame Culture?</h2><p>While the focus shifts away from blaming users, Kennedy emphasises that people still play a vital role in enterprise cybersecurity—just not in the way many enterprises think.</p><p>In enterprise environments where employees fear blame, reporting delays are common. Suspicious emails go unreported, incidents remain unnoticed longer, and response times increase.</p><p>In contrast, organisations that create a no-blame security culture see users acting as an extension of their detection capabilities. Employees who feel safe reporting anomalies can identify threats earlier, often before automated systems escalate them.</p><p>This cultural change has measurable operational benefits. Faster reporting reduces dwell time, limits damage, and improves overall incident response effectiveness.</p><p>Some enterprises are formalising this approach through internal collaboration platforms, enabling <strong><a href="https://em360tech.com/top-10/top-10-threat-intelligence-platforms" rel="noopener noreferrer" target="_blank">real-time threat</a></strong> sharing across teams. In doing so, they turn their workforce into a distributed security layer—one that complements, rather than replaces, technical controls.</p><p>The enterprises that succeed in this next phase of cybersecurity maturity will be those that move beyond the “human error” narrative and embrace a truly outcome-based approach to security engineering.</p><p>Because in modern enterprise environments, the question is no longer who clicked—it’s how well the system absorbed the impact.</p><h3>Key Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity failures are system design issues—not user mistakes.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Click-rate metrics are misleading</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Real success is measured by containment speed and impact reduction.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Strong security culture encourages users to report threats without fear of blame.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engineering outcomes (like detection speed and blast radius control) matter more than user behaviour metrics.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is reshaping both attacks and defence, making faster, smarter response capabilities essential.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity's Human Element</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:15 Reevaluating User Responsibility in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:44 Creating a Culture of Reporting</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:25 Measuring Security Outcomes Beyond Click Rates</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:05 The Role of AI in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:06 Adapting to Evolving Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:44 Key Takeaways for Decision Makers</li></ol><br/><p>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://ostrasecurity.com/" rel="noopener noreferrer" target="_blank">ostrasecurity.com</a>.</p><h3><strong>Follow: </strong></h3><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a>: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Ostra LinkedIn: <a href="https://www.linkedin.com/company/ostrasecurity/" rel="noopener noreferrer" target="_blank">Ostra Security</a></strong></p><p><strong>Ostra X: <a href="https://x.com/ostra_security" rel="noopener noreferrer" target="_blank">@ostra_security</a></strong></p><p><strong>Ostra YouTube: <a href="https://www.youtube.com/channel/UCNCAVMwqcfUdsYQ7oG2dw1g/videos" rel="noopener noreferrer" target="_blank">@OstraCybersecurity</a></strong></p><p>#Cybersecurity #CISO #EnterpriseSecurity #OutcomeBasedSecurity #SecurityMetrics #Phishing #ZeroTrust #AIinSecurity #NoBlameCulture #SecurityStrategist #OstraSecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">7aa90434-f453-48e2-b17a-8887634f73fc</guid><itunes:image href="https://artwork.captivate.fm/a7008da6-bbfc-476c-a8a4-7b899fd28084/98-Protection-Still-Gets-You-Breached-3000x3000.jpg"/><pubDate>Tue, 24 Mar 2026 14:40:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/7aa90434-f453-48e2-b17a-8887634f73fc.mp3" length="47259865" type="audio/mpeg"/><itunes:duration>19:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>106</itunes:episode><podcast:episode>106</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?"><podcast:source uri="https://youtu.be/atDhl9dzGtA"/></podcast:alternateEnclosure></item><item><title>Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?</title><itunes:title>Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?</itunes:title><description><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/nathan-rollings-02b65b43/" rel="noopener noreferrer" target="_blank">Nathan Rollings, CISO at Zafran</a></strong></p><p>The cybersecurity enterprise space has been transforming for years, going beyond traditional vulnerability management. According to Nathan Rollings, CISO at Zafran, the next shift is already underway in the B2B Enterprise technology space. It is being driven by automation, AI, and a deeper understanding of context within enterprise environments. </p><p>Rollings sat down with host Richard Stiennon, also the Chief Research Analyst at IT-Harvest on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong> to talk about the need for security teams to move beyond dashboards and risk scores to something more operational–agentic exposure management.</p><p>“Attackers are already using automation and AI,” Stiennon says to Rollings during the podcast. “Meanwhile, most defenders are still focused on risk scores, dashboards, and ticket backlogs.”</p><p>Rollings believes the real opportunity lies in allowing <strong><a href="https://em360tech.com/top-10/security-tools-for-agentic-systems" rel="noopener noreferrer" target="_blank">intelligent systems to analyse exposure continuously</a></strong> and act on it.</p><h2>The Discourse to Agentic Exposure</h2><p>Exposure management often appears as a new discipline, but Rollings believes its roots are much older.</p><p>“If you were to look at a vulnerability management maturity model five or 10 years ago, the characteristics of the most mature programs aligned with what we consider continuous threat exposure management today,” he said.</p><p>Traditional vulnerability management focused heavily on scanning and prioritising flaws. <strong><a href="https://em360tech.com/tech-articles/what-is-continuous-threat-exposure-management" rel="noopener noreferrer" target="_blank">Continuous threat exposure management (CTEM)</a></strong> builds on that by adding context such as internet reachability, compensating controls, and real-time telemetry from security tools.</p><p>Agentic exposure management goes a step further, where autonomous systems help drive the processes themselves. “When we look back at the early days of vulnerability management, we did much of this manually,” Rollings said. “Then we moved toward automated processes. Now, we are moving toward autonomous.”</p><p>Instead of security teams manually distributing vulnerability reports or setting rigid rules for ownership and remediation, AI agents can interpret available telemetry and handle those workflows dynamically. Over time, those same systems may even take remediation actions on their own.</p><p>The challenge is trust, according to Zafran’s CISO. “Enterprises must trust that the actions taken by these systems are safe and effective within their environments.”</p><h2>Anthropic’s AI announcement sends industry ripples</h2><p>The podcast also covered a recent announcement from <strong><a href="https://em360tech.com/tech-articles/meta-vs-anthropic-ai-safeguarding" rel="noopener noreferrer" target="_blank">Anthropic regarding AI-driven code security</a></strong>. This move quickly sparked debate about how generative AI might reshape vulnerability management.</p><p>Stiennon suggested the technology could disrupt parts of the market focused on application security. However, Rollings believes its impact on exposure management will be more limited. “<strong><a href="https://em360tech.com/tech-articles/ai-making-code-inevitable" rel="noopener noreferrer" target="_blank">Code analysis</a></strong> is incredibly powerful,” he said. “But it’s very much a shift-left capability."</p><p>Exposure management operates on the opposite side of the lifecycle. It focuses on production environments, where context decides whether a vulnerability is actually exploitable.</p><p>“A good exposure management platform considers your defence-in-depth strategy,” Rollings explained. “That means tens of integrations across an organisation to understand the residual risk of specific exposures.”</p><p>Runtime behaviour, network paths to the internet, <strong><a href="https://em360tech.com/tech-articles/endpoint-security-needs-switch-reactive-preemptive" rel="noopener noreferrer" target="_blank">endpoint protection policies</a></strong>, and segmentation controls all influence whether a vulnerability is a real risk. Analysing source code alone cannot provide that operational picture.</p><h2>Why context matters more than another risk score</h2><p>For many security teams, vulnerability prioritisation still relies heavily on numerical risk scoring. Rollings argues that this approach often misses the bigger picture. “You’re spending so much money on these security tools,” he said. “The real question is, what is the return? What is the business value?”</p><p>Understanding the effectiveness of existing controls, such as intrusion prevention systems, endpoint detection, or micro-segmentation, can dramatically change how vulnerabilities are prioritised.</p><p>Research cited by Rollings suggests that only around one in 50k vulnerabilities is truly exploitable in a given environment once contextual factors are taken into account. “That means organisations spend enormous effort remediating vulnerabilities that may never actually be reachable,” he added.</p><p>Agentic systems that correlate telemetry across security tools could narrow that focus significantly. This would allow teams to prioritise the small subset of exposures that really matter.</p><p>“Security teams were so focused on detection, assessment, and ticketing that they didn’t have time to dig deeper,” Rollings tells Stiennon. “Agentic capabilities free them to concentrate on the things that truly make a difference.”</p><h3>Key Takeaways</h3><ol><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Exposure management prioritises vulnerabilities using real-world context, not just CVSS scores.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Agentic AI can analyse exposures and automate remediation workflows.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Security context—controls, network paths, and runtime data—determines real exploitability.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Only about <strong>1 in 50,000 vulnerabilities</strong> are truly exploitable in most environments.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>AI-secured code won’t remove runtime risk in live infrastructure.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:19 The Evolution of Exposure Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:31 Impact of AI on Vulnerability Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:34 Contextual Understanding in Exposure Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:37 Efficiency and Cost-Effectiveness in Security Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:08 Key Takeaways for Security Practitioners</li></ol><br/><p>For more information, please visit <strong><a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a></strong> and <strong>www.zafran.io</strong>.</p><h3><strong>Follow: </strong></h3><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a>: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Zafran LinkedIn: <a href="https://www.linkedin.com/company/zafran-security/" rel="noopener noreferrer" target="_blank">Zafran Security</a></strong></p><p><strong>Zafran X: <a href="https://x.com/Zafran_io" rel="noopener noreferrer" target="_blank">@Zafran_io</a></strong></p><p><strong>#AgenticAI #ExposureManagement #VulnerabilityManagement #CTEM #Cybersecurity #CISO #SecurityStrategist #RichardStiennon #NathanRollings #Zafran</strong></p>]]></description><content:encoded><![CDATA[<p><strong>Podcast: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Research Analyst at IT-Harvest</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/nathan-rollings-02b65b43/" rel="noopener noreferrer" target="_blank">Nathan Rollings, CISO at Zafran</a></strong></p><p>The cybersecurity enterprise space has been transforming for years, going beyond traditional vulnerability management. According to Nathan Rollings, CISO at Zafran, the next shift is already underway in the B2B Enterprise technology space. It is being driven by automation, AI, and a deeper understanding of context within enterprise environments. </p><p>Rollings sat down with host Richard Stiennon, also the Chief Research Analyst at IT-Harvest on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong> to talk about the need for security teams to move beyond dashboards and risk scores to something more operational–agentic exposure management.</p><p>“Attackers are already using automation and AI,” Stiennon says to Rollings during the podcast. “Meanwhile, most defenders are still focused on risk scores, dashboards, and ticket backlogs.”</p><p>Rollings believes the real opportunity lies in allowing <strong><a href="https://em360tech.com/top-10/security-tools-for-agentic-systems" rel="noopener noreferrer" target="_blank">intelligent systems to analyse exposure continuously</a></strong> and act on it.</p><h2>The Discourse to Agentic Exposure</h2><p>Exposure management often appears as a new discipline, but Rollings believes its roots are much older.</p><p>“If you were to look at a vulnerability management maturity model five or 10 years ago, the characteristics of the most mature programs aligned with what we consider continuous threat exposure management today,” he said.</p><p>Traditional vulnerability management focused heavily on scanning and prioritising flaws. <strong><a href="https://em360tech.com/tech-articles/what-is-continuous-threat-exposure-management" rel="noopener noreferrer" target="_blank">Continuous threat exposure management (CTEM)</a></strong> builds on that by adding context such as internet reachability, compensating controls, and real-time telemetry from security tools.</p><p>Agentic exposure management goes a step further, where autonomous systems help drive the processes themselves. “When we look back at the early days of vulnerability management, we did much of this manually,” Rollings said. “Then we moved toward automated processes. Now, we are moving toward autonomous.”</p><p>Instead of security teams manually distributing vulnerability reports or setting rigid rules for ownership and remediation, AI agents can interpret available telemetry and handle those workflows dynamically. Over time, those same systems may even take remediation actions on their own.</p><p>The challenge is trust, according to Zafran’s CISO. “Enterprises must trust that the actions taken by these systems are safe and effective within their environments.”</p><h2>Anthropic’s AI announcement sends industry ripples</h2><p>The podcast also covered a recent announcement from <strong><a href="https://em360tech.com/tech-articles/meta-vs-anthropic-ai-safeguarding" rel="noopener noreferrer" target="_blank">Anthropic regarding AI-driven code security</a></strong>. This move quickly sparked debate about how generative AI might reshape vulnerability management.</p><p>Stiennon suggested the technology could disrupt parts of the market focused on application security. However, Rollings believes its impact on exposure management will be more limited. “<strong><a href="https://em360tech.com/tech-articles/ai-making-code-inevitable" rel="noopener noreferrer" target="_blank">Code analysis</a></strong> is incredibly powerful,” he said. “But it’s very much a shift-left capability."</p><p>Exposure management operates on the opposite side of the lifecycle. It focuses on production environments, where context decides whether a vulnerability is actually exploitable.</p><p>“A good exposure management platform considers your defence-in-depth strategy,” Rollings explained. “That means tens of integrations across an organisation to understand the residual risk of specific exposures.”</p><p>Runtime behaviour, network paths to the internet, <strong><a href="https://em360tech.com/tech-articles/endpoint-security-needs-switch-reactive-preemptive" rel="noopener noreferrer" target="_blank">endpoint protection policies</a></strong>, and segmentation controls all influence whether a vulnerability is a real risk. Analysing source code alone cannot provide that operational picture.</p><h2>Why context matters more than another risk score</h2><p>For many security teams, vulnerability prioritisation still relies heavily on numerical risk scoring. Rollings argues that this approach often misses the bigger picture. “You’re spending so much money on these security tools,” he said. “The real question is, what is the return? What is the business value?”</p><p>Understanding the effectiveness of existing controls, such as intrusion prevention systems, endpoint detection, or micro-segmentation, can dramatically change how vulnerabilities are prioritised.</p><p>Research cited by Rollings suggests that only around one in 50k vulnerabilities is truly exploitable in a given environment once contextual factors are taken into account. “That means organisations spend enormous effort remediating vulnerabilities that may never actually be reachable,” he added.</p><p>Agentic systems that correlate telemetry across security tools could narrow that focus significantly. This would allow teams to prioritise the small subset of exposures that really matter.</p><p>“Security teams were so focused on detection, assessment, and ticketing that they didn’t have time to dig deeper,” Rollings tells Stiennon. “Agentic capabilities free them to concentrate on the things that truly make a difference.”</p><h3>Key Takeaways</h3><ol><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Exposure management prioritises vulnerabilities using real-world context, not just CVSS scores.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Agentic AI can analyse exposures and automate remediation workflows.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Security context—controls, network paths, and runtime data—determines real exploitability.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>Only about <strong>1 in 50,000 vulnerabilities</strong> are truly exploitable in most environments.</li><li data-list="ordered"><span class="ql-ui" contenteditable="false"></span>AI-secured code won’t remove runtime risk in live infrastructure.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:19 The Evolution of Exposure Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:31 Impact of AI on Vulnerability Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:34 Contextual Understanding in Exposure Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:37 Efficiency and Cost-Effectiveness in Security Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:08 Key Takeaways for Security Practitioners</li></ol><br/><p>For more information, please visit <strong><a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a></strong> and <strong>www.zafran.io</strong>.</p><h3><strong>Follow: </strong></h3><p><strong>EM360Tech <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>: <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">@enterprisemanagement360</a></strong></p><p><strong>EM360Tech <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a>: <a href="https://www.linkedin.com/company/em360/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>EM360Tech <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a>: <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></strong></p><p><strong>Zafran LinkedIn: <a href="https://www.linkedin.com/company/zafran-security/" rel="noopener noreferrer" target="_blank">Zafran Security</a></strong></p><p><strong>Zafran X: <a href="https://x.com/Zafran_io" rel="noopener noreferrer" target="_blank">@Zafran_io</a></strong></p><p><strong>#AgenticAI #ExposureManagement #VulnerabilityManagement #CTEM #Cybersecurity #CISO #SecurityStrategist #RichardStiennon #NathanRollings #Zafran</strong></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e6c0a2a3-f9c7-49ac-961b-b8f2583aef64</guid><itunes:image href="https://artwork.captivate.fm/32b91e8a-fd97-46ad-8ae8-67569a4602e2/2026-28-You-re-Fixing-98-of-the-Wrong-Vulnerabilities-Nathan-Ro.jpg"/><pubDate>Fri, 20 Mar 2026 10:55:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/e6c0a2a3-f9c7-49ac-961b-b8f2583aef64.mp3" length="44074621" type="audio/mpeg"/><itunes:duration>18:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>105</itunes:episode><podcast:episode>105</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?"><podcast:source uri="https://youtu.be/gn94V8DbnjA"/></podcast:alternateEnclosure></item><item><title>Are You Testing Cyber Recovery or Just Hoping Your Backups Work</title><itunes:title>Are You Testing Cyber Recovery or Just Hoping Your Backups Work</itunes:title><description><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/samuel-woodcock-9745b831/" rel="noopener noreferrer" target="_blank">Sam Woodcock, Senior Director of Solutions Architecture at 11:11 Systems</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank">Shubhangi Dua, Podcast Producer and B2B Tech Journalist at </a><em><a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank">EM360Tech</a></em></strong></p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Shubhangi Dua, Podcast Producer and B2B Tech Journalist at <em>EM360Tech</em>, spoke with Sam Woodcock, Senior Director of Solutions Architecture at 11:11 Systems. They discussed what he sees as one of the biggest issues in cybersecurity today: the gap between confidence and ability.</p><p>Their conversation, based on findings from the company’s latest global survey, revealed a troubling fact. While 81 per cent of IT leaders believe they are ready to recover from a cyberattack, many have already faced serious incidents, sometimes more than once a year.</p><p>Woodcock pointed out that this confidence can be misleading. “If you think about your cyber recovery planning, it often looks strong on paper,” he said. “That can create a false sense of security because cyber recovery is very complex.”</p><p><strong><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank">Analyst Read:</a><em><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank"> Forensic Recovery Is Central to Cyber Resilience</a></em></strong><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank"> </a></p><h2>Cyber Recovery is Not Fixed</h2><p>Woodcock explained that many organisations confuse documented plans with actual readiness. Cyber recovery is not fixed; it must change with the infrastructure, applications, and threats.</p><p>“Change is the only constant in this industry,” he noted. “Things are shifting daily and weekly. What you had in place today can quickly become outdated.”</p><p>Testing often suffers from time and budget constraints. Many companies test just once a year, if at all. Woodcock advises that quarterly testing should be the minimum.</p><p>“You’d rather find those issues now instead of during a real <strong><a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">ransomware incident</a></strong>.”</p><p>The costs of misplaced confidence are high, such as prolonged downtime, growing financial losses, regulatory fines, and damage to reputation. Some survey participants reported recovery times of one to two weeks, while others took over a month.</p><p>The more alarming truth is the risk of getting reinfected. “Enterprises might recover from the first outage and then be hit again,” Woodcock warned. “That extends the recovery time and increases the risk and damage.”</p><h2>How Modern Attackers Hack?</h2><p>One of the most revealing points from the discussion was how modern attackers operate once they gain access. A common way in is through VPN flaws and <strong><a href="https://em360tech.com/tech-articles/what-social-engineering-definition-function-mitigation" rel="noopener noreferrer" target="_blank">social engineering</a></strong>. </p><p>“One of the first things they will do is examine existing documentation within your organisation to understand your recovery strategy,” Woodcock tells Dua. “They’ll look at your company’s cyber incident recovery planning document.”</p><p>Attackers often target backup systems directly to wipe out recovery options before launching ransomware.</p><p>In one case, Woodcock mentioned, a company’s local backup systems were compromised. Luckily, they had maintained immutable cloud backups, allowing them to recover even after the primary backup environment was breached.</p><p>In other cases, entire primary environments were taken offline, forcing organisations to switch to secondary, isolated environments.</p><p>“You need a safe, trusted, clean space to recover your environment,” he said. “That way, you can understand how the attack happened and be confident that your recovery is clean.”</p><p>The idea of the "clean room," or an isolated recovery environment, has become crucial to modern cyber resilience strategies.</p><h2><strong>AI vs. AI: A Weapon &amp; a Defence</strong></h2><p>The conversation also addressed artificial intelligence (AI), both as a weapon and a defence. Woodcock noted that cybercriminals are already using AI to refine <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing campaigns</a></strong>, increase attack frequency, and add complexity to evade detection.</p><p>“They’re using AI to potentially improve the language in social engineering attacks or to raise the frequency of attacks,” he said.</p><p>However, defenders are also making progress.<strong><a href="http://1111systems.com/" rel="noopener noreferrer" target="_blank"> 11:11 Systems</a></strong> collaborates with technology partners like <strong><a href="https://www.veeam.com/" rel="noopener noreferrer" target="_blank">Veeam</a></strong>, <strong><a href="https://www.cohesity.com/" rel="noopener noreferrer" target="_blank">Cohesity</a></strong>, and <strong><a href="https://www.zerto.com/" rel="noopener noreferrer" target="_blank">Zerto</a></strong>, all of whom invest heavily in AI for spotting anomalies and providing real-time threat visibility.</p><p>These tools can help organisations identify when an attack began and find the last known clean recovery point. “It helps them make quicker decisions,” Woodcock added. “They can make better choices by using AI to find the right recovery point.”</p><p>However, he also cautioned against thinking that technology alone will solve the problem. “Technology by itself isn’t enough. It always comes down to the maturity level and expertise within the business.”</p><p>Looking forward, Woodcock does not expect ransomware sophistication to slow down. Enterprises now face double extortion tactics—not just encrypted data but also threats of public exposure.</p><p>“It’s not just <strong><a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">ransomware</a></strong> encrypting data,” he said. “There’s also this evolving threat of being told that data will be made public.”</p><p>In an era where attackers study your recovery plan before you implement it, resilience is about proof, not just documentation.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>81% of IT leaders are overconfident in their recovery abilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cyber recovery is complex and requires a robust plan.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Regular testing is essential for effective cyber recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations often overlook recovery strategies in favour of prevention.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is being used by cybercriminals to enhance attacks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The frequency of cyber attacks is increasing.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding application dependencies is crucial for recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>A clean recovery environment is necessary to avoid reinfection.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Decision-making during incidents can be time-consuming and impact recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building a strong security culture is vital for organisations.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cyber Resilience</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:46 Understanding the Cyber Recovery Gap</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:17 Overconfidence in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:37 The Importance of Testing in Cyber Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:37 Multi-layered Approach to Cyber Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:17 Real-world Cyber Attack Examples</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:19 AI and the Future of Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:00 Emerging Threats in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>26:31 Key Takeaways for IT Leaders</li></ol><br/><p><strong>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://1111systems.com/" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="https://www.linkedin.com/in/samuel-woodcock-9745b831/" rel="noopener noreferrer" target="_blank">Sam Woodcock, Senior Director of Solutions Architecture at 11:11 Systems</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank">Shubhangi Dua, Podcast Producer and B2B Tech Journalist at </a><em><a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank">EM360Tech</a></em></strong></p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Shubhangi Dua, Podcast Producer and B2B Tech Journalist at <em>EM360Tech</em>, spoke with Sam Woodcock, Senior Director of Solutions Architecture at 11:11 Systems. They discussed what he sees as one of the biggest issues in cybersecurity today: the gap between confidence and ability.</p><p>Their conversation, based on findings from the company’s latest global survey, revealed a troubling fact. While 81 per cent of IT leaders believe they are ready to recover from a cyberattack, many have already faced serious incidents, sometimes more than once a year.</p><p>Woodcock pointed out that this confidence can be misleading. “If you think about your cyber recovery planning, it often looks strong on paper,” he said. “That can create a false sense of security because cyber recovery is very complex.”</p><p><strong><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank">Analyst Read:</a><em><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank"> Forensic Recovery Is Central to Cyber Resilience</a></em></strong><a href="https://em360tech.com/tech-articles/forensic-recovery-central-cyber-resilience" rel="noopener noreferrer" target="_blank"> </a></p><h2>Cyber Recovery is Not Fixed</h2><p>Woodcock explained that many organisations confuse documented plans with actual readiness. Cyber recovery is not fixed; it must change with the infrastructure, applications, and threats.</p><p>“Change is the only constant in this industry,” he noted. “Things are shifting daily and weekly. What you had in place today can quickly become outdated.”</p><p>Testing often suffers from time and budget constraints. Many companies test just once a year, if at all. Woodcock advises that quarterly testing should be the minimum.</p><p>“You’d rather find those issues now instead of during a real <strong><a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">ransomware incident</a></strong>.”</p><p>The costs of misplaced confidence are high, such as prolonged downtime, growing financial losses, regulatory fines, and damage to reputation. Some survey participants reported recovery times of one to two weeks, while others took over a month.</p><p>The more alarming truth is the risk of getting reinfected. “Enterprises might recover from the first outage and then be hit again,” Woodcock warned. “That extends the recovery time and increases the risk and damage.”</p><h2>How Modern Attackers Hack?</h2><p>One of the most revealing points from the discussion was how modern attackers operate once they gain access. A common way in is through VPN flaws and <strong><a href="https://em360tech.com/tech-articles/what-social-engineering-definition-function-mitigation" rel="noopener noreferrer" target="_blank">social engineering</a></strong>. </p><p>“One of the first things they will do is examine existing documentation within your organisation to understand your recovery strategy,” Woodcock tells Dua. “They’ll look at your company’s cyber incident recovery planning document.”</p><p>Attackers often target backup systems directly to wipe out recovery options before launching ransomware.</p><p>In one case, Woodcock mentioned, a company’s local backup systems were compromised. Luckily, they had maintained immutable cloud backups, allowing them to recover even after the primary backup environment was breached.</p><p>In other cases, entire primary environments were taken offline, forcing organisations to switch to secondary, isolated environments.</p><p>“You need a safe, trusted, clean space to recover your environment,” he said. “That way, you can understand how the attack happened and be confident that your recovery is clean.”</p><p>The idea of the "clean room," or an isolated recovery environment, has become crucial to modern cyber resilience strategies.</p><h2><strong>AI vs. AI: A Weapon &amp; a Defence</strong></h2><p>The conversation also addressed artificial intelligence (AI), both as a weapon and a defence. Woodcock noted that cybercriminals are already using AI to refine <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing campaigns</a></strong>, increase attack frequency, and add complexity to evade detection.</p><p>“They’re using AI to potentially improve the language in social engineering attacks or to raise the frequency of attacks,” he said.</p><p>However, defenders are also making progress.<strong><a href="http://1111systems.com/" rel="noopener noreferrer" target="_blank"> 11:11 Systems</a></strong> collaborates with technology partners like <strong><a href="https://www.veeam.com/" rel="noopener noreferrer" target="_blank">Veeam</a></strong>, <strong><a href="https://www.cohesity.com/" rel="noopener noreferrer" target="_blank">Cohesity</a></strong>, and <strong><a href="https://www.zerto.com/" rel="noopener noreferrer" target="_blank">Zerto</a></strong>, all of whom invest heavily in AI for spotting anomalies and providing real-time threat visibility.</p><p>These tools can help organisations identify when an attack began and find the last known clean recovery point. “It helps them make quicker decisions,” Woodcock added. “They can make better choices by using AI to find the right recovery point.”</p><p>However, he also cautioned against thinking that technology alone will solve the problem. “Technology by itself isn’t enough. It always comes down to the maturity level and expertise within the business.”</p><p>Looking forward, Woodcock does not expect ransomware sophistication to slow down. Enterprises now face double extortion tactics—not just encrypted data but also threats of public exposure.</p><p>“It’s not just <strong><a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">ransomware</a></strong> encrypting data,” he said. “There’s also this evolving threat of being told that data will be made public.”</p><p>In an era where attackers study your recovery plan before you implement it, resilience is about proof, not just documentation.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>81% of IT leaders are overconfident in their recovery abilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cyber recovery is complex and requires a robust plan.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Regular testing is essential for effective cyber recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations often overlook recovery strategies in favour of prevention.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is being used by cybercriminals to enhance attacks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The frequency of cyber attacks is increasing.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding application dependencies is crucial for recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>A clean recovery environment is necessary to avoid reinfection.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Decision-making during incidents can be time-consuming and impact recovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building a strong security culture is vital for organisations.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cyber Resilience</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:46 Understanding the Cyber Recovery Gap</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:17 Overconfidence in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:37 The Importance of Testing in Cyber Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:37 Multi-layered Approach to Cyber Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:17 Real-world Cyber Attack Examples</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:19 AI and the Future of Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:00 Emerging Threats in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>26:31 Key Takeaways for IT Leaders</li></ol><br/><p><strong>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://1111systems.com/" rel="noopener noreferrer" target="_blank">1111systems.com</a>. </strong></p><p><strong>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p>11:11 Systems YT: <strong><a href="https://www.youtube.com/@1111systems" rel="noopener noreferrer" target="_blank">@1111systems</a></strong></p><p>11:11 Systems LinkedIn: <strong><a href="https://www.linkedin.com/company/1111-systems/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/1111-systems/</a></strong></p><p>11:11 Systems X: <strong><a href="https://x.com/1111systems?lang=en" rel="noopener noreferrer" target="_blank">@1111systems</a></strong></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f660deb6-27c1-4d8e-b8cf-9d530a584a4e</guid><itunes:image href="https://artwork.captivate.fm/173f05d4-8b81-4808-a504-09d6943e1fdb/2026-21-Your-backups-aren-t-as-safe-as-you-think-Sam-Woodcock-S.jpg"/><pubDate>Mon, 16 Mar 2026 12:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/f660deb6-27c1-4d8e-b8cf-9d530a584a4e.mp3" length="67057237" type="audio/mpeg"/><itunes:duration>27:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>104</itunes:episode><podcast:episode>104</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Are You Testing Cyber Recovery or Just Hoping Your Backups Work"><podcast:source uri="https://youtu.be/6Pg_t4TNFqs"/></podcast:alternateEnclosure></item><item><title>Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do</title><itunes:title>Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do</itunes:title><description><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="http://linkedin.com/in/chipwitt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BrkSUtlatQZO%2F8hmlnXTkTQ%3D%3D" rel="noopener noreferrer" target="_blank">Chip Witt, Principal Security Analyst at Radware</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Analyst Researcher at IT-Harvest</a></strong></p><p>When attackers target modern enterprises, they don’t break in; they log in. This insight came from the recent episode of The Security Strategist Podcast, where host Richard Stiennon, a cybersecurity analyst and Chief Analyst Researcher at IT-Harvest, speaks to Chip Witt, Principal Security Analyst at <strong><a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a></strong>.</p><p>The conversation spotlights a critical issue faced by most enterprises – defending APIs as if they are just infrastructure while attackers exploit them as part of the business logic. That gap represents the real risk.</p><h2>What’s the Core Misunderstanding with APIs?</h2><p>As per Witt, enterprise teams often view APIs as technical plumbing instead of business products. Security programs focus on endpoints and authentication, believing that a locked front door means the house is safe.</p><p>However, the true risk lies deeper — in authorisation logic, identity sprawl, and how applications change over time. Modern development methods lead to constant API drift. New routes appear, fields change, and versions multiply. In many organisations, security leaders cannot confidently state which APIs are live in production. The uncertainty to many is theoretical, but in reality, it’s an operational risk.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-stop-encrypted-ddos-attack-overcome-https-challenges" rel="noopener noreferrer" target="_blank">Also Watch: How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</a></em></strong></p><h2>How are Enterprises Shifting Towards Intent-Aware Protection?</h2><p>As enterprises speed up their use of serverless architectures, microservices, and AI-driven applications, API sprawl intensifies. With sprawl, the security model cannot remain unchanged while the application structure evolves.</p><p>According to Witt, the future of API security must be intent-aware. Protection should assess whether a sequence of calls makes sense within its context for the user, system, or resource initiating them. Simply confirming identity is not enough; security also needs to validate behaviour.</p><p>Zero trust principles have reshaped strategies for networks and identities. APIs now require similar scrutiny—not just at the perimeter, but within the workflow itself.</p><p>APIs are no longer just back-end connectors; instead, they are now the visible surface of the enterprise. The most concerning attacks are not brute-force attempts. Most distressing attacks, in fact, are authenticated actions carried out with malicious intent.</p><p>Organisations that continuously track their APIs, enforce strict authorisation, and identify workflow misuse in real time can significantly reduce their risk of breaches. More importantly, they can align security with the business pace. In today’s digital economy, APIs are the product.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>APIs are your primary business attack surface, not back-end infrastructure.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Most damaging API attacks use valid credentials and exploit weak authorisation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Visibility gaps and API drift quietly expand your exposure over time.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Machine-to-machine identities often carry excessive, unmonitored privileges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Runtime, intent-aware detection is now essential to stopping business logic abuse.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to API Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:04 Understanding API Misconceptions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>04:49 Current API Threat Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:43 Business Logic Abuse in APIs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:11 Challenges in API Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:03 Runtime Protection and Intent Detection</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:40 Key Takeaways for IT Decision Makers</li></ol><br/><p><strong>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://radware.com/" rel="noopener noreferrer" target="_blank">radware.com</a></strong></p><p><strong>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p>Radware YT: <strong><a href="https://www.youtube.com/radwareinc" rel="noopener noreferrer" target="_blank">@radware</a></strong></p><p>Radware LinkedIn:<strong> https://www.linkedin.com/company/radware/</strong></p><p>Radware X: <strong><a href="https://x.com/radware?lang=en" rel="noopener noreferrer" target="_blank">@radware</a></strong></p><p><strong>#APISecurity #BusinessLogicAbuse #AuthenticatedAttacks #RuntimeProtection #IntentAwareSecurity #Radware #Cybersecurity2026 #OWASP #BusinessLogic #ZeroTrust #TechPodcast #EnterpriseSecurity #IntentAwareProtection #TheSecurityStrategist #Cybersecurity</strong></p>]]></description><content:encoded><![CDATA[<p><strong>Podcast series: <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="http://linkedin.com/in/chipwitt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BrkSUtlatQZO%2F8hmlnXTkTQ%3D%3D" rel="noopener noreferrer" target="_blank">Chip Witt, Principal Security Analyst at Radware</a></strong></p><p><strong>Host: <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon, Chief Analyst Researcher at IT-Harvest</a></strong></p><p>When attackers target modern enterprises, they don’t break in; they log in. This insight came from the recent episode of The Security Strategist Podcast, where host Richard Stiennon, a cybersecurity analyst and Chief Analyst Researcher at IT-Harvest, speaks to Chip Witt, Principal Security Analyst at <strong><a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a></strong>.</p><p>The conversation spotlights a critical issue faced by most enterprises – defending APIs as if they are just infrastructure while attackers exploit them as part of the business logic. That gap represents the real risk.</p><h2>What’s the Core Misunderstanding with APIs?</h2><p>As per Witt, enterprise teams often view APIs as technical plumbing instead of business products. Security programs focus on endpoints and authentication, believing that a locked front door means the house is safe.</p><p>However, the true risk lies deeper — in authorisation logic, identity sprawl, and how applications change over time. Modern development methods lead to constant API drift. New routes appear, fields change, and versions multiply. In many organisations, security leaders cannot confidently state which APIs are live in production. The uncertainty to many is theoretical, but in reality, it’s an operational risk.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-stop-encrypted-ddos-attack-overcome-https-challenges" rel="noopener noreferrer" target="_blank">Also Watch: How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</a></em></strong></p><h2>How are Enterprises Shifting Towards Intent-Aware Protection?</h2><p>As enterprises speed up their use of serverless architectures, microservices, and AI-driven applications, API sprawl intensifies. With sprawl, the security model cannot remain unchanged while the application structure evolves.</p><p>According to Witt, the future of API security must be intent-aware. Protection should assess whether a sequence of calls makes sense within its context for the user, system, or resource initiating them. Simply confirming identity is not enough; security also needs to validate behaviour.</p><p>Zero trust principles have reshaped strategies for networks and identities. APIs now require similar scrutiny—not just at the perimeter, but within the workflow itself.</p><p>APIs are no longer just back-end connectors; instead, they are now the visible surface of the enterprise. The most concerning attacks are not brute-force attempts. Most distressing attacks, in fact, are authenticated actions carried out with malicious intent.</p><p>Organisations that continuously track their APIs, enforce strict authorisation, and identify workflow misuse in real time can significantly reduce their risk of breaches. More importantly, they can align security with the business pace. In today’s digital economy, APIs are the product.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>APIs are your primary business attack surface, not back-end infrastructure.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Most damaging API attacks use valid credentials and exploit weak authorisation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Visibility gaps and API drift quietly expand your exposure over time.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Machine-to-machine identities often carry excessive, unmonitored privileges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Runtime, intent-aware detection is now essential to stopping business logic abuse.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to API Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:04 Understanding API Misconceptions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>04:49 Current API Threat Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:43 Business Logic Abuse in APIs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:11 Challenges in API Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:03 Runtime Protection and Intent Detection</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:40 Key Takeaways for IT Decision Makers</li></ol><br/><p><strong>For more information, please visit <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a> and <a href="http://radware.com/" rel="noopener noreferrer" target="_blank">radware.com</a></strong></p><p><strong>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></strong></p><p>Radware YT: <strong><a href="https://www.youtube.com/radwareinc" rel="noopener noreferrer" target="_blank">@radware</a></strong></p><p>Radware LinkedIn:<strong> https://www.linkedin.com/company/radware/</strong></p><p>Radware X: <strong><a href="https://x.com/radware?lang=en" rel="noopener noreferrer" target="_blank">@radware</a></strong></p><p><strong>#APISecurity #BusinessLogicAbuse #AuthenticatedAttacks #RuntimeProtection #IntentAwareSecurity #Radware #Cybersecurity2026 #OWASP #BusinessLogic #ZeroTrust #TechPodcast #EnterpriseSecurity #IntentAwareProtection #TheSecurityStrategist #Cybersecurity</strong></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8c5589dc-103e-4874-b21a-e8c81c694199</guid><itunes:image href="https://artwork.captivate.fm/f15e9112-d38f-499d-8b24-732f4ca6b0d5/2026-23-Authentication-Worked-So-How-Did-They-Get-In-Chip-Witt-.jpg"/><pubDate>Wed, 11 Mar 2026 16:10:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/8c5589dc-103e-4874-b21a-e8c81c694199.mp3" length="31339908" type="audio/mpeg"/><itunes:duration>13:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>103</itunes:episode><podcast:episode>103</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do"><podcast:source uri="https://youtu.be/bE_lTAD9Pg8"/></podcast:alternateEnclosure></item><item><title>How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business</title><itunes:title>How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business</itunes:title><description><![CDATA[<p>In an era where enterprise data sprawls across cloud platforms, collaboration tools, and SaaS environments, CISOs are under constant pressure to reduce risk without becoming the department that slows everything down. That tension sits at the heart of a recent episode of the Security Strategist, where host <a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a> speaks with <a href="https://www.linkedin.com/in/ariel-zamir-b4834b28/" rel="noopener noreferrer" target="_blank">Ariel Zamir</a>, founder and CEO of <a href="https://raysecurity.io/" rel="noopener noreferrer" target="_blank">Ray Security</a>, about what pragmatic, modern data security actually looks like.</p><p>Their conversation cuts through the noise around cybersecurity tools and frameworks and focuses instead on how CISOs can think differently about enterprise data, risk management, and control.</p><h2>Understanding Enterprise Data Risk Starts With Reality</h2><p>One of the most grounded points Zamir makes is also the simplest, and that is, most enterprise data is not being used. At any given time, around 98 per cent of enterprise data sits dormant. From a data security perspective, that should immediately raise questions. Why is data that no one needs today exposed in the same way as data actively driving the business?</p><p>For CISOs, this reframes the challenge. Instead of trying to secure all data equally, the priority becomes understanding which data is actually accessed, by whom, and when. This shift matters because risk does not come from volume alone, but from unnecessary exposure. Dormant data with overly broad access control is often invisible to the business, yet highly visible to attackers.</p><p>By grounding cybersecurity decisions in how data is really used, security teams can reduce enterprise data risk without introducing friction for employees who are simply trying to do their jobs.</p><h2>Permission Hygiene, Access Control, and Dynamic Security</h2><p>A recurring theme in the discussion is permission hygiene. Over time, access rights accumulate. People change roles, projects end, contractors leave, but permissions rarely get cleaned up. The result is an expanding attack surface that no amount of policy documentation can realistically govern.</p><p>Zamir argues that improving permission hygiene and access monitoring should come before heavy data classification initiatives. Tightening access control, understanding access patterns, and removing unnecessary permissions can dramatically reduce risk with relatively low operational impact.</p><p>Crucially, this does not mean locking everything down. Dynamic controls play a key role here. Instead of blocking access by default, organisations can monitor for unusual behaviour and respond in context. Alerts, step-up verification, or temporary restrictions allow security teams to manage risk while preserving user experience. From a business perspective, this approach aligns far better with how work actually happens.</p><p>This is also where agentic AI and agentless monitoring enter the picture. As autonomous systems increasingly access data on behalf of users, traditional identity-based controls struggle to keep up. Agentless approaches help close coverage gaps without requiring intrusive deployments, while agentic AI introduces new questions about accountability and oversight that CISOs can no longer ignore.</p><h2>Just-in-Time Classification and the Legal Implications of Automation</h2><p>Traditional data classification has long been treated as a foundational security activity, but the podcast challenges that assumption. Classifying vast amounts of dormant data upfront is expensive, slow, and often disconnected from real risk. Instead, Zamir advocates for just-in-time classification, applying context only when data is accessed.</p><p>This approach supports more effective risk management while easing the burden on security teams. It also aligns better with regulatory expectations, where proportionality and intent increasingly matter.</p><p>However, automation and agentic AI introduce legal implications that CISOs must consider when developing their strategies. When autonomous agents access, move, or transform data, organisations need clarity on responsibility, auditability, and compliance. Dynamic controls and temporal insights into data access are not just technical safeguards; they are essential for demonstrating governance in an environment where human and machine actions intersect.</p><p>Taken together, the conversation highlights a more measured path forward. By focusing on how enterprise data is actually used, improving permission hygiene, and applying controls dynamically, CISOs can enhance data security without slowing down the business. It is less about adding more tools and more about making smarter, context-aware decisions in a landscape where risk is shaped by time, access, and intent.</p><p>For more information on this, visit: <a href="https://raysecurity.io/" rel="noopener noreferrer" target="_blank">https://raysecurity.io/</a></p><h2>Takeaways</h2><ol><li>Around 98 per cent of enterprise data sits idle, creating hidden security risks.</li><li>Focusing on data dormancy helps prioritise protection and reduce exposure.</li><li>Permission hygiene and dynamic controls reduce risk without slowing business workflows.</li><li>Just-in-time classification cuts overhead by securing data only when accessed.</li><li>Agentless monitoring and oversight of agentic AI improve coverage and accountability.</li><li>Legal and governance frameworks must evolve to handle autonomous data access.</li></ol><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Challenges</p><p>01:38 Understanding Data Dormancy and Its Implications</p><p>05:10 Focusing on Critical Data for Security</p><p>08:21 The Importance of Permission Hygiene</p><p>10:53 Just-in-Time Classification for Data Security</p><p>12:28 Dynamic Controls for Business Needs</p><p>16:43 Agentless Monitoring and Coverage Gaps</p><p>19:32 Integrating Logs and APIs for Security</p><p>21:34 Future Trends in Cybersecurity</p>]]></description><content:encoded><![CDATA[<p>In an era where enterprise data sprawls across cloud platforms, collaboration tools, and SaaS environments, CISOs are under constant pressure to reduce risk without becoming the department that slows everything down. That tension sits at the heart of a recent episode of the Security Strategist, where host <a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a> speaks with <a href="https://www.linkedin.com/in/ariel-zamir-b4834b28/" rel="noopener noreferrer" target="_blank">Ariel Zamir</a>, founder and CEO of <a href="https://raysecurity.io/" rel="noopener noreferrer" target="_blank">Ray Security</a>, about what pragmatic, modern data security actually looks like.</p><p>Their conversation cuts through the noise around cybersecurity tools and frameworks and focuses instead on how CISOs can think differently about enterprise data, risk management, and control.</p><h2>Understanding Enterprise Data Risk Starts With Reality</h2><p>One of the most grounded points Zamir makes is also the simplest, and that is, most enterprise data is not being used. At any given time, around 98 per cent of enterprise data sits dormant. From a data security perspective, that should immediately raise questions. Why is data that no one needs today exposed in the same way as data actively driving the business?</p><p>For CISOs, this reframes the challenge. Instead of trying to secure all data equally, the priority becomes understanding which data is actually accessed, by whom, and when. This shift matters because risk does not come from volume alone, but from unnecessary exposure. Dormant data with overly broad access control is often invisible to the business, yet highly visible to attackers.</p><p>By grounding cybersecurity decisions in how data is really used, security teams can reduce enterprise data risk without introducing friction for employees who are simply trying to do their jobs.</p><h2>Permission Hygiene, Access Control, and Dynamic Security</h2><p>A recurring theme in the discussion is permission hygiene. Over time, access rights accumulate. People change roles, projects end, contractors leave, but permissions rarely get cleaned up. The result is an expanding attack surface that no amount of policy documentation can realistically govern.</p><p>Zamir argues that improving permission hygiene and access monitoring should come before heavy data classification initiatives. Tightening access control, understanding access patterns, and removing unnecessary permissions can dramatically reduce risk with relatively low operational impact.</p><p>Crucially, this does not mean locking everything down. Dynamic controls play a key role here. Instead of blocking access by default, organisations can monitor for unusual behaviour and respond in context. Alerts, step-up verification, or temporary restrictions allow security teams to manage risk while preserving user experience. From a business perspective, this approach aligns far better with how work actually happens.</p><p>This is also where agentic AI and agentless monitoring enter the picture. As autonomous systems increasingly access data on behalf of users, traditional identity-based controls struggle to keep up. Agentless approaches help close coverage gaps without requiring intrusive deployments, while agentic AI introduces new questions about accountability and oversight that CISOs can no longer ignore.</p><h2>Just-in-Time Classification and the Legal Implications of Automation</h2><p>Traditional data classification has long been treated as a foundational security activity, but the podcast challenges that assumption. Classifying vast amounts of dormant data upfront is expensive, slow, and often disconnected from real risk. Instead, Zamir advocates for just-in-time classification, applying context only when data is accessed.</p><p>This approach supports more effective risk management while easing the burden on security teams. It also aligns better with regulatory expectations, where proportionality and intent increasingly matter.</p><p>However, automation and agentic AI introduce legal implications that CISOs must consider when developing their strategies. When autonomous agents access, move, or transform data, organisations need clarity on responsibility, auditability, and compliance. Dynamic controls and temporal insights into data access are not just technical safeguards; they are essential for demonstrating governance in an environment where human and machine actions intersect.</p><p>Taken together, the conversation highlights a more measured path forward. By focusing on how enterprise data is actually used, improving permission hygiene, and applying controls dynamically, CISOs can enhance data security without slowing down the business. It is less about adding more tools and more about making smarter, context-aware decisions in a landscape where risk is shaped by time, access, and intent.</p><p>For more information on this, visit: <a href="https://raysecurity.io/" rel="noopener noreferrer" target="_blank">https://raysecurity.io/</a></p><h2>Takeaways</h2><ol><li>Around 98 per cent of enterprise data sits idle, creating hidden security risks.</li><li>Focusing on data dormancy helps prioritise protection and reduce exposure.</li><li>Permission hygiene and dynamic controls reduce risk without slowing business workflows.</li><li>Just-in-time classification cuts overhead by securing data only when accessed.</li><li>Agentless monitoring and oversight of agentic AI improve coverage and accountability.</li><li>Legal and governance frameworks must evolve to handle autonomous data access.</li></ol><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Challenges</p><p>01:38 Understanding Data Dormancy and Its Implications</p><p>05:10 Focusing on Critical Data for Security</p><p>08:21 The Importance of Permission Hygiene</p><p>10:53 Just-in-Time Classification for Data Security</p><p>12:28 Dynamic Controls for Business Needs</p><p>16:43 Agentless Monitoring and Coverage Gaps</p><p>19:32 Integrating Logs and APIs for Security</p><p>21:34 Future Trends in Cybersecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">01419520-c5b8-4a97-8f9d-f1a8dd9b25ca</guid><itunes:image href="https://artwork.captivate.fm/e92b9973-33b6-4e0a-9121-a1341b1e1b0a/2026-18-Your-Data-s-Biggest-Threat-Isn-t-Who-You-Think-Ariel-Za.jpg"/><pubDate>Tue, 24 Feb 2026 14:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/01419520-c5b8-4a97-8f9d-f1a8dd9b25ca.mp3" length="68028157" type="audio/mpeg"/><itunes:duration>28:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>102</itunes:episode><podcast:episode>102</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business"><podcast:source uri="https://youtu.be/Zqy4-mkTMd4"/></podcast:alternateEnclosure></item><item><title>Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience</title><itunes:title>Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience</itunes:title><description><![CDATA[<p>In an environment where cyber threats evolve faster than regulation, UK organisations are being asked to defend themselves with rules written for a different era. That tension sits at the centre of a recent episode of the Security Strategist, where host <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> speaks with <a href="https://www.linkedin.com/in/william-wright-chcsp-2054a72a/" rel="noopener noreferrer" target="_blank">William Wright</a>, Chief Executive Officer of <a href="https://www.cdsec.co.uk/" rel="noopener noreferrer" target="_blank">Closed Door Security</a> and Scotland’s first accredited (chartered) hacker. Their conversation moves beyond headlines and funding announcements to examine why, despite growing awareness and investment, both public and private sector organisations in the UK continue to be compromised.</p><h2>The Biggest Cybersecurity Challenges Facing UK Organisations</h2><p>As Wright explains, cybersecurity cannot be understood purely from policy documents or tooling dashboards. It has to be understood from the attacker’s point of view. From where he stands today, the UK cybersecurity landscape is marked by a growing gap between how organisations believe they are protected and how exposed they actually are.</p><p>One of the most persistent misconceptions Wright highlights is the belief that buying cybersecurity tools automatically makes an organisation secure. Too many businesses, he argues, rely on poorly implemented services or procure technology they don’t fully understand.</p><p>The result is a false sense of confidence. Organisations assume they are protected, but still fall <a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">victim to ransomware</a>, business email compromise, and financial fraud. Often, the tools they’ve invested in are never properly tested, validated, or tuned to their environment.</p><p>Awareness is another issue. Despite constant media coverage of cyber attacks, cybersecurity is still not consistently treated as a board-level risk. When it remains a technical afterthought rather than an <a href="https://em360tech.com/tech-articles/how-meet-ccpa-compliance-enterprise-companies" rel="noopener noreferrer" target="_blank">operational priority</a>, organisations struggle to respond effectively when incidents occur.</p><p>Wright also challenges the idea of a simple “skills gap.” While much of the discussion focuses on a lack of junior talent, he argues the real problem sits at the top. Too many cybersecurity decisions are being made by individuals without deep, hands-on experience, particularly in senior or policy-shaping roles. This lack of expertise leads to misaligned strategies, both in organisations and in government.</p><h2><strong>The UK Government’s Cyber Action Plan</strong></h2><p>The UK government’s £210 million cyber action plan is, in Wright’s view, a welcome signal but not a solution. Any investment in cybersecurity is positive, yet the plan largely reflects practices the private sector has been using for years.</p><p>This creates a familiar pattern as the private sector absorbs the damage, while the public sector learns from it later. Economically, Wright argues, this approach is flawed. When businesses are repeatedly compromised, the impact extends far beyond individual organisations.</p><p>Legislation is another weak point. <a href="https://em360tech.com/podcasts/ai-and-new-age-cyber-threats" rel="noopener noreferrer" target="_blank">Cyber threats</a> evolve daily, but laws move slowly. The Computer Misuse Act, for example, has not been meaningfully updated in over a decade. In a world of cloud computing, automation, and AI-driven attacks, this leaves the UK operating with outdated guardrails.</p><h2><strong>What Government Can Learn From Offensive Security</strong></h2><p>As the CEO of an offensive security firm, Wright sees the same pattern repeatedly that organisations are compromised using relatively unsophisticated methods. These are not advanced, state-of-the-art attacks. They are basic weaknesses that remain unaddressed. The problem, he suggests, is that policymakers are often advised by people who have never actively attacked real systems. This disconnect shows up in legislation and regulation that look sound on paper but fail in practice.</p><p>Other governments have taken a different approach. Bug bounty programmes, for example, allow ethical hackers to test government infrastructure and responsibly disclose vulnerabilities. These programmes force transparency and accountability. Despite this, the UK has been slow to adopt similar models.</p><h2><strong>Where Cyber Resilience Efforts Should Focus Next</strong></h2><p>Beyond legislation, Wright points to funding and enforcement as critical gaps. Many public sector organisations know where their risks are, but lack the budget to fix them. Meanwhile, regulatory bodies often lack the authority to enforce remediation.</p><p>Without both funding and enforcement, reports identifying serious vulnerabilities are filed away rather than acted upon. This cycle repeats until an attack forces emergency investment, which is often too late.</p><h2><strong>Emerging Threats Organisations Must Prepare For</strong></h2><p>Looking ahead, Wright identifies two major areas of concern. The first is the use of AI in cyber attacks. AI is not replacing attackers, but it is dramatically accelerating them. Tasks that once took hours can now be completed in minutes, shrinking the window for detection and response.</p><p>The second is technology supply chain risk. Attacks on widely used software tools can give attackers access to thousands of organisations at once. Past incidents involving widely trusted vendors show how devastating these compromises can be, particularly when they go unnoticed for long periods.</p><p>Despite the scale of the challenge, Wright’s advice is grounded and practical. Multi-factor authentication is non-negotiable. Organisations without MFA are, in his words, “sailing blind.”</p><p>He also urges businesses to validate their security investments. Spending heavily on defence while allocating minimal budget to testing is self-defeating. Security tools do not work perfectly out of the box, and penetration testing must go beyond surface-level assessments. Finally, Wright stresses the importance of depth. Black-box testing alone is not enough. Organisations need to assume breach scenarios and test how attackers move inside their environments, particularly through identity-based attacks such as phishing.</p><h2>Takeaways</h2><ol><li>Cybersecurity is frequently mistaken for deploying tools, rather than managing risk.</li><li>Cyber risk must be treated as a board-level responsibility, not a technical afterthought.</li><li>The real cybersecurity skills gap exists at senior and decision-making levels.</li><li>Cyber legislation is largely reactive and struggles to keep pace with modern threats.</li><li>Bug bounty programmes can help governments identify weaknesses before attackers do.</li><li>Offensive security insight strengthens defensive strategy and decision-making.</li><li>Legacy systems can be secured when risks are properly understood and addressed.</li><li>AI is accelerating the scale and speed of cyber attacks, not replacing attackers.</li><li>Security investments must be validated through continuous testing and assurance.</li><li>Multi-factor authentication is a foundational requirement for modern cyber resilience.</li></ol><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Landscape</p><p>02:56 William Wright's Journey in Cybersecurity</p><p>05:56 Current Cybersecurity Challenges in the UK</p><p>08:53 Evaluating the UK Government's Cyber Action Plan</p><p>12:03 The Impact of Legislation on Cybersecurity</p><p>15:01 Lessons from Offensive Security for Government</p><p>16:55 Notable Cybersecurity Breaches and Their Impacts</p><p>19:59 Future Focus: Improving Cyber Resilience</p><p>24:01 Emerging Cyber Threats: AI and Supply Chain Risks</p><p>27:48 Practical Advice for Organisations</p><p>31:05 Conclusion and Key Takeaways</p>]]></description><content:encoded><![CDATA[<p>In an environment where cyber threats evolve faster than regulation, UK organisations are being asked to defend themselves with rules written for a different era. That tension sits at the centre of a recent episode of the Security Strategist, where host <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> speaks with <a href="https://www.linkedin.com/in/william-wright-chcsp-2054a72a/" rel="noopener noreferrer" target="_blank">William Wright</a>, Chief Executive Officer of <a href="https://www.cdsec.co.uk/" rel="noopener noreferrer" target="_blank">Closed Door Security</a> and Scotland’s first accredited (chartered) hacker. Their conversation moves beyond headlines and funding announcements to examine why, despite growing awareness and investment, both public and private sector organisations in the UK continue to be compromised.</p><h2>The Biggest Cybersecurity Challenges Facing UK Organisations</h2><p>As Wright explains, cybersecurity cannot be understood purely from policy documents or tooling dashboards. It has to be understood from the attacker’s point of view. From where he stands today, the UK cybersecurity landscape is marked by a growing gap between how organisations believe they are protected and how exposed they actually are.</p><p>One of the most persistent misconceptions Wright highlights is the belief that buying cybersecurity tools automatically makes an organisation secure. Too many businesses, he argues, rely on poorly implemented services or procure technology they don’t fully understand.</p><p>The result is a false sense of confidence. Organisations assume they are protected, but still fall <a href="https://em360tech.com/tech-articles/ransomware-attacks-what-you-need-know" rel="noopener noreferrer" target="_blank">victim to ransomware</a>, business email compromise, and financial fraud. Often, the tools they’ve invested in are never properly tested, validated, or tuned to their environment.</p><p>Awareness is another issue. Despite constant media coverage of cyber attacks, cybersecurity is still not consistently treated as a board-level risk. When it remains a technical afterthought rather than an <a href="https://em360tech.com/tech-articles/how-meet-ccpa-compliance-enterprise-companies" rel="noopener noreferrer" target="_blank">operational priority</a>, organisations struggle to respond effectively when incidents occur.</p><p>Wright also challenges the idea of a simple “skills gap.” While much of the discussion focuses on a lack of junior talent, he argues the real problem sits at the top. Too many cybersecurity decisions are being made by individuals without deep, hands-on experience, particularly in senior or policy-shaping roles. This lack of expertise leads to misaligned strategies, both in organisations and in government.</p><h2><strong>The UK Government’s Cyber Action Plan</strong></h2><p>The UK government’s £210 million cyber action plan is, in Wright’s view, a welcome signal but not a solution. Any investment in cybersecurity is positive, yet the plan largely reflects practices the private sector has been using for years.</p><p>This creates a familiar pattern as the private sector absorbs the damage, while the public sector learns from it later. Economically, Wright argues, this approach is flawed. When businesses are repeatedly compromised, the impact extends far beyond individual organisations.</p><p>Legislation is another weak point. <a href="https://em360tech.com/podcasts/ai-and-new-age-cyber-threats" rel="noopener noreferrer" target="_blank">Cyber threats</a> evolve daily, but laws move slowly. The Computer Misuse Act, for example, has not been meaningfully updated in over a decade. In a world of cloud computing, automation, and AI-driven attacks, this leaves the UK operating with outdated guardrails.</p><h2><strong>What Government Can Learn From Offensive Security</strong></h2><p>As the CEO of an offensive security firm, Wright sees the same pattern repeatedly that organisations are compromised using relatively unsophisticated methods. These are not advanced, state-of-the-art attacks. They are basic weaknesses that remain unaddressed. The problem, he suggests, is that policymakers are often advised by people who have never actively attacked real systems. This disconnect shows up in legislation and regulation that look sound on paper but fail in practice.</p><p>Other governments have taken a different approach. Bug bounty programmes, for example, allow ethical hackers to test government infrastructure and responsibly disclose vulnerabilities. These programmes force transparency and accountability. Despite this, the UK has been slow to adopt similar models.</p><h2><strong>Where Cyber Resilience Efforts Should Focus Next</strong></h2><p>Beyond legislation, Wright points to funding and enforcement as critical gaps. Many public sector organisations know where their risks are, but lack the budget to fix them. Meanwhile, regulatory bodies often lack the authority to enforce remediation.</p><p>Without both funding and enforcement, reports identifying serious vulnerabilities are filed away rather than acted upon. This cycle repeats until an attack forces emergency investment, which is often too late.</p><h2><strong>Emerging Threats Organisations Must Prepare For</strong></h2><p>Looking ahead, Wright identifies two major areas of concern. The first is the use of AI in cyber attacks. AI is not replacing attackers, but it is dramatically accelerating them. Tasks that once took hours can now be completed in minutes, shrinking the window for detection and response.</p><p>The second is technology supply chain risk. Attacks on widely used software tools can give attackers access to thousands of organisations at once. Past incidents involving widely trusted vendors show how devastating these compromises can be, particularly when they go unnoticed for long periods.</p><p>Despite the scale of the challenge, Wright’s advice is grounded and practical. Multi-factor authentication is non-negotiable. Organisations without MFA are, in his words, “sailing blind.”</p><p>He also urges businesses to validate their security investments. Spending heavily on defence while allocating minimal budget to testing is self-defeating. Security tools do not work perfectly out of the box, and penetration testing must go beyond surface-level assessments. Finally, Wright stresses the importance of depth. Black-box testing alone is not enough. Organisations need to assume breach scenarios and test how attackers move inside their environments, particularly through identity-based attacks such as phishing.</p><h2>Takeaways</h2><ol><li>Cybersecurity is frequently mistaken for deploying tools, rather than managing risk.</li><li>Cyber risk must be treated as a board-level responsibility, not a technical afterthought.</li><li>The real cybersecurity skills gap exists at senior and decision-making levels.</li><li>Cyber legislation is largely reactive and struggles to keep pace with modern threats.</li><li>Bug bounty programmes can help governments identify weaknesses before attackers do.</li><li>Offensive security insight strengthens defensive strategy and decision-making.</li><li>Legacy systems can be secured when risks are properly understood and addressed.</li><li>AI is accelerating the scale and speed of cyber attacks, not replacing attackers.</li><li>Security investments must be validated through continuous testing and assurance.</li><li>Multi-factor authentication is a foundational requirement for modern cyber resilience.</li></ol><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Landscape</p><p>02:56 William Wright's Journey in Cybersecurity</p><p>05:56 Current Cybersecurity Challenges in the UK</p><p>08:53 Evaluating the UK Government's Cyber Action Plan</p><p>12:03 The Impact of Legislation on Cybersecurity</p><p>15:01 Lessons from Offensive Security for Government</p><p>16:55 Notable Cybersecurity Breaches and Their Impacts</p><p>19:59 Future Focus: Improving Cyber Resilience</p><p>24:01 Emerging Cyber Threats: AI and Supply Chain Risks</p><p>27:48 Practical Advice for Organisations</p><p>31:05 Conclusion and Key Takeaways</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">76964ae9-1688-4bc4-b2e9-271968c3ca77</guid><itunes:image href="https://artwork.captivate.fm/cfec7f51-9f3c-48dd-bc97-4a896498476d/2026-18-Your-Data-s-Biggest-Threat-Isn-t-Who-You-Think-Ariel-Za.jpg"/><pubDate>Tue, 24 Feb 2026 14:15:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/76964ae9-1688-4bc4-b2e9-271968c3ca77.mp3" length="64167445" type="audio/mpeg"/><itunes:duration>26:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience"><podcast:source uri="https://youtu.be/JxvsOWHXbm8"/></podcast:alternateEnclosure></item><item><title>From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026</title><itunes:title>From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026</itunes:title><description><![CDATA[<p>In an era of accelerating digital change, understanding the tactics employed by modern attackers is crucial for organisations doing everything in their power to protect their sensitive information. In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist podcast</a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/chester-wisniewski/" rel="noopener noreferrer" target="_blank">Chester Wisniewski</a>, Director, Global Field CISO of&nbsp;<a href="https://www.sophos.com/" rel="noopener noreferrer" target="_blank">Sophos</a>, examine the findings of the&nbsp;<em>Active Adversary Report</em>, compiled by Wisniewski and his team, shedding light on how cyber threats are changing and what security leaders can do to adapt their strategies.&nbsp;</p><h2>Understanding the Active Adversary Report</h2><p>&nbsp;The&nbsp;<a href="https://www.sophos.com/en-us/press/press-releases/sophos-active-adversary-report-2026-identity-attacks-dominate-as-threat-groups-proliferate" rel="noopener noreferrer" target="_blank">Active Adversary Report</a>, compiled by Wisniewski’s team at Sophos, provides invaluable insights into the common pitfalls organisations face when responding to cyber incidents. With Chester's extensive experience in cybersecurity and incident response, the report aims to analyse real-world data from hundreds of incident responses across 50 countries. The report categorises incidents into two main groups: those who seek immediate help during a crisis and those who utilise managed detection and response services. By examining these cases, the report identifies key indicators that contribute to security breaches, offering organisations a roadmap to enhance their security posture.</p><h2>The Focus on Identity Theft</h2><p>One of the most startling revelations from the report is that nearly 70 per cent of incidents last year were linked to identity-related issues such as stolen passwords, session tokens, or phishing attacks. Chester explains that attackers are increasingly leveraging identity theft because it is often easier to log in as an authorised user than to break into a system. This trend underscores the importance of security teams to prioritise identity management as part of their overall strategy.</p><p>Wisniewski also emphasises that the ease of access through stolen credentials presents fewer telltale signs of unauthorised activity, making it harder for organisations to detect breaches. In the past, cybercriminals often exploited vulnerabilities in software like Flash and Java, but as security measures have improved, they have shifted their tactics toward the more vulnerable area of user identity. This shift indicates a pressing need for organisations to bolster their identity security protocols.</p><h2>Balancing Vulnerability Management with Identity Security</h2><p>&nbsp;As organisations work to strengthen their security measures, the challenge of balancing patch management with a focus on identity security. He points out that while patching vulnerabilities remains essential, many organisations face difficulties, particularly those with hybrid workforces. Unpatched VPN gateways and firewalls have become common entry points for attackers, making it critical for organisations to prioritise their patch management efforts based on exposure and the sensitivity of the data involved.</p><p>Wisniewski&nbsp;advocates for a more strategic approach to identity management, highlighting that the adoption of multifactor authentication (MFA) is still lacking across many organisations. He notes that many systems still rely on basic MFA methods, such as six-digit codes or push notifications, which do not provide adequate protection against sophisticated attacks. To truly enhance security, organisations must consider more robust identity verification methods and address the complexities introduced by non-human identities as well.</p><h2>The Challenge of Non-Human Identities</h2><p>In the current technological climate, non-human identities such as API keys present significant challenges for security teams. There have been recent incidents where API keys were exploited to gain unauthorised access to sensitive systems, pointing out that organisations must be vigilant in managing these non-human identities. As organisations adopt technologies like passkeys for human users, understanding and securing non-human identities is becoming increasingly important.</p><p>&nbsp;With cyber risks becoming more complex, organisations must adapt their security strategies to address these challenges effectively. Here are a few things businesses can do to protect themselves:</p><ul><li>Prioritise identity security by implementing robust protocols and strategies to combat identity theft.</li><li>Balance patch management with a focus on securing critical assets and data.</li><li>Enhance multifactor authentication practices to ensure stronger protection against unauthorised access.</li><li>Develop a comprehensive understanding of non-human identities and implement measures to secure them.</li></ul><br/><p>&nbsp;By staying informed about the latest trends and insights in cybersecurity, organisations can better equip themselves to fend off the growing tide of cyber threats. For more information, visit&nbsp;<a href="https://www.sophos.com/" rel="noopener noreferrer" target="_blank">https://www.sophos.com/</a></p><h2>Takeaways</h2><ul><li>Nearly 70 per cent of incidents last year involved identity-related issues.</li><li>Attackers find it easier to log in as authorised users.</li><li>Patching and vulnerability management are challenging for organisations.</li><li>MFA adoption remains low despite its importance.</li><li>Most attacks occur outside of normal business hours.</li><li>Median incident response time is significantly reduced with MDR services.</li><li>Employees can act as early warning systems for security threats.</li><li>Focusing on basic cybersecurity practices is essential.</li><li>AI can help streamline data analysis in incident response.</li><li>AI is also being used to enhance phishing attacks.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Challenges</p><p>02:57 Understanding the Active Adversary Report</p><p>05:55 The Shift Towards Identity-Based Attacks</p><p>08:48 Balancing Patching and Identity Management</p><p>12:04 Operational Challenges for CISOs</p><p>15:09 Leveraging Employee Awareness for Security</p><p>18:12 Practical Steps for CISOs to Strengthen Resilience</p><p>20:56 The Role of AI in Cybersecurity</p>]]></description><content:encoded><![CDATA[<p>In an era of accelerating digital change, understanding the tactics employed by modern attackers is crucial for organisations doing everything in their power to protect their sensitive information. In this episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist podcast</a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/chester-wisniewski/" rel="noopener noreferrer" target="_blank">Chester Wisniewski</a>, Director, Global Field CISO of&nbsp;<a href="https://www.sophos.com/" rel="noopener noreferrer" target="_blank">Sophos</a>, examine the findings of the&nbsp;<em>Active Adversary Report</em>, compiled by Wisniewski and his team, shedding light on how cyber threats are changing and what security leaders can do to adapt their strategies.&nbsp;</p><h2>Understanding the Active Adversary Report</h2><p>&nbsp;The&nbsp;<a href="https://www.sophos.com/en-us/press/press-releases/sophos-active-adversary-report-2026-identity-attacks-dominate-as-threat-groups-proliferate" rel="noopener noreferrer" target="_blank">Active Adversary Report</a>, compiled by Wisniewski’s team at Sophos, provides invaluable insights into the common pitfalls organisations face when responding to cyber incidents. With Chester's extensive experience in cybersecurity and incident response, the report aims to analyse real-world data from hundreds of incident responses across 50 countries. The report categorises incidents into two main groups: those who seek immediate help during a crisis and those who utilise managed detection and response services. By examining these cases, the report identifies key indicators that contribute to security breaches, offering organisations a roadmap to enhance their security posture.</p><h2>The Focus on Identity Theft</h2><p>One of the most startling revelations from the report is that nearly 70 per cent of incidents last year were linked to identity-related issues such as stolen passwords, session tokens, or phishing attacks. Chester explains that attackers are increasingly leveraging identity theft because it is often easier to log in as an authorised user than to break into a system. This trend underscores the importance of security teams to prioritise identity management as part of their overall strategy.</p><p>Wisniewski also emphasises that the ease of access through stolen credentials presents fewer telltale signs of unauthorised activity, making it harder for organisations to detect breaches. In the past, cybercriminals often exploited vulnerabilities in software like Flash and Java, but as security measures have improved, they have shifted their tactics toward the more vulnerable area of user identity. This shift indicates a pressing need for organisations to bolster their identity security protocols.</p><h2>Balancing Vulnerability Management with Identity Security</h2><p>&nbsp;As organisations work to strengthen their security measures, the challenge of balancing patch management with a focus on identity security. He points out that while patching vulnerabilities remains essential, many organisations face difficulties, particularly those with hybrid workforces. Unpatched VPN gateways and firewalls have become common entry points for attackers, making it critical for organisations to prioritise their patch management efforts based on exposure and the sensitivity of the data involved.</p><p>Wisniewski&nbsp;advocates for a more strategic approach to identity management, highlighting that the adoption of multifactor authentication (MFA) is still lacking across many organisations. He notes that many systems still rely on basic MFA methods, such as six-digit codes or push notifications, which do not provide adequate protection against sophisticated attacks. To truly enhance security, organisations must consider more robust identity verification methods and address the complexities introduced by non-human identities as well.</p><h2>The Challenge of Non-Human Identities</h2><p>In the current technological climate, non-human identities such as API keys present significant challenges for security teams. There have been recent incidents where API keys were exploited to gain unauthorised access to sensitive systems, pointing out that organisations must be vigilant in managing these non-human identities. As organisations adopt technologies like passkeys for human users, understanding and securing non-human identities is becoming increasingly important.</p><p>&nbsp;With cyber risks becoming more complex, organisations must adapt their security strategies to address these challenges effectively. Here are a few things businesses can do to protect themselves:</p><ul><li>Prioritise identity security by implementing robust protocols and strategies to combat identity theft.</li><li>Balance patch management with a focus on securing critical assets and data.</li><li>Enhance multifactor authentication practices to ensure stronger protection against unauthorised access.</li><li>Develop a comprehensive understanding of non-human identities and implement measures to secure them.</li></ul><br/><p>&nbsp;By staying informed about the latest trends and insights in cybersecurity, organisations can better equip themselves to fend off the growing tide of cyber threats. For more information, visit&nbsp;<a href="https://www.sophos.com/" rel="noopener noreferrer" target="_blank">https://www.sophos.com/</a></p><h2>Takeaways</h2><ul><li>Nearly 70 per cent of incidents last year involved identity-related issues.</li><li>Attackers find it easier to log in as authorised users.</li><li>Patching and vulnerability management are challenging for organisations.</li><li>MFA adoption remains low despite its importance.</li><li>Most attacks occur outside of normal business hours.</li><li>Median incident response time is significantly reduced with MDR services.</li><li>Employees can act as early warning systems for security threats.</li><li>Focusing on basic cybersecurity practices is essential.</li><li>AI can help streamline data analysis in incident response.</li><li>AI is also being used to enhance phishing attacks.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Cybersecurity Challenges</p><p>02:57 Understanding the Active Adversary Report</p><p>05:55 The Shift Towards Identity-Based Attacks</p><p>08:48 Balancing Patching and Identity Management</p><p>12:04 Operational Challenges for CISOs</p><p>15:09 Leveraging Employee Awareness for Security</p><p>18:12 Practical Steps for CISOs to Strengthen Resilience</p><p>20:56 The Role of AI in Cybersecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e6d4a862-5048-47e7-ba1d-5f1bbd83e6d7</guid><itunes:image href="https://artwork.captivate.fm/7842ea63-0bdb-4436-86f6-24e2361ac7ba/2026-08-As-cyber-threats-evolve-organisations-must-adapt-their-.jpg"/><pubDate>Tue, 24 Feb 2026 14:00:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/e6d4a862-5048-47e7-ba1d-5f1bbd83e6d7.mp3" length="49235112" type="audio/mpeg"/><itunes:duration>20:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026"><podcast:source uri="https://youtu.be/HGrGFQ3C6ts"/></podcast:alternateEnclosure></item><item><title>Are CISOs Blind to the Biggest Cloud Attack Surface?</title><itunes:title>Are CISOs Blind to the Biggest Cloud Attack Surface?</itunes:title><description><![CDATA[<p><strong>Podcast series: </strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist</strong></a></p><p><strong>Guest: </strong><a href="https://www.linkedin.com/in/doug-m-33169/" rel="noopener noreferrer" target="_blank"><strong>Doug Merritt, Chairperson, CEO, and President of Aviatrix</strong></a></p><p><strong>Host: </strong><a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank"><strong>Shubhangi Dua, Podcast Host, Producer and B2B Tech Journalist at <em>EM360Tech</em></strong></a></p><p>Cloud security now involves more than just protecting a single environment. As organisations grow across multiple clouds, integrate SaaS platforms, modernise applications, and deploy AI-driven workloads, the attack surface expands in complex ways that are hard to see and even harder to manage.</p><p>In the recent episode of <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Doug Merritt, Chairperson, CEO, and President of Aviatrix, a cloud network security company, sits down with Shubhangi Dua, Podcast Host, Producer and B2B Tech Journalist at <em>EM360Tech</em>. They discuss why gaps in cloud networking visibility are becoming one of the biggest security risks for businesses today.</p><p>The conversation also covers how cloud complexity has changed over time, why old security models struggle to keep up, and what practical steps leaders can take to lower exposure before attackers exploit hidden pathways.</p><h2><strong>Securing the World’s Digital Fabric</strong></h2><p>On a mission to secure “the world’s digital fabric,” Merritt spotlights the reasons explaining that organisations often perceive cybersecurity through “constructs and silos.” However, attackers see the entire landscape, which leads to a gap in the perspective.</p><p>Most enterprises started their cloud journey with lift-and-shift migrations, moving familiar applications from <a href="https://em360tech.com/tech-articles/what-data-fabric-architecture-features-and-use-cases" rel="noopener noreferrer" target="_blank">data centres to the cloud</a>. Over time, these applications were modernised, broken into containerised services, and expanded with <a href="https://em360tech.com/tech-articles/what-serverless-architecture-comprehensive-guide-saas-platforms" rel="noopener noreferrer" target="_blank"><strong>serverless functions</strong></a>, <a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank"><strong>APIs</strong></a>, and third-party SaaS platforms.</p><p>Merritt notes that applications today often involve "10 to 15 different major components from start to finish," many of which exist across different clouds or outside direct organisational control.</p><p>This variety has brought speed and innovation, but it has also led to vastly different workload behaviours. Some workloads are long-lasting, others are temporary, and many can be accessed publicly.</p><p>According to the <a href="https://aviatrix.ai/" rel="noopener noreferrer" target="_blank"><strong>Aviatrix</strong></a> CEO, this "really powerful landscape" has resulted in "an incredibly powerful attack surface." Without consistent visibility and remediation across all workloads, attackers can find "which workloads have value and which workloads are unprotected" and move laterally until they reach critical assets.</p><p>AI adds additional challenges. While the technology seems new, he further emphasises that <a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank"><strong>AI agents</strong></a> are still workloads with identities, operating at high speed and broad permission levels. They rely completely on network connectivity, making the network a crucial point for both visibility and control. In a hyper-connected environment, he argues, the network should be seen as a key security layer rather than just a transport system.</p><h2><strong>How to Prepare for the Next Wave of Cloud Threats</strong></h2><p>When asked what CIOs, CISOs, and cloud leaders should focus on next, Merritt alludes to a reality check. He urges leaders to choose a single complex application and ask their teams to identify every workload involved, every network path taken, and whether there is visibility into "every packet that goes into the workload and comes back out."</p><p>In most cases, he says, organisations find that they cannot do this. This gap reveals the first and most urgent issue: a lack of understanding of the environment itself. Without a clear map of workloads and communication paths, security teams operate with blind spots.</p><p>The Chairperson of Aviatrix insists that visibility must come before control. Once organisations understand their exposure, they can prioritise the "most dangerous communication pathways" and secure them. He warns that many large enterprises still have "thousands of workloads with direct internet connections and no filter in front," describing this exposure as "horrific," given how easily even less sophisticated attackers could exploit it.</p><p>He also points out that visibility and enforcement must be close to the workload. Centralised controls increase costs and latency, while distributed enforcement allows for faster response and containment. Ultimately, just observing traffic isn't enough; organisations need to be able to act.</p><p>Cloud security isn’t about adding more tools; it’s about changing perspective. By mapping workloads, understanding communication paths, and using the network as a consistent layer for visibility and enforcement, organisations can reduce lateral movement, limit blast radius, and prepare more effectively for the next generation of cloud threats.</p><h3><strong>Takeaways</strong></h3><ol><li>Organisations need to focus on the uncovered attack surface.</li><li>The digital fabric includes diverse workloads across multiple clouds.</li><li>Visibility and remediation are critical in managing workloads.</li><li>The complexity of multi-cloud environments is increasing.</li><li>AI is accelerating the evolution of cloud security challenges.</li><li>Networking plays a pivotal role in security strategies.</li><li>Collaboration between security, networking, and cloud teams is essential.</li><li>Mapping workloads and communication pathways is crucial for security.</li><li>Organisations must prioritise securing high-risk workloads.</li><li>Understanding the shared responsibility model is vital for cloud security.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li>00:00 Introduction to Cloud Security Challenges</li><li>03:03 Understanding the Digital Fabric</li><li>05:56 Navigating the Modern Attack Surface</li><li>08:46 Key Trends in Cloud Adoption</li><li>12:11 The Complexity of Multi-Cloud Environments</li><li>14:51 The Evolving Role of Networking in Security</li><li>17:58 Bridging the Gap Between Teams</li><li>21:02 Real-World Solutions and Case Studies</li><li>23:53 Preparing for Future Threats</li><li>29:09 Final Thoughts and Key Takeaways</li></ol><br/><p>#CloudSecurity #MultiCloud #CloudNetworking #Aviatrix #CISO #AttackSurface #CloudThreats #EnterpriseSecurity #TechPodcast #SecurityStrategist #DigitalFabric #AIinSecurity #WorkloadSecurity</p><p><strong>For more information, visit </strong><a href="http://aviatrix.ai/" rel="noopener noreferrer" target="_blank"><strong>aviatrix.ai</strong></a><strong> and </strong><a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank"><strong>em360tech.com</strong></a><strong>. </strong></p><p>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></p><p>Aviatrix YT: @AviatrixSystems</p><p>Aviatrix LinkedIn: https://www.linkedin.com/company/aviatrix-systems/</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast series: </strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist</strong></a></p><p><strong>Guest: </strong><a href="https://www.linkedin.com/in/doug-m-33169/" rel="noopener noreferrer" target="_blank"><strong>Doug Merritt, Chairperson, CEO, and President of Aviatrix</strong></a></p><p><strong>Host: </strong><a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank"><strong>Shubhangi Dua, Podcast Host, Producer and B2B Tech Journalist at <em>EM360Tech</em></strong></a></p><p>Cloud security now involves more than just protecting a single environment. As organisations grow across multiple clouds, integrate SaaS platforms, modernise applications, and deploy AI-driven workloads, the attack surface expands in complex ways that are hard to see and even harder to manage.</p><p>In the recent episode of <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Doug Merritt, Chairperson, CEO, and President of Aviatrix, a cloud network security company, sits down with Shubhangi Dua, Podcast Host, Producer and B2B Tech Journalist at <em>EM360Tech</em>. They discuss why gaps in cloud networking visibility are becoming one of the biggest security risks for businesses today.</p><p>The conversation also covers how cloud complexity has changed over time, why old security models struggle to keep up, and what practical steps leaders can take to lower exposure before attackers exploit hidden pathways.</p><h2><strong>Securing the World’s Digital Fabric</strong></h2><p>On a mission to secure “the world’s digital fabric,” Merritt spotlights the reasons explaining that organisations often perceive cybersecurity through “constructs and silos.” However, attackers see the entire landscape, which leads to a gap in the perspective.</p><p>Most enterprises started their cloud journey with lift-and-shift migrations, moving familiar applications from <a href="https://em360tech.com/tech-articles/what-data-fabric-architecture-features-and-use-cases" rel="noopener noreferrer" target="_blank">data centres to the cloud</a>. Over time, these applications were modernised, broken into containerised services, and expanded with <a href="https://em360tech.com/tech-articles/what-serverless-architecture-comprehensive-guide-saas-platforms" rel="noopener noreferrer" target="_blank"><strong>serverless functions</strong></a>, <a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank"><strong>APIs</strong></a>, and third-party SaaS platforms.</p><p>Merritt notes that applications today often involve "10 to 15 different major components from start to finish," many of which exist across different clouds or outside direct organisational control.</p><p>This variety has brought speed and innovation, but it has also led to vastly different workload behaviours. Some workloads are long-lasting, others are temporary, and many can be accessed publicly.</p><p>According to the <a href="https://aviatrix.ai/" rel="noopener noreferrer" target="_blank"><strong>Aviatrix</strong></a> CEO, this "really powerful landscape" has resulted in "an incredibly powerful attack surface." Without consistent visibility and remediation across all workloads, attackers can find "which workloads have value and which workloads are unprotected" and move laterally until they reach critical assets.</p><p>AI adds additional challenges. While the technology seems new, he further emphasises that <a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank"><strong>AI agents</strong></a> are still workloads with identities, operating at high speed and broad permission levels. They rely completely on network connectivity, making the network a crucial point for both visibility and control. In a hyper-connected environment, he argues, the network should be seen as a key security layer rather than just a transport system.</p><h2><strong>How to Prepare for the Next Wave of Cloud Threats</strong></h2><p>When asked what CIOs, CISOs, and cloud leaders should focus on next, Merritt alludes to a reality check. He urges leaders to choose a single complex application and ask their teams to identify every workload involved, every network path taken, and whether there is visibility into "every packet that goes into the workload and comes back out."</p><p>In most cases, he says, organisations find that they cannot do this. This gap reveals the first and most urgent issue: a lack of understanding of the environment itself. Without a clear map of workloads and communication paths, security teams operate with blind spots.</p><p>The Chairperson of Aviatrix insists that visibility must come before control. Once organisations understand their exposure, they can prioritise the "most dangerous communication pathways" and secure them. He warns that many large enterprises still have "thousands of workloads with direct internet connections and no filter in front," describing this exposure as "horrific," given how easily even less sophisticated attackers could exploit it.</p><p>He also points out that visibility and enforcement must be close to the workload. Centralised controls increase costs and latency, while distributed enforcement allows for faster response and containment. Ultimately, just observing traffic isn't enough; organisations need to be able to act.</p><p>Cloud security isn’t about adding more tools; it’s about changing perspective. By mapping workloads, understanding communication paths, and using the network as a consistent layer for visibility and enforcement, organisations can reduce lateral movement, limit blast radius, and prepare more effectively for the next generation of cloud threats.</p><h3><strong>Takeaways</strong></h3><ol><li>Organisations need to focus on the uncovered attack surface.</li><li>The digital fabric includes diverse workloads across multiple clouds.</li><li>Visibility and remediation are critical in managing workloads.</li><li>The complexity of multi-cloud environments is increasing.</li><li>AI is accelerating the evolution of cloud security challenges.</li><li>Networking plays a pivotal role in security strategies.</li><li>Collaboration between security, networking, and cloud teams is essential.</li><li>Mapping workloads and communication pathways is crucial for security.</li><li>Organisations must prioritise securing high-risk workloads.</li><li>Understanding the shared responsibility model is vital for cloud security.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li>00:00 Introduction to Cloud Security Challenges</li><li>03:03 Understanding the Digital Fabric</li><li>05:56 Navigating the Modern Attack Surface</li><li>08:46 Key Trends in Cloud Adoption</li><li>12:11 The Complexity of Multi-Cloud Environments</li><li>14:51 The Evolving Role of Networking in Security</li><li>17:58 Bridging the Gap Between Teams</li><li>21:02 Real-World Solutions and Case Studies</li><li>23:53 Preparing for Future Threats</li><li>29:09 Final Thoughts and Key Takeaways</li></ol><br/><p>#CloudSecurity #MultiCloud #CloudNetworking #Aviatrix #CISO #AttackSurface #CloudThreats #EnterpriseSecurity #TechPodcast #SecurityStrategist #DigitalFabric #AIinSecurity #WorkloadSecurity</p><p><strong>For more information, visit </strong><a href="http://aviatrix.ai/" rel="noopener noreferrer" target="_blank"><strong>aviatrix.ai</strong></a><strong> and </strong><a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank"><strong>em360tech.com</strong></a><strong>. </strong></p><p>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></p><p>Aviatrix YT: @AviatrixSystems</p><p>Aviatrix LinkedIn: https://www.linkedin.com/company/aviatrix-systems/</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">94161a9c-c883-488e-b563-f80c5d5dcc26</guid><itunes:image href="https://artwork.captivate.fm/def8885f-2065-434a-ba35-cc91904899f2/2026-11-The-cybersecurity-perimeter-has-atomised-the-internet-i.jpg"/><pubDate>Tue, 24 Feb 2026 13:45:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/94161a9c-c883-488e-b563-f80c5d5dcc26.mp3" length="76205809" type="audio/mpeg"/><itunes:duration>31:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Are CISOs Blind to the Biggest Cloud Attack Surface?"><podcast:source uri="https://youtu.be/wH9HooWyIRY"/></podcast:alternateEnclosure></item><item><title>The Human Factor in Cybersecurity: Behavioural Interventions That Work</title><itunes:title>The Human Factor in Cybersecurity: Behavioural Interventions That Work</itunes:title><description><![CDATA[<p>Cybersecurity often feels like a battle of technologies—firewalls, AI, monitoring tools, but at its core, it’s human. People are both the first line of defence and, more often than not, the most vulnerable point. On a recent episode of <a href="https://em360tech.com/podcasts" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a> spoke with <a href="https://www.linkedin.com/in/nicolekjiang/" rel="noopener noreferrer" target="_blank">Nicole Jiang-Gibson</a>, Chief Executive Officer of <a href="https://fablesecurity.com/" rel="noopener noreferrer" target="_blank">Fable Security</a>, about why traditional training doesn’t work and how understanding human behaviour can fundamentally change an organisation’s security posture.</p><h2>Humans are the Weakest Link</h2><p>Nicole’s journey in cybersecurity began long before Fable. She was an early member at Abnormal Security, where she helped build email security solutions. That experience exposed a recurring truth, and that was even the best technical safeguards can be undone by human error.</p><p>“Human error is really the number one cause at the beginning of cybersecurity incidents,” Nicole explains. “Phishing attacks are the number-one starting point—one click, one misstep, and suddenly the consequences are massive.”</p><p>She recalls the MGM Resorts breach as a turning point: an IT help desk employee took a phone call from someone impersonating an Okta admin, leading to a major security lapse. “Even with strong email defences, people were exposed in ways technology couldn’t prevent. That’s when I realised that this was a human problem we needed to solve.”</p><h2>Seeing Security Through the Attacker’s Eyes</h2><p>Fable Security’s approach is rooted in understanding both the employee and attacker behaviour. Nicole describes it almost like a conversation at both sides of the table.</p><p>“Looking at security from the attacker’s perspective changes how organisations design interventions,” she says. Employees often don’t even realise which actions put them at risk. By understanding predictable behaviours, we can build targeted, timely interventions instead of generic training modules that people forget.”</p><p>The company leverages data to identify risky behaviours and reinforce safe ones. Richard notes that this can turn the math of phishing attacks in an organisation’s favour, reducing the likelihood of a click from 40 per cent to 2 per cent, for example, meaning attackers have to try 50 times to succeed once.</p><h2>Reinforcement Not Punishment</h2><p>One of the major differences in Fable’s approach is how they treat learning. Traditional phishing simulations can leave employees feeling tricked or shamed. Fable focuses on reinforcement and repetition, creating a culture where security is part of everyday decision-making.</p><p>“We empower organisations with data to understand how employees behave and then help them stay one step ahead of attacks,” Nicole explains. “It’s not just about preventing business loss, it’s about protecting culture, brand, and employee safety.”</p><p>By shifting the focus from blame to understanding and from generic training to targeted behavioural interventions, organisations can finally address the human factor in cybersecurity with the seriousness and nuance it deserves.</p><p>For more information, visit <a href="http://fablesecurity.com/" rel="noopener noreferrer" target="_blank">fablesecurity.com</a></p><h2>Takeaways</h2><ol><li>Cybersecurity is not just about technology; it's about people.</li><li>Traditional training often fails to change behaviour effectively.</li><li>Human errors are the leading cause of cybersecurity incidents.</li><li>Fable Security focuses on understanding and changing human behaviour.</li><li>The threat landscape is constantly evolving, requiring adaptive solutions.</li><li>Organisations must view security as a supportive, not punitive, measure.</li><li>Phishing simulations can be harmful if not conducted ethically.</li><li>Building trust with employees is essential for effective security training.</li><li>Employees can serve as valuable sensors for identifying threats.</li><li>Meaningful behaviour change requires a shift in mindset and approach.</li></ol><br/><h2>Chapters</h2><p>00:00 The Human Factor in Cybersecurity</p><p>01:11 Fable Security's Origin Story</p><p>04:23 Understanding Human Vulnerabilities</p><p>06:01 The Attacker's Perspective</p><p>08:29 Fable's Ad Tech Approach</p><p>12:04 Revolutionising Security Training</p><p>14:37 The Ethics of Phishing Simulations</p><p>19:42 Building Trust in Security Training</p><p>22:56 Empowering Employees as Sensors</p><p>27:40 Steps Towards Meaningful Behaviour Change</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity often feels like a battle of technologies—firewalls, AI, monitoring tools, but at its core, it’s human. People are both the first line of defence and, more often than not, the most vulnerable point. On a recent episode of <a href="https://em360tech.com/podcasts" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a> spoke with <a href="https://www.linkedin.com/in/nicolekjiang/" rel="noopener noreferrer" target="_blank">Nicole Jiang-Gibson</a>, Chief Executive Officer of <a href="https://fablesecurity.com/" rel="noopener noreferrer" target="_blank">Fable Security</a>, about why traditional training doesn’t work and how understanding human behaviour can fundamentally change an organisation’s security posture.</p><h2>Humans are the Weakest Link</h2><p>Nicole’s journey in cybersecurity began long before Fable. She was an early member at Abnormal Security, where she helped build email security solutions. That experience exposed a recurring truth, and that was even the best technical safeguards can be undone by human error.</p><p>“Human error is really the number one cause at the beginning of cybersecurity incidents,” Nicole explains. “Phishing attacks are the number-one starting point—one click, one misstep, and suddenly the consequences are massive.”</p><p>She recalls the MGM Resorts breach as a turning point: an IT help desk employee took a phone call from someone impersonating an Okta admin, leading to a major security lapse. “Even with strong email defences, people were exposed in ways technology couldn’t prevent. That’s when I realised that this was a human problem we needed to solve.”</p><h2>Seeing Security Through the Attacker’s Eyes</h2><p>Fable Security’s approach is rooted in understanding both the employee and attacker behaviour. Nicole describes it almost like a conversation at both sides of the table.</p><p>“Looking at security from the attacker’s perspective changes how organisations design interventions,” she says. Employees often don’t even realise which actions put them at risk. By understanding predictable behaviours, we can build targeted, timely interventions instead of generic training modules that people forget.”</p><p>The company leverages data to identify risky behaviours and reinforce safe ones. Richard notes that this can turn the math of phishing attacks in an organisation’s favour, reducing the likelihood of a click from 40 per cent to 2 per cent, for example, meaning attackers have to try 50 times to succeed once.</p><h2>Reinforcement Not Punishment</h2><p>One of the major differences in Fable’s approach is how they treat learning. Traditional phishing simulations can leave employees feeling tricked or shamed. Fable focuses on reinforcement and repetition, creating a culture where security is part of everyday decision-making.</p><p>“We empower organisations with data to understand how employees behave and then help them stay one step ahead of attacks,” Nicole explains. “It’s not just about preventing business loss, it’s about protecting culture, brand, and employee safety.”</p><p>By shifting the focus from blame to understanding and from generic training to targeted behavioural interventions, organisations can finally address the human factor in cybersecurity with the seriousness and nuance it deserves.</p><p>For more information, visit <a href="http://fablesecurity.com/" rel="noopener noreferrer" target="_blank">fablesecurity.com</a></p><h2>Takeaways</h2><ol><li>Cybersecurity is not just about technology; it's about people.</li><li>Traditional training often fails to change behaviour effectively.</li><li>Human errors are the leading cause of cybersecurity incidents.</li><li>Fable Security focuses on understanding and changing human behaviour.</li><li>The threat landscape is constantly evolving, requiring adaptive solutions.</li><li>Organisations must view security as a supportive, not punitive, measure.</li><li>Phishing simulations can be harmful if not conducted ethically.</li><li>Building trust with employees is essential for effective security training.</li><li>Employees can serve as valuable sensors for identifying threats.</li><li>Meaningful behaviour change requires a shift in mindset and approach.</li></ol><br/><h2>Chapters</h2><p>00:00 The Human Factor in Cybersecurity</p><p>01:11 Fable Security's Origin Story</p><p>04:23 Understanding Human Vulnerabilities</p><p>06:01 The Attacker's Perspective</p><p>08:29 Fable's Ad Tech Approach</p><p>12:04 Revolutionising Security Training</p><p>14:37 The Ethics of Phishing Simulations</p><p>19:42 Building Trust in Security Training</p><p>22:56 Empowering Employees as Sensors</p><p>27:40 Steps Towards Meaningful Behaviour Change</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c8cdb312-2427-4bc1-937f-ac4501927cb1</guid><itunes:image href="https://artwork.captivate.fm/b866e305-2dd8-4348-bae6-03fc9eaa928c/ry-1.png"/><pubDate>Tue, 24 Feb 2026 13:45:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c8cdb312-2427-4bc1-937f-ac4501927cb1.mp3" length="65370133" type="audio/mpeg"/><itunes:duration>27:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="The Human Factor in Cybersecurity: Behavioural Interventions That Work"><podcast:source uri="https://youtu.be/RqYca3u17Ak"/></podcast:alternateEnclosure></item><item><title>Securing AI-Driven Development in Modern Enterprises</title><itunes:title>Securing AI-Driven Development in Modern Enterprises</itunes:title><description><![CDATA[<p>When code is no longer written solely by humans, the way we think about application security has to change. In a recent episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>&nbsp;podcast, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;sits down with&nbsp;<a href="https://www.linkedin.com/in/bashvitz/" rel="noopener noreferrer" target="_blank">Gadi Bashvitz</a>, CEO of&nbsp;<a href="https://brightsec.com/" rel="noopener noreferrer" target="_blank">Bright Security</a>, to talk about the challenges and opportunities of securing applications in an AI-driven world. Their conversation reveals a reality many organisations are only beginning to face, and that is vulnerabilities are multiplying faster than ever, and traditional security tools aren’t keeping up.</p><h2>Rethinking Application Security for a New Reality</h2><p>Since 2018, Bright Security has been helping organisations secure their applications and APIs. Gadi Bashvitz shares that the company’s journey has always been about anticipating challenges before they become crises.&nbsp;</p><p>“And that’s what we did from 2019 to 2024—signed up some of the world’s largest financial institutions and insurance companies, so very proud of that customer base,” he explains.</p><p>But in 2024, everything changed. Customers started raising concerns about AI-assisted coding. Bashvitz recalls:</p><p>“Some of those customers came to us and said, ‘Houston, we’ve got a problem. We’re starting to adopt AI-assisted coding.’ We’ve gone from a world where a developer generates 100 per cent of code and 100 per cent of vulnerabilities, to one where that developer is now generating 200 per cent of code and 600 per cent of vulnerabilities. That AI-generated code is three times more prone to vulnerabilities.”</p><p>This shift exposes a fundamental truth, and that is that AI is reshaping software development, but not always in ways organisations are ready to manage. What was once a controlled DevOps process is now a rapid, high-volume environment where oversight can easily slip.</p><h2>The Hidden Risks of AI-Generated Code</h2><p>The impact is real and immediate. Marketing teams, product managers, and developers alike are generating code faster than ever, but without the traditional checks and balances. Bashvitz highlights that AI models are trained on open-source code, often without security in mind. This means vulnerabilities multiply at a rate that can overwhelm static tools or conventional security processes.</p><p>Organisations are feeling the pressure daily, realising that if they don’t adapt, AI-generated vulnerabilities could outpace their ability to detect and mitigate risks.</p><h2>Embedding Security Into Every Step of Development</h2><p>So how can enterprises regain control? Bashvitz is clear: it’s not too late, but action must be deliberate.</p><p>“At some point, there will be a few very, very significant hacks that will take us back,” he warns. “The key is to embed dynamic security measures directly into the development lifecycle. That’s how you catch vulnerabilities, even when code is being generated at an unprecedented scale.”</p><p>Dynamic Application Security Testing (DAST) is one approach Bright Security has championed. Unlike traditional static tools, dynamic testing integrates into code repositories and runs throughout the development pipeline, from unit tests to production deployment. This approach doesn’t just mitigate risk—it empowers teams to continue innovating without being paralysed by fear of vulnerabilities. The goal is to create a balance where AI-driven productivity and robust security coexist.</p><p>For more information, visit&nbsp;<a href="https://brightsec.com/" rel="noopener noreferrer" target="_blank">https://brightsec.com</a></p><h2>Takeaways</h2><ul><li>Bright Security was founded to address application and API security gaps.</li><li>AI-driven code generation has significantly increased the number of vulnerabilities.</li><li>Dynamic application security testing (DAST) is essential for modern development practices.</li><li>Static analysis tools often produce high rates of false positives, wasting developer time.</li><li>Organisations must adapt security practices to include both finding and fixing vulnerabilities.</li><li>The integration of AI in security tools can streamline vulnerability management.</li><li>Dynamic validation of static scan results can reduce noise in security findings.</li><li>CISOs must collaborate with DevOps teams to ensure security is integrated into development.</li><li>The rise of AI has introduced new types of vulnerabilities that need to be addressed.</li><li>Security practices must evolve to keep pace with rapid technological changes.</li></ul><br/><h2>Chapters</h2><p>00:00 The Evolution of Application Security</p><p>03:41 AI's Impact on Code Generation</p><p>09:39 Challenges of Traditional Security Tools</p><p>16:31 Integrating AI in Security Solutions</p><p>21:20 Future of Security in AI-Driven Development</p>]]></description><content:encoded><![CDATA[<p>When code is no longer written solely by humans, the way we think about application security has to change. In a recent episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>&nbsp;podcast, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;sits down with&nbsp;<a href="https://www.linkedin.com/in/bashvitz/" rel="noopener noreferrer" target="_blank">Gadi Bashvitz</a>, CEO of&nbsp;<a href="https://brightsec.com/" rel="noopener noreferrer" target="_blank">Bright Security</a>, to talk about the challenges and opportunities of securing applications in an AI-driven world. Their conversation reveals a reality many organisations are only beginning to face, and that is vulnerabilities are multiplying faster than ever, and traditional security tools aren’t keeping up.</p><h2>Rethinking Application Security for a New Reality</h2><p>Since 2018, Bright Security has been helping organisations secure their applications and APIs. Gadi Bashvitz shares that the company’s journey has always been about anticipating challenges before they become crises.&nbsp;</p><p>“And that’s what we did from 2019 to 2024—signed up some of the world’s largest financial institutions and insurance companies, so very proud of that customer base,” he explains.</p><p>But in 2024, everything changed. Customers started raising concerns about AI-assisted coding. Bashvitz recalls:</p><p>“Some of those customers came to us and said, ‘Houston, we’ve got a problem. We’re starting to adopt AI-assisted coding.’ We’ve gone from a world where a developer generates 100 per cent of code and 100 per cent of vulnerabilities, to one where that developer is now generating 200 per cent of code and 600 per cent of vulnerabilities. That AI-generated code is three times more prone to vulnerabilities.”</p><p>This shift exposes a fundamental truth, and that is that AI is reshaping software development, but not always in ways organisations are ready to manage. What was once a controlled DevOps process is now a rapid, high-volume environment where oversight can easily slip.</p><h2>The Hidden Risks of AI-Generated Code</h2><p>The impact is real and immediate. Marketing teams, product managers, and developers alike are generating code faster than ever, but without the traditional checks and balances. Bashvitz highlights that AI models are trained on open-source code, often without security in mind. This means vulnerabilities multiply at a rate that can overwhelm static tools or conventional security processes.</p><p>Organisations are feeling the pressure daily, realising that if they don’t adapt, AI-generated vulnerabilities could outpace their ability to detect and mitigate risks.</p><h2>Embedding Security Into Every Step of Development</h2><p>So how can enterprises regain control? Bashvitz is clear: it’s not too late, but action must be deliberate.</p><p>“At some point, there will be a few very, very significant hacks that will take us back,” he warns. “The key is to embed dynamic security measures directly into the development lifecycle. That’s how you catch vulnerabilities, even when code is being generated at an unprecedented scale.”</p><p>Dynamic Application Security Testing (DAST) is one approach Bright Security has championed. Unlike traditional static tools, dynamic testing integrates into code repositories and runs throughout the development pipeline, from unit tests to production deployment. This approach doesn’t just mitigate risk—it empowers teams to continue innovating without being paralysed by fear of vulnerabilities. The goal is to create a balance where AI-driven productivity and robust security coexist.</p><p>For more information, visit&nbsp;<a href="https://brightsec.com/" rel="noopener noreferrer" target="_blank">https://brightsec.com</a></p><h2>Takeaways</h2><ul><li>Bright Security was founded to address application and API security gaps.</li><li>AI-driven code generation has significantly increased the number of vulnerabilities.</li><li>Dynamic application security testing (DAST) is essential for modern development practices.</li><li>Static analysis tools often produce high rates of false positives, wasting developer time.</li><li>Organisations must adapt security practices to include both finding and fixing vulnerabilities.</li><li>The integration of AI in security tools can streamline vulnerability management.</li><li>Dynamic validation of static scan results can reduce noise in security findings.</li><li>CISOs must collaborate with DevOps teams to ensure security is integrated into development.</li><li>The rise of AI has introduced new types of vulnerabilities that need to be addressed.</li><li>Security practices must evolve to keep pace with rapid technological changes.</li></ul><br/><h2>Chapters</h2><p>00:00 The Evolution of Application Security</p><p>03:41 AI's Impact on Code Generation</p><p>09:39 Challenges of Traditional Security Tools</p><p>16:31 Integrating AI in Security Solutions</p><p>21:20 Future of Security in AI-Driven Development</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a3680dcf-5afd-4751-9f1b-d38bd87f02b6</guid><itunes:image href="https://artwork.captivate.fm/63313fc9-82e7-4833-8f44-38c4e44a7cd5/ry.png"/><pubDate>Mon, 23 Feb 2026 12:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/a3680dcf-5afd-4751-9f1b-d38bd87f02b6.mp3" length="59833800" type="audio/mpeg"/><itunes:duration>24:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?</title><itunes:title>Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?</itunes:title><description><![CDATA[<p>Cybersecurity, for many years, has functioned on an obvious assumption that attacks repeat themselves. For instance, if a phishing email works once, it will work again. Simply put, catch it, study it, write a signature, update the model — and block the next wave.</p><p>What if there is no next wave? What happens when every malicious email is now uniquely written by AI, personalised at scale, and never seen before?</p><p>In the recent episode of <strong><em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The</a></em></strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"> </a><strong><em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a></em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"> podcast</a></strong>, host<strong><a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"> Richard Stiennon</a></strong> spoke with <strong><a href="https://www.linkedin.com/in/alan-lefort73/" rel="noopener noreferrer" target="_blank">Alan LeFort, CEO of StrongestLayer</a></strong>, and <strong>Eric Sanchez, CISO at Global Law Firm</strong>, about how generative AI is reshaping email security — and why many traditional defences may already be obsolete.</p><h2><strong>Why is Email the Open Door to Attacks? </strong></h2><p>Stiennon questions what many security leaders tacitly ask – If most enterprises run on Microsoft’s ecosystem, why does a separate email security market even exist?</p><p>LeFort responds, stating that attackers are economically rational. They go where entry is cheapest and easiest. For decades, email has been that open door.</p><p>However, the industry has changed. First came secure email gateways built on rules and regex. Then, machine learning systems are trained to distinguish “normal” from “abnormal.” Both improved detection rates and both reduced risk.</p><p>But both depend on <strong>historical data</strong>. They need to have seen an attack before to stop it again.</p><p><strong><a href="https://em360tech.com/tech-articles/2025-predictions-generative-ai-and-beyond" rel="noopener noreferrer" target="_blank">Generative AI</a></strong> is believed to have changed that. It enables attackers to create perfectly written, highly personalised phishing emails at near-zero cost. According to a study from the Harvard Kennedy School, AI-generated <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing</a></strong> achieved a 54% click rate among trained employees — more than four times the baseline. Even more concerning, the cost of crafting those emails dropped from roughly $15–$20 in labour to just a few cents.</p><p>That economic shift is seismic. When every email can be unique, the pattern is difficult to spot, signatures are not updated, and a “previous attack” to learn from is nonexistent.</p><h2><strong>Is Alert Fatigue the Hidden Crisis?</strong></h2><p>While breach headlines dominate the industry, Sanchez spotlights a quieter operational threat – alert fatigue.</p><p>At Orrick, a global law firm handling hundreds of thousands of emails each month, traditional security tools generate a steady stream of alerts. Many turn out to be benign. Analysts triage, close, repeat, Sanchez shared that, over time, the burden compounds. Security teams spend less time stopping real attacks and more time managing noisy systems.</p><p>LeFort argues that false positives are not merely tuning problems — they are architectural problems. Most detection systems rely on a single scoring threshold. If something crosses the line, it’s flagged. If it doesn’t, it passes.</p><p>A key insight to note is that deception alone isn’t malicious intent. Marketing emails are persuasive and sometimes manipulative, yet harmless. A credential-harvesting email, on the other hand, carries real risk. Treating both on the same scoring axis inevitably creates noise.</p><h2><strong>From Pattern Matching to Reasoning</strong></h2><p>StrongestLayer’s approach, as described by LeFort, moves away from pure pattern recognition and toward reasoning. Instead of asking, “Does this match something bad we’ve seen before?” the system evaluates multiple dimensions: What harm would occur if this succeeds? Is it anomalous for this recipient? What is the sender’s likely intent? How much deception is present?</p><p>Crucially, it weighs evidence of innocence alongside evidence of guilt — akin to how opposing arguments are weighed in a courtroom.</p><p>Such a multi-dimensional analysis, LeFort believes, dramatically reduces false positives while still catching novel threats. For Sanchez, the operational benefit is tangible. He describes scenarios where traditional gateways failed to detect unusual phishing techniques, including Unicode-based obfuscation. A reasoning-driven system flagged the anomaly not because it recognised a known signature, but because the structure and context “didn’t make sense.”</p><p>That distinction is critical. AI-generated attacks do not need to repeat. They only need to work once.</p><h2><strong>What key Challenges will Security Teams Face within 2 Years?</strong></h2><p>All speakers agree that over the next 12 to 24 months, security teams face a dual challenge of sophistication and scale. AI lowers the cost of creating attacks and automating personalisation. When volume increases, precision increases and speed increases.</p><p>LeFort emphasises that organisations evaluating <strong><a href="https://em360tech.com/top-10/enterprise-ai-model-security-tools" rel="noopener noreferrer" target="_blank">AI security tools</a></strong> should look beyond detection rates. Automation matters just as much. Does the system eliminate operational drag? Does it allow analysts to focus on strategic threats rather than inbox noise?</p><p>The consensus is that email remains the most common entry point into organisations. What has changed is the attacker’s economics. When personalisation costs pennies and sophistication is automated, defenders must respond in kind.</p><p>The question is no longer whether AI will influence email security. It’s already influencing email cybersecurity across enterprises. The real question is whether an enterprise's defences are still waiting to see the attack twice.</p><h3>Key Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI-generated attacks break detection models that rely on past patterns.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Email remains the easiest and most economical entry point for attackers.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Traditional tools force security teams into a reactive cycle.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Effective AI defence must evaluate context, not just rules.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation is now as critical as detection accuracy.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Stopping the first and only attack is the new security standard.</li></ol><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Cybersecurity and AI's Role</p><p>03:00 The Email Security Landscape and AI's Impact</p><p>05:49 Understanding Alert Fatigue and Its Consequences</p><p>08:52 Innovative Approaches to Email Security</p><p>11:48 The Necessity of AI in Modern Security</p><p>14:55 Future Priorities for Security Leaders</p><p>17:57 Conclusion and Key Takeaways</p><p>#EmailSecurity #AICybersecurity #GenerativeAI #Phishing #B2BSecurity #EnterpriseSecurity #CyberAttack #SecurityStrategist #StrongestLayer #AlertFatigue #CISO #TechPodcast #InfoSec #CyberDefence</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity, for many years, has functioned on an obvious assumption that attacks repeat themselves. For instance, if a phishing email works once, it will work again. Simply put, catch it, study it, write a signature, update the model — and block the next wave.</p><p>What if there is no next wave? What happens when every malicious email is now uniquely written by AI, personalised at scale, and never seen before?</p><p>In the recent episode of <strong><em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The</a></em></strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"> </a><strong><em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a></em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"> podcast</a></strong>, host<strong><a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"> Richard Stiennon</a></strong> spoke with <strong><a href="https://www.linkedin.com/in/alan-lefort73/" rel="noopener noreferrer" target="_blank">Alan LeFort, CEO of StrongestLayer</a></strong>, and <strong>Eric Sanchez, CISO at Global Law Firm</strong>, about how generative AI is reshaping email security — and why many traditional defences may already be obsolete.</p><h2><strong>Why is Email the Open Door to Attacks? </strong></h2><p>Stiennon questions what many security leaders tacitly ask – If most enterprises run on Microsoft’s ecosystem, why does a separate email security market even exist?</p><p>LeFort responds, stating that attackers are economically rational. They go where entry is cheapest and easiest. For decades, email has been that open door.</p><p>However, the industry has changed. First came secure email gateways built on rules and regex. Then, machine learning systems are trained to distinguish “normal” from “abnormal.” Both improved detection rates and both reduced risk.</p><p>But both depend on <strong>historical data</strong>. They need to have seen an attack before to stop it again.</p><p><strong><a href="https://em360tech.com/tech-articles/2025-predictions-generative-ai-and-beyond" rel="noopener noreferrer" target="_blank">Generative AI</a></strong> is believed to have changed that. It enables attackers to create perfectly written, highly personalised phishing emails at near-zero cost. According to a study from the Harvard Kennedy School, AI-generated <strong><a href="https://em360tech.com/tech-articles/what-phishing-cybersecurity-complete-guide" rel="noopener noreferrer" target="_blank">phishing</a></strong> achieved a 54% click rate among trained employees — more than four times the baseline. Even more concerning, the cost of crafting those emails dropped from roughly $15–$20 in labour to just a few cents.</p><p>That economic shift is seismic. When every email can be unique, the pattern is difficult to spot, signatures are not updated, and a “previous attack” to learn from is nonexistent.</p><h2><strong>Is Alert Fatigue the Hidden Crisis?</strong></h2><p>While breach headlines dominate the industry, Sanchez spotlights a quieter operational threat – alert fatigue.</p><p>At Orrick, a global law firm handling hundreds of thousands of emails each month, traditional security tools generate a steady stream of alerts. Many turn out to be benign. Analysts triage, close, repeat, Sanchez shared that, over time, the burden compounds. Security teams spend less time stopping real attacks and more time managing noisy systems.</p><p>LeFort argues that false positives are not merely tuning problems — they are architectural problems. Most detection systems rely on a single scoring threshold. If something crosses the line, it’s flagged. If it doesn’t, it passes.</p><p>A key insight to note is that deception alone isn’t malicious intent. Marketing emails are persuasive and sometimes manipulative, yet harmless. A credential-harvesting email, on the other hand, carries real risk. Treating both on the same scoring axis inevitably creates noise.</p><h2><strong>From Pattern Matching to Reasoning</strong></h2><p>StrongestLayer’s approach, as described by LeFort, moves away from pure pattern recognition and toward reasoning. Instead of asking, “Does this match something bad we’ve seen before?” the system evaluates multiple dimensions: What harm would occur if this succeeds? Is it anomalous for this recipient? What is the sender’s likely intent? How much deception is present?</p><p>Crucially, it weighs evidence of innocence alongside evidence of guilt — akin to how opposing arguments are weighed in a courtroom.</p><p>Such a multi-dimensional analysis, LeFort believes, dramatically reduces false positives while still catching novel threats. For Sanchez, the operational benefit is tangible. He describes scenarios where traditional gateways failed to detect unusual phishing techniques, including Unicode-based obfuscation. A reasoning-driven system flagged the anomaly not because it recognised a known signature, but because the structure and context “didn’t make sense.”</p><p>That distinction is critical. AI-generated attacks do not need to repeat. They only need to work once.</p><h2><strong>What key Challenges will Security Teams Face within 2 Years?</strong></h2><p>All speakers agree that over the next 12 to 24 months, security teams face a dual challenge of sophistication and scale. AI lowers the cost of creating attacks and automating personalisation. When volume increases, precision increases and speed increases.</p><p>LeFort emphasises that organisations evaluating <strong><a href="https://em360tech.com/top-10/enterprise-ai-model-security-tools" rel="noopener noreferrer" target="_blank">AI security tools</a></strong> should look beyond detection rates. Automation matters just as much. Does the system eliminate operational drag? Does it allow analysts to focus on strategic threats rather than inbox noise?</p><p>The consensus is that email remains the most common entry point into organisations. What has changed is the attacker’s economics. When personalisation costs pennies and sophistication is automated, defenders must respond in kind.</p><p>The question is no longer whether AI will influence email security. It’s already influencing email cybersecurity across enterprises. The real question is whether an enterprise's defences are still waiting to see the attack twice.</p><h3>Key Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI-generated attacks break detection models that rely on past patterns.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Email remains the easiest and most economical entry point for attackers.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Traditional tools force security teams into a reactive cycle.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Effective AI defence must evaluate context, not just rules.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation is now as critical as detection accuracy.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Stopping the first and only attack is the new security standard.</li></ol><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Cybersecurity and AI's Role</p><p>03:00 The Email Security Landscape and AI's Impact</p><p>05:49 Understanding Alert Fatigue and Its Consequences</p><p>08:52 Innovative Approaches to Email Security</p><p>11:48 The Necessity of AI in Modern Security</p><p>14:55 Future Priorities for Security Leaders</p><p>17:57 Conclusion and Key Takeaways</p><p>#EmailSecurity #AICybersecurity #GenerativeAI #Phishing #B2BSecurity #EnterpriseSecurity #CyberAttack #SecurityStrategist #StrongestLayer #AlertFatigue #CISO #TechPodcast #InfoSec #CyberDefence</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">40c04935-e9e0-4fe0-951d-54b30c2b4022</guid><itunes:image href="https://artwork.captivate.fm/acb1c31b-4f0f-44d4-8156-8547ad162da7/2026-17-A-reasoning-engine-is-the-new-first-line-of-defense-Ala.jpg"/><pubDate>Mon, 23 Feb 2026 11:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/40c04935-e9e0-4fe0-951d-54b30c2b4022.mp3" length="48564865" type="audio/mpeg"/><itunes:duration>20:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>103</itunes:episode><podcast:episode>103</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?"><podcast:source uri="https://youtu.be/DKut2Iqe5Sw"/></podcast:alternateEnclosure></item><item><title>How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?</title><itunes:title>How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?</itunes:title><description><![CDATA[<p>As firms increasingly adopt autonomous AI, a key assumption in cybersecurity seems to be disappearing – data security can be understood through static maps. </p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong> Podcast, Abhi Sharma, Co-Founder and CEO of Relyance, speaks to Host Richard Stiennon, Chief Research Analyst at IT-Harvest. </p><p>Sharma tells Stiennon that most security tools are still built for a world before AI. In that world, data stays still long enough to be scanned, categorised, and managed. AI changes this model.</p><p>“We’re in the middle of a tectonic shift,” Sharma said. “For the first time, software behaviour is not just defined by the instructions you give it, but by the data in and around it.”</p><p>In modern <strong><a href="https://em360tech.com/solution-providers/relyance-ai" rel="noopener noreferrer" target="_blank">AI systems</a></strong>, data is no longer just an asset. It becomes an instruction. The quality, frequency, distribution, and even the absence of data directly influence how models and agents function. This reality makes traditional security models dangerously incomplete.</p><p>“People are very good at answering what data they have and where it’s stored,” Sharma explained. “But they can’t answer how it got there or what happened along the way.” He argues that this missing context is where AI risk now resides.</p><h2><strong>Agentic AI Turns Data Movement Into Real Security Risk</strong></h2><p>The issue becomes critical with agentic and autonomous AI workflows. Here, decision-making is not based on fixed code but on a <strong><a href="https://em360tech.com/top-10/best-llms" rel="noopener noreferrer" target="_blank">large language model</a></strong> operating in real-time.</p><p>“In these systems, your control logic is an LLM,” Sharma said. “It’s a black box.”</p><p>To complete tasks, AI agents must access tools, look at past decisions, copy production data, and dynamically manage infrastructure. In doing so, they create what Sharma calls ephemeral infrastructure—temporary environments that may exist for minutes and disappear without a trace.</p><p>For example, an agent working to improve cloud costs might create a high-performance database cluster, copy sensitive logs into a staging area, analyse them, and shut everything down in under 20 minutes.</p><p>“But in that process,” Sharma warned, “a default Terraform script might leave four S3 buckets open to the internet.” Traditional security scans, which often run every 24 hours, would never catch this.</p><p>“You don’t even know this little circus happened while you were asleep,” he said. “But it created a new risk.”</p><p>This is why Sharma believes that breaches in the AI era are no longer failures of data at rest but failures of data flow. Attackers don’t target identities or tools in isolation; they target outcomes—especially the theft or destruction of data. Those outcomes occur through movement over time.</p><h2><strong>Data Journey Solution for Responsible AI</strong></h2><p>Despite the widespread use of DSPM, DLP, IAM, AI gateways, and governance platforms, Sharma sees the same pattern in the Fortune 500: security incidents continue not because the tools lack usefulness, but because they operate in silos.</p><p>“All of the real business impact,” he said, “comes down to flow.”</p><p>Relyance’s solution is what Sharma calls data journeys—a unified, time-aware view of how data moves across identities, tools, infrastructure, and persistent assets. “If you can consistently reason across all of those layers,” Sharma said, “you finally have a chance to protect data and enable safe, responsible AI.”</p><p>Looking ahead to 2026 and beyond, he predicts security, governance, and compliance will merge around this shared visibility. Organisations will move away from simple audits toward infrastructure that builds trust by design.</p><p>Sharma challenges every CIO, CISO, and CTO at the end stating:</p><p>“Can you always reason about what human or non-human identities, using which tools or agents, took what actions that led to specific data flows over time?”</p><p>“If you can answer that,” he said, “there is no other way to control AI risk.”</p><p>In the age of autonomous AI, knowing where your data lives is essential. Knowing its journey may be the only thing standing between innovation and the next breach.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Conventional data maps are becoming obsolete in AI.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Data security must focus on real-time data flows.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding data journeys is crucial for security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Siloed security tools fail to address real risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI agents create ephemeral infrastructure that complicates security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of data security lies in dynamic data journeys.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security, governance, and compliance teams must converge.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trust in data security requires visibility and obligations balance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI will necessitate new approaches to data governance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CIOs must prioritise reasoning about data flows.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to AI and Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:36 The Shift from Space to Time in Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:42 Understanding Data Flow and Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:18 Siloed Security Tools and Their Limitations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:52 Dynamic Data Journeys: A New Approach</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:37 The Role of AI in Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:58 Convergence of Security, Governance, and Compliance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:07 Key Takeaways for CIOs and Security Leaders</li></ol><br/><p>#AISecurity #DataFlow #Cybersecurity #AgenticAI #DataJourneys #DLPisDead #DSPM #LLMSecurity #EphemeralInfra #DataSecurityRisk #CISO #CIO #CTO #DataGovernance #RiskManagement #TheSecurityStrategist #RelyanceAI #AbhiSharma #TechPodcast #LLMSecurity #EphemeralInfra #DataSecurityRisk</p><p>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></p><p>Relyance YT: <a href="https://www.youtube.com/@Relyance" rel="noopener noreferrer" target="_blank">@Relyance</a></p><p>Relyance LinkedIn: <a href="https://www.linkedin.com/company/relyanceai/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/relyanceai/</a> </p><p>Relyance X: <a href="https://x.com/relyanceai" rel="noopener noreferrer" target="_blank">@relyanceai</a></p>]]></description><content:encoded><![CDATA[<p>As firms increasingly adopt autonomous AI, a key assumption in cybersecurity seems to be disappearing – data security can be understood through static maps. </p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong> Podcast, Abhi Sharma, Co-Founder and CEO of Relyance, speaks to Host Richard Stiennon, Chief Research Analyst at IT-Harvest. </p><p>Sharma tells Stiennon that most security tools are still built for a world before AI. In that world, data stays still long enough to be scanned, categorised, and managed. AI changes this model.</p><p>“We’re in the middle of a tectonic shift,” Sharma said. “For the first time, software behaviour is not just defined by the instructions you give it, but by the data in and around it.”</p><p>In modern <strong><a href="https://em360tech.com/solution-providers/relyance-ai" rel="noopener noreferrer" target="_blank">AI systems</a></strong>, data is no longer just an asset. It becomes an instruction. The quality, frequency, distribution, and even the absence of data directly influence how models and agents function. This reality makes traditional security models dangerously incomplete.</p><p>“People are very good at answering what data they have and where it’s stored,” Sharma explained. “But they can’t answer how it got there or what happened along the way.” He argues that this missing context is where AI risk now resides.</p><h2><strong>Agentic AI Turns Data Movement Into Real Security Risk</strong></h2><p>The issue becomes critical with agentic and autonomous AI workflows. Here, decision-making is not based on fixed code but on a <strong><a href="https://em360tech.com/top-10/best-llms" rel="noopener noreferrer" target="_blank">large language model</a></strong> operating in real-time.</p><p>“In these systems, your control logic is an LLM,” Sharma said. “It’s a black box.”</p><p>To complete tasks, AI agents must access tools, look at past decisions, copy production data, and dynamically manage infrastructure. In doing so, they create what Sharma calls ephemeral infrastructure—temporary environments that may exist for minutes and disappear without a trace.</p><p>For example, an agent working to improve cloud costs might create a high-performance database cluster, copy sensitive logs into a staging area, analyse them, and shut everything down in under 20 minutes.</p><p>“But in that process,” Sharma warned, “a default Terraform script might leave four S3 buckets open to the internet.” Traditional security scans, which often run every 24 hours, would never catch this.</p><p>“You don’t even know this little circus happened while you were asleep,” he said. “But it created a new risk.”</p><p>This is why Sharma believes that breaches in the AI era are no longer failures of data at rest but failures of data flow. Attackers don’t target identities or tools in isolation; they target outcomes—especially the theft or destruction of data. Those outcomes occur through movement over time.</p><h2><strong>Data Journey Solution for Responsible AI</strong></h2><p>Despite the widespread use of DSPM, DLP, IAM, AI gateways, and governance platforms, Sharma sees the same pattern in the Fortune 500: security incidents continue not because the tools lack usefulness, but because they operate in silos.</p><p>“All of the real business impact,” he said, “comes down to flow.”</p><p>Relyance’s solution is what Sharma calls data journeys—a unified, time-aware view of how data moves across identities, tools, infrastructure, and persistent assets. “If you can consistently reason across all of those layers,” Sharma said, “you finally have a chance to protect data and enable safe, responsible AI.”</p><p>Looking ahead to 2026 and beyond, he predicts security, governance, and compliance will merge around this shared visibility. Organisations will move away from simple audits toward infrastructure that builds trust by design.</p><p>Sharma challenges every CIO, CISO, and CTO at the end stating:</p><p>“Can you always reason about what human or non-human identities, using which tools or agents, took what actions that led to specific data flows over time?”</p><p>“If you can answer that,” he said, “there is no other way to control AI risk.”</p><p>In the age of autonomous AI, knowing where your data lives is essential. Knowing its journey may be the only thing standing between innovation and the next breach.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Conventional data maps are becoming obsolete in AI.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Data security must focus on real-time data flows.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding data journeys is crucial for security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Siloed security tools fail to address real risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI agents create ephemeral infrastructure that complicates security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of data security lies in dynamic data journeys.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security, governance, and compliance teams must converge.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trust in data security requires visibility and obligations balance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI will necessitate new approaches to data governance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CIOs must prioritise reasoning about data flows.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to AI and Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:36 The Shift from Space to Time in Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:42 Understanding Data Flow and Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:18 Siloed Security Tools and Their Limitations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:52 Dynamic Data Journeys: A New Approach</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:37 The Role of AI in Data Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:58 Convergence of Security, Governance, and Compliance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:07 Key Takeaways for CIOs and Security Leaders</li></ol><br/><p>#AISecurity #DataFlow #Cybersecurity #AgenticAI #DataJourneys #DLPisDead #DSPM #LLMSecurity #EphemeralInfra #DataSecurityRisk #CISO #CIO #CTO #DataGovernance #RiskManagement #TheSecurityStrategist #RelyanceAI #AbhiSharma #TechPodcast #LLMSecurity #EphemeralInfra #DataSecurityRisk</p><p>Follow: @EM360Tech on <a href="https://www.youtube.com/@enterprisemanagement360" rel="noopener noreferrer" target="_blank">YouTube</a>, <a href="https://html-cleaner.com/linkedin.com/company/em360?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">X</a></p><p>Relyance YT: <a href="https://www.youtube.com/@Relyance" rel="noopener noreferrer" target="_blank">@Relyance</a></p><p>Relyance LinkedIn: <a href="https://www.linkedin.com/company/relyanceai/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/relyanceai/</a> </p><p>Relyance X: <a href="https://x.com/relyanceai" rel="noopener noreferrer" target="_blank">@relyanceai</a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">808b630c-45c2-4fc5-a8f9-227de91e49b4</guid><itunes:image href="https://artwork.captivate.fm/19f643ed-d454-4c80-a045-8c94752d4a30/relyance-ai-cybersecurity-data-breach-podcast.png"/><pubDate>Mon, 16 Feb 2026 16:45:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/808b630c-45c2-4fc5-a8f9-227de91e49b4.mp3" length="39711744" type="audio/mpeg"/><itunes:duration>16:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?"><podcast:source uri="https://youtu.be/KGF4u8jjsAM"/></podcast:alternateEnclosure></item><item><title>How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?</title><itunes:title>How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?</itunes:title><description><![CDATA[<p>Cybersecurity has traditionally focused on strengthening corporate networks, cloud systems, and devices. However, in the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Dr. Chris Pierson, Founder and CEO of BlackCloak, and host Richard Stiennon, Chief Research Analyst at IT-Harvest, argue that the most significant vulnerabilities are now outside the office perimeter.</p><p>As <strong><a href="https://em360tech.com/tech-articles/rise-ai-driven-cyber-attacks-are-businesses-prepared" rel="noopener noreferrer" target="_blank">AI-driven attacks</a></strong> increase and cybercrime combines digital, physical, and reputational risks, executives and their close contacts have become prime targets. Protecting the business now involves protecting executives in their personal lives.</p><h2>Broad Attack Surface: Private &amp; Corporate Properties</h2><p>Pierson points out that cybercriminals follow basic economic principles. Attacking a company that spends millions on security is costly and time-consuming. Instead, targeting an executive’s personal life—home networks, private emails, family devices—is cheaper, quicker, and often much more effective.</p><p>Executives work in various environments–primary homes, vacation properties, private jets, yachts, and remote offices equipped with smart home technology. Each of these locations broadens an attack surface that traditional corporate security programs rarely address. Home automation systems, private Wi-Fi networks, and personal email accounts have become part of the corporate risk landscape, regardless of whether organisations recognise this.</p><p>Pierson notes that taking over personal email accounts continues to be the number one attack method, especially for board members who often revert to personal accounts instead of using corporate options. Once attackers gain access, they can steal intellectual property, intercept financial transactions, or link back into the corporate network. The executive home, he states, is no longer just near the perimeter—it is the perimeter.</p><h2>AI, Deepfakes, and the Rise of Targeted Impersonation</h2><p>The discussion becomes even more pressing when addressing AI-enabled threats. <strong><a href="https://em360tech.com/tech-articles/what-are-deepfakes-and-why-are-they-dangerous" rel="noopener noreferrer" target="_blank">Deepfakes</a></strong>, once a possibility, are now practical tools for fraud and extortion. Pierson spotlights a critical incident in early 2024, when a deepfake impersonation of a CFO allowed attackers to move tens of millions of dollars in one event.</p><p>AI has removed much of the background work attackers used to do. Public executive biographies, earnings calls, videos, and high-resolution images provide everything needed to imitate a voice or face. What used to take days to research can now happen in mere seconds. This leads to a rise in hyper-realistic business email scams, payment diversion schemes, and reputational attacks that make it hard to distinguish between truth and lies.</p><p>Beyond financial losses, the reputational and personal fallout can be significant. Family members can become collateral damage, private moments can turn into leverage, and the risks to physical safety rise when travel plans and locations become known. As Pierson stresses, digital and physical executive protection are now interconnected.</p><p>The podcast message relays–high-level threats require specialized defenses. BlackCloak’s strategy, which Pierson refers to as “Digital Executive Protection,” safeguards a small but vital group: board members, the C-suite, executive leaders, and key personnel like patent holders, system administrators, executive assistants, and chiefs of staff. These individuals hold essential information, and attackers are aware of this.</p><p>For security leaders, the question is no longer whether this risk exists, but how quickly they can act to mitigate it. In an age of AI-driven cybercrime, reducing the executive attack surface may be the most crucial security investment an organisation can make.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Digital Executive Protection is essential for modern security strategies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is changing the landscape of cyber threats significantly.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Home networks are increasingly becoming targets for cybercriminals.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Reputational risks can affect not just individuals but their families, too.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Deepfakes pose a new level of threat to corporate executives.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations must consider the personal lives of executives in their security plans.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The attack surface for executives is expanding beyond the corporate environment.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity must evolve to address the vulnerabilities of home networks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Protecting key personnel is crucial for maintaining corporate integrity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>BlackCloak specialises in providing Digital Executive Protection services with concierge support.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Digital Executive Protection</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:53 The Evolving Threat Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:04 AI's Role in Cybersecurity Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:05 Home Networks as New Battlegrounds</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:54 Reputational and Financial Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:56 Extending Protection Beyond Executives</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:01 Final Thoughts and Recommendations</li></ol><br/><p>#DigitalExecutiveProtection #Cybersecurity #ExecutiveProtection #AICyberAttacks #Deepfakes #CyberRisk #HomeSecurity #CISOs #CorporateSecurity #TechPodcast #Cybercrime #BlackCloak</p><p>Follow: @EM360Tech on YouTube, LinkedIn and X BlackCloak YT: @blackcloakcyber2494 https://www.linkedin.com/company/blackcloak/ BlackCloak LinkedIn: @BLACKCLOAK BlackCloak X: @BlackCloakCyber</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity has traditionally focused on strengthening corporate networks, cloud systems, and devices. However, in the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Dr. Chris Pierson, Founder and CEO of BlackCloak, and host Richard Stiennon, Chief Research Analyst at IT-Harvest, argue that the most significant vulnerabilities are now outside the office perimeter.</p><p>As <strong><a href="https://em360tech.com/tech-articles/rise-ai-driven-cyber-attacks-are-businesses-prepared" rel="noopener noreferrer" target="_blank">AI-driven attacks</a></strong> increase and cybercrime combines digital, physical, and reputational risks, executives and their close contacts have become prime targets. Protecting the business now involves protecting executives in their personal lives.</p><h2>Broad Attack Surface: Private &amp; Corporate Properties</h2><p>Pierson points out that cybercriminals follow basic economic principles. Attacking a company that spends millions on security is costly and time-consuming. Instead, targeting an executive’s personal life—home networks, private emails, family devices—is cheaper, quicker, and often much more effective.</p><p>Executives work in various environments–primary homes, vacation properties, private jets, yachts, and remote offices equipped with smart home technology. Each of these locations broadens an attack surface that traditional corporate security programs rarely address. Home automation systems, private Wi-Fi networks, and personal email accounts have become part of the corporate risk landscape, regardless of whether organisations recognise this.</p><p>Pierson notes that taking over personal email accounts continues to be the number one attack method, especially for board members who often revert to personal accounts instead of using corporate options. Once attackers gain access, they can steal intellectual property, intercept financial transactions, or link back into the corporate network. The executive home, he states, is no longer just near the perimeter—it is the perimeter.</p><h2>AI, Deepfakes, and the Rise of Targeted Impersonation</h2><p>The discussion becomes even more pressing when addressing AI-enabled threats. <strong><a href="https://em360tech.com/tech-articles/what-are-deepfakes-and-why-are-they-dangerous" rel="noopener noreferrer" target="_blank">Deepfakes</a></strong>, once a possibility, are now practical tools for fraud and extortion. Pierson spotlights a critical incident in early 2024, when a deepfake impersonation of a CFO allowed attackers to move tens of millions of dollars in one event.</p><p>AI has removed much of the background work attackers used to do. Public executive biographies, earnings calls, videos, and high-resolution images provide everything needed to imitate a voice or face. What used to take days to research can now happen in mere seconds. This leads to a rise in hyper-realistic business email scams, payment diversion schemes, and reputational attacks that make it hard to distinguish between truth and lies.</p><p>Beyond financial losses, the reputational and personal fallout can be significant. Family members can become collateral damage, private moments can turn into leverage, and the risks to physical safety rise when travel plans and locations become known. As Pierson stresses, digital and physical executive protection are now interconnected.</p><p>The podcast message relays–high-level threats require specialized defenses. BlackCloak’s strategy, which Pierson refers to as “Digital Executive Protection,” safeguards a small but vital group: board members, the C-suite, executive leaders, and key personnel like patent holders, system administrators, executive assistants, and chiefs of staff. These individuals hold essential information, and attackers are aware of this.</p><p>For security leaders, the question is no longer whether this risk exists, but how quickly they can act to mitigate it. In an age of AI-driven cybercrime, reducing the executive attack surface may be the most crucial security investment an organisation can make.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Digital Executive Protection is essential for modern security strategies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is changing the landscape of cyber threats significantly.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Home networks are increasingly becoming targets for cybercriminals.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Reputational risks can affect not just individuals but their families, too.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Deepfakes pose a new level of threat to corporate executives.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations must consider the personal lives of executives in their security plans.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The attack surface for executives is expanding beyond the corporate environment.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity must evolve to address the vulnerabilities of home networks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Protecting key personnel is crucial for maintaining corporate integrity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>BlackCloak specialises in providing Digital Executive Protection services with concierge support.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Digital Executive Protection</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:53 The Evolving Threat Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:04 AI's Role in Cybersecurity Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:05 Home Networks as New Battlegrounds</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:54 Reputational and Financial Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:56 Extending Protection Beyond Executives</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>17:01 Final Thoughts and Recommendations</li></ol><br/><p>#DigitalExecutiveProtection #Cybersecurity #ExecutiveProtection #AICyberAttacks #Deepfakes #CyberRisk #HomeSecurity #CISOs #CorporateSecurity #TechPodcast #Cybercrime #BlackCloak</p><p>Follow: @EM360Tech on YouTube, LinkedIn and X BlackCloak YT: @blackcloakcyber2494 https://www.linkedin.com/company/blackcloak/ BlackCloak LinkedIn: @BLACKCLOAK BlackCloak X: @BlackCloakCyber</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a5648d72-3a1c-443d-ae9b-176a7ac7eb45</guid><itunes:image href="https://artwork.captivate.fm/10f81e39-5d47-43cb-889d-0f6a67c01e4a/2026-09-Protect-the-home-network-to-protect-the-enterprise-Dr-C.jpg"/><pubDate>Thu, 05 Feb 2026 14:40:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/a5648d72-3a1c-443d-ae9b-176a7ac7eb45.mp3" length="44299080" type="audio/mpeg"/><itunes:duration>18:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?"><podcast:source uri="https://youtu.be/znpbmEc-YtA"/></podcast:alternateEnclosure></item><item><title>Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?</title><itunes:title>Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?</itunes:title><description><![CDATA[<p>For decades, identity security relied on the assumption that identities are static, predictable, and mostly human. However, the growing scale and complexity of identities in the modern enterprise, as well as the increasing adoption of artificial intelligence has changed that perspective recently. With <strong><a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">AI agents</a></strong> multiplying in enterprises, acting independently, appearing and disappearing, and using credentials, the foundations of identity and access management are being tested in ways many organisations are not ready for.</p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Raz Rotenberg, CEO and Co-Founder of Fabrix Security, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest.</p><p>“Everything we knew about identity is about to change,” Rotenberg cautioned Stiennon. “We’ve viewed identities as mostly static. But AI agents are dynamic. They can do various tasks, change their behaviour, vanish, and reappear. Static identity models won’t survive.”</p><h2><strong>The Unplanned Identity Explosion</strong></h2><p>Identity has always been complex, but the scale and variety of identities that security teams face today are unprecedented. Besides employees and contractors, organisations now deal with service accounts, cloud workloads, <strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">APIs</a></strong>, and increasingly, AI-driven agents that function on their own.</p><p>According to Rotenberg, the challenge isn't just the number of identities; it's their variability. “The number of ways identities can behave is infinite,” he explained. “Every organisation is unique, every system is distinct, and identities are now changing in real time.”</p><p>CISOs already see this explosion. Stiennon also noted during the podcast that AI is quickly becoming a major source of new identities, with agents being deployed widely and given credentials to operate at machine speed.</p><p>However, most identity programs still depend on static role-based models and periodic reviews, approaches that struggle to keep up with dynamic, non-human agents.</p><h2><strong>Multiple Identity Tools Can Lead to Hidden Risks</strong></h2><p>Despite a crowded identity security market with hundreds of vendors in <strong><a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank">IAM</a></strong>, PAM, IGA, and cloud identity, Rotenberg argues that the main issue is not a lack of tools.</p><p>“We’ve had identity tools for decades,” he said. “They do a good job of facilitating operations aimed at reducing risk. But they all miss the same point – they rely too much on the human factor.”</p><p>Each tool, he explained, only sees a part of the identity landscape. Identity providers handle authentication, PAM tools manage privileged access, and governance platforms oversee reviews. None provides a unified, real-time view of identity behaviours across systems.</p><p>The Fabrix CEO calls it “partial truth.” Security teams dealing with identity issues have to manually gather data from various platforms, piece it together, and make decisions with incomplete information.</p><p>“This leads to long review cycles, manual investigations, and over-provisioning by default,” he said. “Permissions get copied and duplicated because people don’t fully grasp who has access to what or why.”</p><p>This can often lead to unclear decisions, with the organisation handing out more permissions than fewer. Eventually, it creates sprawling identity landscapes filled with excessive privileges and risky combinations. In some cases, an individual might have limited rights in one system but full control in another without anyone noticing.</p><p>“Misconfigurations can occur between systems,” Rotenberg noted. “Things don’t align. And without a unified view, these risks remain hidden.”</p><h2><strong>The Need for Identity Intelligence Layer</strong></h2><p>Fabrix’s solution to this fragmentation is what Rotenberg calls an identity intelligence layer. This layer brings together existing identity tools without replacing them. They aim to continuously gather signals from IAM, PAM, IGA, cloud platforms, and other sources, then process them in real time.</p><p>“It’s not about tearing everything out,” Rotenberg said. “Each tool serves a purpose. But when you connect them through an intelligence layer, you can finally understand your entire identity framework.”</p><p>This intelligence layer aims to lessen reliance on manual decision-making. By providing contextual insights and recommendations at the moment decisions need to be made—and eventually automating those decisions—it addresses what Rotenberg sees as identity security's weakest link – human judgment at scale.</p><p>“Even if you set good policies, enforcing them continuously and at scale is impossible without automation,” Rotenberg said. “There’s simply too much data.”</p><p>Over time, he envisions identity systems that not only provide insights but also manage access automatically. They would revoke permissions, flag anomalies, and adjust as identity behaviours change.</p><p>“Rather than enforcing more rules,” Rotenberg added, “we need intelligence layers that constantly understand who has access, why that access exists, and whether it still makes sense.”</p><p>Watch the podcast at <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a>. For more information, please visit <strong>fabrix.security</strong>. </p><h2><strong>Takeaways</strong></h2><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity security is becoming increasingly pivotal in modern organisations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The complexity of managing identities is compounded by the rise of AI agents.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>An intelligence layer is essential for effective identity security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation is crucial for managing identity security at scale.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fragmented identity management systems lead to operational inefficiencies and increase risk.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations often have over-permissive identities due to poor management practices.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Integrating existing tools with an intelligence layer can enhance security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to rethink their identity architecture for future flexibility.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity security is shifting from a static to a dynamic approach.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Continuous monitoring and adaptation of identity access is key. </li></ol><br/><h2><strong>Chapters</strong></h2><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Identity Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:53 The Role of Identity Intelligence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:38 Operational Inefficiencies in Identity Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:49 Integrating Intelligence into Existing Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:43 Rethinking Identity Architecture for AI Agents</li></ol><br/><h2><strong>About Fabrix Security</strong></h2><p>Fabrix Security builds AI Agents designed specifically for identity security. With identities multiplying across SaaS, cloud, and on-prem environments, Fabrix equips IAM teams with the intelligence to make confident, explainable access decisions – right at the moment of decision.</p><p>By infusing AI into identity security, Fabrix closes today’s biggest gap: visibility and intelligence. It enhances existing IAM workflows with speed, consistency, and accuracy, cutting through the chaos of manual, context-less decision-making. From user access reviews and access requests to full identity lifecycle management and AI-agents governance, Fabrix delivers intelligent, scalable, and proactive identity security.</p><p>#IdentitySecurity #AIagents #Cybersecurity #CISO #IAM #FabrixSecurity #FutureofIdentity #TechPodcast #TechPodcast #CloudSecurity #DynamicIdentity #SecurityIntelligence #FutureofIdentity #InfoSec</p>]]></description><content:encoded><![CDATA[<p>For decades, identity security relied on the assumption that identities are static, predictable, and mostly human. However, the growing scale and complexity of identities in the modern enterprise, as well as the increasing adoption of artificial intelligence has changed that perspective recently. With <strong><a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">AI agents</a></strong> multiplying in enterprises, acting independently, appearing and disappearing, and using credentials, the foundations of identity and access management are being tested in ways many organisations are not ready for.</p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Raz Rotenberg, CEO and Co-Founder of Fabrix Security, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest.</p><p>“Everything we knew about identity is about to change,” Rotenberg cautioned Stiennon. “We’ve viewed identities as mostly static. But AI agents are dynamic. They can do various tasks, change their behaviour, vanish, and reappear. Static identity models won’t survive.”</p><h2><strong>The Unplanned Identity Explosion</strong></h2><p>Identity has always been complex, but the scale and variety of identities that security teams face today are unprecedented. Besides employees and contractors, organisations now deal with service accounts, cloud workloads, <strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">APIs</a></strong>, and increasingly, AI-driven agents that function on their own.</p><p>According to Rotenberg, the challenge isn't just the number of identities; it's their variability. “The number of ways identities can behave is infinite,” he explained. “Every organisation is unique, every system is distinct, and identities are now changing in real time.”</p><p>CISOs already see this explosion. Stiennon also noted during the podcast that AI is quickly becoming a major source of new identities, with agents being deployed widely and given credentials to operate at machine speed.</p><p>However, most identity programs still depend on static role-based models and periodic reviews, approaches that struggle to keep up with dynamic, non-human agents.</p><h2><strong>Multiple Identity Tools Can Lead to Hidden Risks</strong></h2><p>Despite a crowded identity security market with hundreds of vendors in <strong><a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank">IAM</a></strong>, PAM, IGA, and cloud identity, Rotenberg argues that the main issue is not a lack of tools.</p><p>“We’ve had identity tools for decades,” he said. “They do a good job of facilitating operations aimed at reducing risk. But they all miss the same point – they rely too much on the human factor.”</p><p>Each tool, he explained, only sees a part of the identity landscape. Identity providers handle authentication, PAM tools manage privileged access, and governance platforms oversee reviews. None provides a unified, real-time view of identity behaviours across systems.</p><p>The Fabrix CEO calls it “partial truth.” Security teams dealing with identity issues have to manually gather data from various platforms, piece it together, and make decisions with incomplete information.</p><p>“This leads to long review cycles, manual investigations, and over-provisioning by default,” he said. “Permissions get copied and duplicated because people don’t fully grasp who has access to what or why.”</p><p>This can often lead to unclear decisions, with the organisation handing out more permissions than fewer. Eventually, it creates sprawling identity landscapes filled with excessive privileges and risky combinations. In some cases, an individual might have limited rights in one system but full control in another without anyone noticing.</p><p>“Misconfigurations can occur between systems,” Rotenberg noted. “Things don’t align. And without a unified view, these risks remain hidden.”</p><h2><strong>The Need for Identity Intelligence Layer</strong></h2><p>Fabrix’s solution to this fragmentation is what Rotenberg calls an identity intelligence layer. This layer brings together existing identity tools without replacing them. They aim to continuously gather signals from IAM, PAM, IGA, cloud platforms, and other sources, then process them in real time.</p><p>“It’s not about tearing everything out,” Rotenberg said. “Each tool serves a purpose. But when you connect them through an intelligence layer, you can finally understand your entire identity framework.”</p><p>This intelligence layer aims to lessen reliance on manual decision-making. By providing contextual insights and recommendations at the moment decisions need to be made—and eventually automating those decisions—it addresses what Rotenberg sees as identity security's weakest link – human judgment at scale.</p><p>“Even if you set good policies, enforcing them continuously and at scale is impossible without automation,” Rotenberg said. “There’s simply too much data.”</p><p>Over time, he envisions identity systems that not only provide insights but also manage access automatically. They would revoke permissions, flag anomalies, and adjust as identity behaviours change.</p><p>“Rather than enforcing more rules,” Rotenberg added, “we need intelligence layers that constantly understand who has access, why that access exists, and whether it still makes sense.”</p><p>Watch the podcast at <a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a>. For more information, please visit <strong>fabrix.security</strong>. </p><h2><strong>Takeaways</strong></h2><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity security is becoming increasingly pivotal in modern organisations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The complexity of managing identities is compounded by the rise of AI agents.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>An intelligence layer is essential for effective identity security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation is crucial for managing identity security at scale.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fragmented identity management systems lead to operational inefficiencies and increase risk.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations often have over-permissive identities due to poor management practices.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Integrating existing tools with an intelligence layer can enhance security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to rethink their identity architecture for future flexibility.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity security is shifting from a static to a dynamic approach.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Continuous monitoring and adaptation of identity access is key. </li></ol><br/><h2><strong>Chapters</strong></h2><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Identity Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:53 The Role of Identity Intelligence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:38 Operational Inefficiencies in Identity Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:49 Integrating Intelligence into Existing Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:43 Rethinking Identity Architecture for AI Agents</li></ol><br/><h2><strong>About Fabrix Security</strong></h2><p>Fabrix Security builds AI Agents designed specifically for identity security. With identities multiplying across SaaS, cloud, and on-prem environments, Fabrix equips IAM teams with the intelligence to make confident, explainable access decisions – right at the moment of decision.</p><p>By infusing AI into identity security, Fabrix closes today’s biggest gap: visibility and intelligence. It enhances existing IAM workflows with speed, consistency, and accuracy, cutting through the chaos of manual, context-less decision-making. From user access reviews and access requests to full identity lifecycle management and AI-agents governance, Fabrix delivers intelligent, scalable, and proactive identity security.</p><p>#IdentitySecurity #AIagents #Cybersecurity #CISO #IAM #FabrixSecurity #FutureofIdentity #TechPodcast #TechPodcast #CloudSecurity #DynamicIdentity #SecurityIntelligence #FutureofIdentity #InfoSec</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">cbc8924f-0ef5-495d-882b-f8b6937bed41</guid><itunes:image href="https://artwork.captivate.fm/e9fa0a32-4c51-47c9-a331-0461c9fc6183/2026-06-Identity-Security-Without-Intelligence-Is-Broken-Raz-Ro.jpg"/><pubDate>Wed, 04 Feb 2026 11:11:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/cbc8924f-0ef5-495d-882b-f8b6937bed41.mp3" length="33838200" type="audio/mpeg"/><itunes:duration>14:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?"><podcast:source uri="https://youtu.be/ywc2cB1i9Ks"/></podcast:alternateEnclosure></item><item><title>From Data to Insight: How Enterprises Are Making IoT Secure and Actionable</title><itunes:title>From Data to Insight: How Enterprises Are Making IoT Secure and Actionable</itunes:title><description><![CDATA[<p>Organisations continue to struggle with device management data and fragmented architectures while facing pressure from business and regulators. As the technology landscape changes, the integration of Internet of Things (IoT) devices with Operational Technology (OT) presents both exciting opportunities and significant security challenges. In a recent episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist podcast</a>, host&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Christopher Steffen</a>, alongside&nbsp;<a href="https://www.linkedin.com/in/juergenkraemer/" rel="noopener noreferrer" target="_blank">Dr Juergen Kraemer</a>, Chief Product Officer of&nbsp;<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">Cumulocity</a>, examines the complexities of securing IoT environments and the importance of resilient analytics and accountability.</p><h2>Understanding the IoT-OT Disconnect</h2><p>As time passes, the historical divide between IT and OT persists. As highlighted by Dr Kraemer, the operational technology sector has traditionally prioritised physical safety and availability over data confidentiality. This disconnect has created a significant gap in security policies, leaving IoT devices vulnerable to exploitation. The conversation emphasises that as organisations connect these previously isolated systems to IT networks, they inadvertently expose themselves to new risks, demanding a reevaluation of security strategies.</p><h2>Addressing Security Challenges</h2><p>Dr Kraemer points out that securing data access is critical, especially for organisations that deploy IoT devices across multiple sites. For instance, managing security for an elevator company with installations worldwide presents unique challenges. Organisations must navigate various networks and ensure compliance with new legislative requirements, such as the Cyber Resilience Act and NIS2 directive. These regulations demand a structured approach to security that many legacy OT environments struggle to meet.</p><h2>The Importance of Unified Data Management</h2><p>As IoT solutions proliferate, organisations often find themselves managing a patchwork of legacy systems and newer platforms. Dr Kraemer advocates for a hybrid approach, suggesting businesses create a unified data plane that integrates new and old systems. This strategy allows organisations to maintain operational continuity while gradually transitioning to modern platforms, ultimately leading to enhanced innovation and efficiency.</p><h2>Buy and Build Strategy</h2><p>A significant takeaway from the podcast is the concept of “buy and build.” Instead of choosing between purchasing a platform or developing one in-house, organisations should leverage established platforms like Cumulocity while also building innovative applications tailored to their specific needs. This dual approach allows businesses to focus on high-value projects without getting bogged down by the complexities of underlying infrastructure.</p><p>The dialogue sheds light on the pressing need for organisations to adapt their cybersecurity strategies to accommodate the complexities of IoT and OT environments. By understanding the historical disconnect, addressing security challenges, and adopting a buy and build approach, enterprises can improve their cybersecurity posture and drive innovation in an increasingly interconnected world.</p><p>To find out more, visit&nbsp;<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">https://www.cumulocity.com/</a></p><h2>Takeaways</h2><ul><li>IoT devices are often treated as secondary in security policies.</li><li>The historical divide between IT and OT creates security challenges.</li><li>Organisations struggle with integrating legacy and modern IoT systems.</li><li>A buy-and-build strategy allows for innovation while ensuring security.</li><li>Deployment flexibility is crucial for global IoT operations.</li><li>Data silos hinder effective analytics and AI integration.</li><li>A unified data lake can enhance insights from IoT data.</li><li>Regulatory compliance is a growing concern for IoT security.</li><li>Organisations need to enforce strong security measures across the entire IoT lifecycle.</li><li>IoT should be viewed as a data-driven business opportunity rather than just a connectivity issue.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IoT Security Challenges</p><p>04:01 The Disconnect Between IT and OT Security</p><p>10:00 Challenges in Integrating IoT Platforms</p><p>17:09 Buy and Build Strategy for IoT</p><p>20:08 Modern Data Pipelines and AI Integration</p><p>24:07 Bridge between AIOT and IOT</p><p>28:02 Best Practices for IoT in Risk Management</p>]]></description><content:encoded><![CDATA[<p>Organisations continue to struggle with device management data and fragmented architectures while facing pressure from business and regulators. As the technology landscape changes, the integration of Internet of Things (IoT) devices with Operational Technology (OT) presents both exciting opportunities and significant security challenges. In a recent episode of the&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist podcast</a>, host&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Christopher Steffen</a>, alongside&nbsp;<a href="https://www.linkedin.com/in/juergenkraemer/" rel="noopener noreferrer" target="_blank">Dr Juergen Kraemer</a>, Chief Product Officer of&nbsp;<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">Cumulocity</a>, examines the complexities of securing IoT environments and the importance of resilient analytics and accountability.</p><h2>Understanding the IoT-OT Disconnect</h2><p>As time passes, the historical divide between IT and OT persists. As highlighted by Dr Kraemer, the operational technology sector has traditionally prioritised physical safety and availability over data confidentiality. This disconnect has created a significant gap in security policies, leaving IoT devices vulnerable to exploitation. The conversation emphasises that as organisations connect these previously isolated systems to IT networks, they inadvertently expose themselves to new risks, demanding a reevaluation of security strategies.</p><h2>Addressing Security Challenges</h2><p>Dr Kraemer points out that securing data access is critical, especially for organisations that deploy IoT devices across multiple sites. For instance, managing security for an elevator company with installations worldwide presents unique challenges. Organisations must navigate various networks and ensure compliance with new legislative requirements, such as the Cyber Resilience Act and NIS2 directive. These regulations demand a structured approach to security that many legacy OT environments struggle to meet.</p><h2>The Importance of Unified Data Management</h2><p>As IoT solutions proliferate, organisations often find themselves managing a patchwork of legacy systems and newer platforms. Dr Kraemer advocates for a hybrid approach, suggesting businesses create a unified data plane that integrates new and old systems. This strategy allows organisations to maintain operational continuity while gradually transitioning to modern platforms, ultimately leading to enhanced innovation and efficiency.</p><h2>Buy and Build Strategy</h2><p>A significant takeaway from the podcast is the concept of “buy and build.” Instead of choosing between purchasing a platform or developing one in-house, organisations should leverage established platforms like Cumulocity while also building innovative applications tailored to their specific needs. This dual approach allows businesses to focus on high-value projects without getting bogged down by the complexities of underlying infrastructure.</p><p>The dialogue sheds light on the pressing need for organisations to adapt their cybersecurity strategies to accommodate the complexities of IoT and OT environments. By understanding the historical disconnect, addressing security challenges, and adopting a buy and build approach, enterprises can improve their cybersecurity posture and drive innovation in an increasingly interconnected world.</p><p>To find out more, visit&nbsp;<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">https://www.cumulocity.com/</a></p><h2>Takeaways</h2><ul><li>IoT devices are often treated as secondary in security policies.</li><li>The historical divide between IT and OT creates security challenges.</li><li>Organisations struggle with integrating legacy and modern IoT systems.</li><li>A buy-and-build strategy allows for innovation while ensuring security.</li><li>Deployment flexibility is crucial for global IoT operations.</li><li>Data silos hinder effective analytics and AI integration.</li><li>A unified data lake can enhance insights from IoT data.</li><li>Regulatory compliance is a growing concern for IoT security.</li><li>Organisations need to enforce strong security measures across the entire IoT lifecycle.</li><li>IoT should be viewed as a data-driven business opportunity rather than just a connectivity issue.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IoT Security Challenges</p><p>04:01 The Disconnect Between IT and OT Security</p><p>10:00 Challenges in Integrating IoT Platforms</p><p>17:09 Buy and Build Strategy for IoT</p><p>20:08 Modern Data Pipelines and AI Integration</p><p>24:07 Bridge between AIOT and IOT</p><p>28:02 Best Practices for IoT in Risk Management</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">37fc9f8f-120c-49fe-8a04-8b6875cae769</guid><itunes:image href="https://artwork.captivate.fm/33aa04e6-aa2b-4120-9520-d1189486761f/2026-07-IoT-drives-business-through-data-not-just-connectivity-.jpg"/><pubDate>Fri, 30 Jan 2026 11:31:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/37fc9f8f-120c-49fe-8a04-8b6875cae769.mp3" length="65303317" type="audio/mpeg"/><itunes:duration>27:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode><podcast:season>1</podcast:season></item><item><title>Human-Led, AI-Driven: The Next Chapter of Security Operations</title><itunes:title>Human-Led, AI-Driven: The Next Chapter of Security Operations</itunes:title><description><![CDATA[<p>Security leaders are rethinking how detection and response work in practice in 2026 owing to growing complexities in cybersecurity technology and the threat landscape.</p><p>On this episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at <strong><a href="https://www.rapid7.com/" rel="noopener noreferrer" target="_blank">Rapid7</a></strong>. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds value, and why outcomes—not features—should guide cybersecurity teams.</p><p>A recurring theme in their discussion was that while the threat landscape continues to evolve, many core challenges for SOCs remain unchanged. According to Martin, security teams still struggle with alert fatigue, lack of context, and the pressure to respond quickly—all while juggling increasingly complicated domains.</p><p>Organisations now require detection and response that is tailored to their specific environment, not generic threat models. Such a shift explains the rise of Managed Detection and Response (MDR) and the decline of one-size-fits-all managed security services. Customers want results, not noise, and they seek partners who understand their business context.</p><p>Martin says that this philosophy lies at the heart of Rapid7’s approach to Incident Command, its modern <strong><a href="https://em360tech.com/tech-articles/what-siem-definition-benefits-best-practices" rel="noopener noreferrer" target="_blank">Security Information and Event Management (SIEM)</a></strong> offering. Instead of treating SIEM, <strong><a href="https://em360tech.com/tech-articles/what-soar-upgrade-your-security-automation-and-ai" rel="noopener noreferrer" target="_blank">Security Orchestration, Automation, and Response (SOAR)</a></strong>, and threat intelligence as separate tools, Incident Command integrates them directly into the analyst workflow. The aim is to provide decision support in real-time—delivering relevant context, threat intelligence, and recommended actions exactly when needed, without making analysts switch between different systems.</p><p>Martin emphasised that a modern SIEM's success isn’t measured by the amount of data it can handle, but by how effectively it helps analysts make high-quality decisions quickly. Automation is important, but only if it’s applied thoughtfully. Deterministic automation, which includes actions that are predictable, auditable, and repeatable, remains vital for security operations. AI is most useful when it aids reasoning, summarisation, and prioritisation instead of completely replacing human judgment.</p><p>“There’s a lot of excitement around autonomous security,” Martin noted, “but chaining unpredictable decisions together is not something customers can trust.” Instead, Rapid7 focuses on using AI to assist analysts at specific moments in an investigation, such as summarising activity, adding context to alerts, or helping decide if more data collection is needed.</p><p><strong><em>Also Watch: <a href="https://em360tech.com/podcasts/solving-attack-surface-management-asm-challenges" rel="noopener noreferrer" target="_blank">Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges</a></em></strong></p><h2>“Customer Zero” Approach</h2><p>A key aspect of Rapid7’s product development is its “customer zero” approach. By running its own global MDR SOC, Rapid7 continuously incorporates real analyst feedback into product design. Martin shared that an early mistake was putting AI-driven insights in a separate interface to avoid disrupting workflows; this was quickly corrected after analysts indicated they wouldn’t leave their main view to check a secondary opinion. The lesson was clear: if context matters, it must be available where decisions are made.</p><p>Looking ahead to 2026, Martin sees the next step in detection and response as increased visibility combined with better management of the environment. Customers expect MDR providers and security platforms to gather signals beyond traditional EDR and cloud alerts—without overwhelming analysts with extra noise. He believes that achieving this balance is where <strong><a href="https://em360tech.com/tech-articles/what-intelligent-process-automation" rel="noopener noreferrer" target="_blank">AI-assisted automation</a></strong> and context-aware workflows will have the greatest impact.</p><p>When asked for a final takeaway for CISOs and IT leaders, Martin returned to a theme that ran throughout the conversation: focus on results. It’s easy to be distracted by flashy new features or the latest AI trends, but security improves only when organisations clearly define their goals. When customers express their priorities and vendors align with them, trust increases—and meaningful progress follows.</p><p>In a landscape full of tools and promises, Martin believes the future of security operations isn’t about removing humans from the process. It’s about empowering them with the right context, effective automation, and AI that enhances—not replaces—the most important decisions.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations are still facing the same core challenges in cybersecurity despite technological advancements.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>There is a growing demand for more environmental context in detection and response.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MDR services are evolving to focus on partnerships rather than just product delivery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rapid7's Incident Command aims to improve decision support in SOC operations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation should be frictionless and integrated into the analyst's workflow.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Deterministic automation is crucial for reliable security outcomes.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Analysts need to learn from real-time data to enhance response strategies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of detection and response will involve broader visibility and ownership of customer environments.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building trust with customers is essential for effective cybersecurity partnerships.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Focusing on customer outcomes is key to improving security operations.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity and AI Innovations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:01 Shifts in SOC Operations and Customer Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>04:29 MDR Services: A New Approach to Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:02 Rapid7's Incident Command: Enhancing SIM with Context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:26 Automation in Cybersecurity: Balancing Efficiency and Control</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:01 Learning from Analysts: Enhancing Response and Automation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:43 The Future of Detection and Response in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:23 Key Takeaways for Security Leaders</li></ol><br/><p>#Cybersecurity #Rapid7 #SecurityStrategistPodcast #AIinSecurity #SecurityOperations #SOC #MDR #SIEM #SOAR #IncidentCommand #ThreatDetection #Response #Automation #HumanLedAIDriven #TechPodcast #FutureofSecurity #CISOTakeaways #ITLeaders</p>]]></description><content:encoded><![CDATA[<p>Security leaders are rethinking how detection and response work in practice in 2026 owing to growing complexities in cybersecurity technology and the threat landscape.</p><p>On this episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at <strong><a href="https://www.rapid7.com/" rel="noopener noreferrer" target="_blank">Rapid7</a></strong>. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds value, and why outcomes—not features—should guide cybersecurity teams.</p><p>A recurring theme in their discussion was that while the threat landscape continues to evolve, many core challenges for SOCs remain unchanged. According to Martin, security teams still struggle with alert fatigue, lack of context, and the pressure to respond quickly—all while juggling increasingly complicated domains.</p><p>Organisations now require detection and response that is tailored to their specific environment, not generic threat models. Such a shift explains the rise of Managed Detection and Response (MDR) and the decline of one-size-fits-all managed security services. Customers want results, not noise, and they seek partners who understand their business context.</p><p>Martin says that this philosophy lies at the heart of Rapid7’s approach to Incident Command, its modern <strong><a href="https://em360tech.com/tech-articles/what-siem-definition-benefits-best-practices" rel="noopener noreferrer" target="_blank">Security Information and Event Management (SIEM)</a></strong> offering. Instead of treating SIEM, <strong><a href="https://em360tech.com/tech-articles/what-soar-upgrade-your-security-automation-and-ai" rel="noopener noreferrer" target="_blank">Security Orchestration, Automation, and Response (SOAR)</a></strong>, and threat intelligence as separate tools, Incident Command integrates them directly into the analyst workflow. The aim is to provide decision support in real-time—delivering relevant context, threat intelligence, and recommended actions exactly when needed, without making analysts switch between different systems.</p><p>Martin emphasised that a modern SIEM's success isn’t measured by the amount of data it can handle, but by how effectively it helps analysts make high-quality decisions quickly. Automation is important, but only if it’s applied thoughtfully. Deterministic automation, which includes actions that are predictable, auditable, and repeatable, remains vital for security operations. AI is most useful when it aids reasoning, summarisation, and prioritisation instead of completely replacing human judgment.</p><p>“There’s a lot of excitement around autonomous security,” Martin noted, “but chaining unpredictable decisions together is not something customers can trust.” Instead, Rapid7 focuses on using AI to assist analysts at specific moments in an investigation, such as summarising activity, adding context to alerts, or helping decide if more data collection is needed.</p><p><strong><em>Also Watch: <a href="https://em360tech.com/podcasts/solving-attack-surface-management-asm-challenges" rel="noopener noreferrer" target="_blank">Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges</a></em></strong></p><h2>“Customer Zero” Approach</h2><p>A key aspect of Rapid7’s product development is its “customer zero” approach. By running its own global MDR SOC, Rapid7 continuously incorporates real analyst feedback into product design. Martin shared that an early mistake was putting AI-driven insights in a separate interface to avoid disrupting workflows; this was quickly corrected after analysts indicated they wouldn’t leave their main view to check a secondary opinion. The lesson was clear: if context matters, it must be available where decisions are made.</p><p>Looking ahead to 2026, Martin sees the next step in detection and response as increased visibility combined with better management of the environment. Customers expect MDR providers and security platforms to gather signals beyond traditional EDR and cloud alerts—without overwhelming analysts with extra noise. He believes that achieving this balance is where <strong><a href="https://em360tech.com/tech-articles/what-intelligent-process-automation" rel="noopener noreferrer" target="_blank">AI-assisted automation</a></strong> and context-aware workflows will have the greatest impact.</p><p>When asked for a final takeaway for CISOs and IT leaders, Martin returned to a theme that ran throughout the conversation: focus on results. It’s easy to be distracted by flashy new features or the latest AI trends, but security improves only when organisations clearly define their goals. When customers express their priorities and vendors align with them, trust increases—and meaningful progress follows.</p><p>In a landscape full of tools and promises, Martin believes the future of security operations isn’t about removing humans from the process. It’s about empowering them with the right context, effective automation, and AI that enhances—not replaces—the most important decisions.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations are still facing the same core challenges in cybersecurity despite technological advancements.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>There is a growing demand for more environmental context in detection and response.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MDR services are evolving to focus on partnerships rather than just product delivery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rapid7's Incident Command aims to improve decision support in SOC operations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automation should be frictionless and integrated into the analyst's workflow.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Deterministic automation is crucial for reliable security outcomes.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Analysts need to learn from real-time data to enhance response strategies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of detection and response will involve broader visibility and ownership of customer environments.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Building trust with customers is essential for effective cybersecurity partnerships.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Focusing on customer outcomes is key to improving security operations.</li></ol><br/><h3><strong>Chapters</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity and AI Innovations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:01 Shifts in SOC Operations and Customer Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>04:29 MDR Services: A New Approach to Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:02 Rapid7's Incident Command: Enhancing SIM with Context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:26 Automation in Cybersecurity: Balancing Efficiency and Control</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:01 Learning from Analysts: Enhancing Response and Automation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:43 The Future of Detection and Response in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:23 Key Takeaways for Security Leaders</li></ol><br/><p>#Cybersecurity #Rapid7 #SecurityStrategistPodcast #AIinSecurity #SecurityOperations #SOC #MDR #SIEM #SOAR #IncidentCommand #ThreatDetection #Response #Automation #HumanLedAIDriven #TechPodcast #FutureofSecurity #CISOTakeaways #ITLeaders</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">5c217e3e-e245-4162-a761-bbee4f58065f</guid><itunes:image href="https://artwork.captivate.fm/c867926c-a10d-4fd5-a135-a34b1618c355/2026-02-Stop-chasing-shiny-features-Focus-on-security-outcomes-.jpg"/><pubDate>Thu, 29 Jan 2026 12:14:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/5c217e3e-e245-4162-a761-bbee4f58065f.mp3" length="36959760" type="audio/mpeg"/><itunes:duration>15:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Human-Led, AI-Driven: The Next Chapter of Security Operations"><podcast:source uri="https://youtu.be/RuqtMW98QYo"/></podcast:alternateEnclosure></item><item><title>Why Are Vulnerability Backlogs Still Growing Despite Better Detection?</title><itunes:title>Why Are Vulnerability Backlogs Still Growing Despite Better Detection?</itunes:title><description><![CDATA[<p><strong>Podcast:</strong> <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="http://root.io/" rel="noopener noreferrer" target="_blank">John Amaral, Co-Founder &amp; CTO, Root.io</a></strong></p><p><strong>Host:</strong> <strong><a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen, VP of Research, Enterprise Management Associates (EMA)</a></strong></p><p>For over a decade, shift-left security has been the leading idea in <strong><a href="https://em360tech.com/tech-articles/what-devsecops-and-why-it-matters" rel="noopener noreferrer" target="_blank">DevSecOps</a></strong>. The concept was straightforward: move security earlier in the software development process so vulnerabilities could be fixed more quickly and cheaply.</p><p>However, new benchmark data suggests that the reality is quite different.</p><p>In the latest episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Chris Steffen sat down with John Amaral, Co-Founder and CTO of Root.io, to discuss why shift-left has stalled and why autonomous remediation and <strong><a href="https://em360tech.com/whitepapers/root-zero-cve-open-source-solution-brief" rel="noopener noreferrer" target="_blank">“shift-out” security</a></strong> is the best option moving forward.</p><p>One striking data point mentioned in the episode comes from the Shift-Out Benchmark Report by <strong><a href="https://em360tech.com/solution-providers/root-io" rel="noopener noreferrer" target="_blank">Root</a></strong>. It reveals that 82 per cent of organisations say they are confident in their shift-left strategy; however, only four per cent have achieved zero CVE backlog.</p><p>“That four per cent shocked me,” Steffen expressed during the conversation. “Honestly, it felt high.”</p><p>Amaral explained that this gap exists because the industry has focused on detection instead of remediation. “We built CVE detection at computer speed,” Amaral noted. “But remediation has never scaled beyond human speed.”</p><p>Modern pipelines can quickly identify vulnerabilities, open tickets, and generate extensive lists. However, the actual work of fixing those vulnerabilities still falls on engineering teams.</p><h2>Detection Scales but Humans Don’t</h2><p>Shift-left claimed that developers could fix security issues faster because they work closely with the code. In reality, that assumption falls apart, particularly for third-party and open-source dependencies.</p><p>The Root CEO added that developers are being asked to fix code they didn’t write, don’t own, and don’t understand. “They want to build features, not reverse-engineer open-source libraries.”</p><p>With over 90 per cent of modern applications built by leveraging open-source models, fixing vulnerabilities often depends on upgrades. Often, this ends up forming a risky trade-off.</p><p>Upgrading dependencies has long been the go-to remediation strategy. However, recent supply-chain attacks—like “<strong><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/" rel="noopener noreferrer" target="_blank">Sha1-Hulud-style malware injections</a></strong>”—have shown how dangerous blind upgrades can be.</p><p>“If you compromise a popular repository at the right moment, malware can spread to millions of downstream projects in minutes,” Amaral warned.</p><p>Organisations now face a difficult choice between upgrading automatically and risking a malware spread or pinning dependencies that build CVEs hard to fix quickly. “Pinning protects you from supply-chain attacks,” Amaral says, “but now you’ve created a CVE backlog you don’t have the resources to clear.”</p><h2>What Is “Shift-Out” Security?</h2><p>Instead of focusing remediation efforts earlier (shift-left), Amaral suggests organisations need to shift it out—removing the responsibility from developers entirely.</p><p>Shift-out security stresses on pinned dependencies to prevent untrusted upgrades, automated backporting and patching for known CVEs and AI-backed remediation that operates independently of engineering teams.</p><p>“Remediation shouldn’t be done by your engineers,” the co-founder of Root tells Steffen, “It should be managed by technology that operates at the same speed as detection.”</p><p>This method allows organisations to keep tight control over dependencies while still meeting service level agreements for critical and high-severity vulnerabilities.</p><p>“In 2026, you need a real dependency management strategy—one that assumes supply-chain attacks will keep happening,” Amaral added.</p><p>With state actors increasingly targeting open-source environments, the stakes continue to rise. “Sha1-Hulud is just the tip of the iceberg,” Amaral concluded. “This will happen again and again. You need to be ready.”</p><p>Shift-left helped organisations identify their risk, but it didn’t eliminate it. As vulnerability backlogs increase and engineering teams face burnout, autonomous remediation and shift-out security are becoming the next step in DevSecOps.</p><p>To learn more about this approach, visit Root.io or listen to the full episode of The Security Strategist podcast on <em>EM360Tech</em>.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The shift left approach is not yielding the expected results.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Only 4% of teams have achieved zero CVE depth, indicating a significant gap in vulnerability management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Remediation processes have not scaled with the speed of detection, leading to a backlog of vulnerabilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engineers prefer to work on first-party code rather than third-party open source libraries, complicating remediation efforts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Burnout among engineers is a critical issue due to the overwhelming vulnerability management tasks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security is increasingly viewed as a business problem, impacting organisational success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Effective vulnerability management requires a shift towards autonomous remediation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pinning dependencies can help mitigate risks associated with open source vulnerabilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Shia Lute attack exemplifies the risks of automated upgrades in software supply chains.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations need a cogent strategy for managing software dependencies to stay ahead of security threats.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:00 The Shift Left vs. Shift Out Debate</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:48 Understanding Vulnerability Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:58 The Role of Open Source in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:40 Impact of Vulnerability Remediation on Engineering Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:00 The Business Perspective on Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:02 Autonomous Remediation and Its Importance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:47 Strategies for Effective Vulnerability Management</li></ol><br/><p><strong>#</strong>Shift-leftsecurity #vulnerabilitymanagement #autonomous</p><p>remediation #softwaresupplychainsecurity #CVEbacklog #DevSecOps #<a href="http://root.io/" rel="noopener noreferrer" target="_blank">Root.io</a> #EM360Tech #dependencymanagement #shift-outsecurity</p>]]></description><content:encoded><![CDATA[<p><strong>Podcast:</strong> <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a></strong></p><p><strong>Guest: <a href="http://root.io/" rel="noopener noreferrer" target="_blank">John Amaral, Co-Founder &amp; CTO, Root.io</a></strong></p><p><strong>Host:</strong> <strong><a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen, VP of Research, Enterprise Management Associates (EMA)</a></strong></p><p>For over a decade, shift-left security has been the leading idea in <strong><a href="https://em360tech.com/tech-articles/what-devsecops-and-why-it-matters" rel="noopener noreferrer" target="_blank">DevSecOps</a></strong>. The concept was straightforward: move security earlier in the software development process so vulnerabilities could be fixed more quickly and cheaply.</p><p>However, new benchmark data suggests that the reality is quite different.</p><p>In the latest episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Chris Steffen sat down with John Amaral, Co-Founder and CTO of Root.io, to discuss why shift-left has stalled and why autonomous remediation and <strong><a href="https://em360tech.com/whitepapers/root-zero-cve-open-source-solution-brief" rel="noopener noreferrer" target="_blank">“shift-out” security</a></strong> is the best option moving forward.</p><p>One striking data point mentioned in the episode comes from the Shift-Out Benchmark Report by <strong><a href="https://em360tech.com/solution-providers/root-io" rel="noopener noreferrer" target="_blank">Root</a></strong>. It reveals that 82 per cent of organisations say they are confident in their shift-left strategy; however, only four per cent have achieved zero CVE backlog.</p><p>“That four per cent shocked me,” Steffen expressed during the conversation. “Honestly, it felt high.”</p><p>Amaral explained that this gap exists because the industry has focused on detection instead of remediation. “We built CVE detection at computer speed,” Amaral noted. “But remediation has never scaled beyond human speed.”</p><p>Modern pipelines can quickly identify vulnerabilities, open tickets, and generate extensive lists. However, the actual work of fixing those vulnerabilities still falls on engineering teams.</p><h2>Detection Scales but Humans Don’t</h2><p>Shift-left claimed that developers could fix security issues faster because they work closely with the code. In reality, that assumption falls apart, particularly for third-party and open-source dependencies.</p><p>The Root CEO added that developers are being asked to fix code they didn’t write, don’t own, and don’t understand. “They want to build features, not reverse-engineer open-source libraries.”</p><p>With over 90 per cent of modern applications built by leveraging open-source models, fixing vulnerabilities often depends on upgrades. Often, this ends up forming a risky trade-off.</p><p>Upgrading dependencies has long been the go-to remediation strategy. However, recent supply-chain attacks—like “<strong><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/" rel="noopener noreferrer" target="_blank">Sha1-Hulud-style malware injections</a></strong>”—have shown how dangerous blind upgrades can be.</p><p>“If you compromise a popular repository at the right moment, malware can spread to millions of downstream projects in minutes,” Amaral warned.</p><p>Organisations now face a difficult choice between upgrading automatically and risking a malware spread or pinning dependencies that build CVEs hard to fix quickly. “Pinning protects you from supply-chain attacks,” Amaral says, “but now you’ve created a CVE backlog you don’t have the resources to clear.”</p><h2>What Is “Shift-Out” Security?</h2><p>Instead of focusing remediation efforts earlier (shift-left), Amaral suggests organisations need to shift it out—removing the responsibility from developers entirely.</p><p>Shift-out security stresses on pinned dependencies to prevent untrusted upgrades, automated backporting and patching for known CVEs and AI-backed remediation that operates independently of engineering teams.</p><p>“Remediation shouldn’t be done by your engineers,” the co-founder of Root tells Steffen, “It should be managed by technology that operates at the same speed as detection.”</p><p>This method allows organisations to keep tight control over dependencies while still meeting service level agreements for critical and high-severity vulnerabilities.</p><p>“In 2026, you need a real dependency management strategy—one that assumes supply-chain attacks will keep happening,” Amaral added.</p><p>With state actors increasingly targeting open-source environments, the stakes continue to rise. “Sha1-Hulud is just the tip of the iceberg,” Amaral concluded. “This will happen again and again. You need to be ready.”</p><p>Shift-left helped organisations identify their risk, but it didn’t eliminate it. As vulnerability backlogs increase and engineering teams face burnout, autonomous remediation and shift-out security are becoming the next step in DevSecOps.</p><p>To learn more about this approach, visit Root.io or listen to the full episode of The Security Strategist podcast on <em>EM360Tech</em>.</p><h3><strong>Takeaways</strong></h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The shift left approach is not yielding the expected results.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Only 4% of teams have achieved zero CVE depth, indicating a significant gap in vulnerability management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Remediation processes have not scaled with the speed of detection, leading to a backlog of vulnerabilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engineers prefer to work on first-party code rather than third-party open source libraries, complicating remediation efforts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Burnout among engineers is a critical issue due to the overwhelming vulnerability management tasks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security is increasingly viewed as a business problem, impacting organisational success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Effective vulnerability management requires a shift towards autonomous remediation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pinning dependencies can help mitigate risks associated with open source vulnerabilities.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Shia Lute attack exemplifies the risks of automated upgrades in software supply chains.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations need a cogent strategy for managing software dependencies to stay ahead of security threats.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:00 The Shift Left vs. Shift Out Debate</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:48 Understanding Vulnerability Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:58 The Role of Open Source in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:40 Impact of Vulnerability Remediation on Engineering Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:00 The Business Perspective on Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:02 Autonomous Remediation and Its Importance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:47 Strategies for Effective Vulnerability Management</li></ol><br/><p><strong>#</strong>Shift-leftsecurity #vulnerabilitymanagement #autonomous</p><p>remediation #softwaresupplychainsecurity #CVEbacklog #DevSecOps #<a href="http://root.io/" rel="noopener noreferrer" target="_blank">Root.io</a> #EM360Tech #dependencymanagement #shift-outsecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">fae1de6f-2b58-4bd0-9526-bfdafc352593</guid><itunes:image href="https://artwork.captivate.fm/d84dc0f1-a3be-4b28-9dfe-5f2e602f495e/2026-04-CVE-Backlogs-Are-the-Signal-to-Shift-Out-John-Amaral-Ch.jpg"/><pubDate>Wed, 28 Jan 2026 12:38:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/fae1de6f-2b58-4bd0-9526-bfdafc352593.mp3" length="60354757" type="audio/mpeg"/><itunes:duration>25:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Are Vulnerability Backlogs Still Growing Despite Better Detection?"><podcast:source uri="https://youtu.be/jgs-wi-B-XE"/></podcast:alternateEnclosure></item><item><title>What Happens to API Security When AI Agents Go Autonomous?</title><itunes:title>What Happens to API Security When AI Agents Go Autonomous?</itunes:title><description><![CDATA[<p>As companies speed up their adoption of AI, an old but increasingly serious problem is resurfacing: lack of visibility. In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Eric Schwake, Director of Cybersecurity Strategy at Salt Security, joined analyst Richard Stiennon to discuss why APIs, which have long been the backbone of modern applications, have become essential for AI-driven businesses.</p><p>They particularly dive deep into the critical<strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank"> importance of API visibility and discovery</a></strong> in the context of rising AI integration within enterprises. They discuss the challenges organisations face in securing APIs, the significance of understanding the attack surface, and the role of governance in managing risks. </p><p>The conversation also covers the emerging <strong><a href="https://em360tech.com/tech-articles/what-model-context-protocol-bridging-gap-between-ai-and-enterprise-data" rel="noopener noreferrer" target="_blank">Model Context Protocol (MCP)</a></strong> and its implications for API security, as well as the future landscape of cybersecurity as AI systems become more autonomous. Schwake emphasises the need for CISOs to be proactive in engaging with AI projects to ensure security is prioritised.</p><p>If this system isn’t secured, the entire organisation faces risks.</p><h2>APIs: The Foundation of AI</h2><p>APIs have been vital to business structures for years, especially with the growth of microservices. However, Schwake argues that AI has changed the scale of the issue significantly.</p><p>“We saw a big increase in the number and usage of APIs when microservices became popular,” Schwake explained. “Now, with AI, it’s just 10 times or even 100 times whatever it is for APIs.”</p><p>While much of the industry talk has centred on <strong><a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a></strong>, Schwake emphasised that the real actions—and risks—occur one layer below.</p><p>“Everything happening is driven by APIs. The AI agents, the MCP servers, the agents communicating with the LLMs—all of it is API traffic.” In essence, AI may represent innovation, but APIs are the mechanisms that enable it.</p><h2>API is the “Nervous System” Organisations Overlook</h2><p>As companies rush to implement copilots, agents, and automation, security often takes a back seat. Schwake warned that this creates a dangerous blind spot. “You need to ensure that you’re securing that underlying nervous system of this new world—and that relies on APIs.”</p><p>This lack of attention has resulted in a surge of unknown, unmanaged, and “shadow” APIs, many of which were never documented or designed with security in mind. Without continuous discovery, security teams might not even know what they are trying to protect.</p><p>“Visibility is a challenge in security. If you don’t have visibility, you can’t see what you’re protecting—you’re essentially out of luck.”</p><h2>Discovery First, Governance Second</h2><p>For the Director of Cybersecurity Strategy, API security begins with understanding the attack surface. This principle hasn’t changed in 20 years, but AI has made it more crucial. “With AI, the attack surface on APIs could grow tenfold. If you don’t have a grasp of that attack surface, you won’t be able to protect it.”</p><p>After identifying APIs, the next step is governance. This includes finding owners, setting rules, and reducing risks before attackers exploit vulnerabilities. “You want to ensure that there isn’t a big open gap inviting attackers.”</p><p>This becomes even more important as AI tools start writing code and generating APIs, raising both speed and risk.</p><p>Schwake concluded the discussion with a clear message for security leaders. “From a CISO perspective, ensure that you engage as early as possible with these projects.”</p><p>AI initiatives often start outside of traditional security processes, increasing risk by default. CISOs need to insert themselves early, understand business developments, and safeguard the underlying APIs. “You want to support business success and speed, but also ensure it’s secure.”</p><p>API security is no longer a secondary issue. It’s essential for determining whether innovation can scale safely or risks becoming the next major breach story.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>API visibility and discovery have become crucial due to the rise of AI.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations are experiencing a massive increase in APIs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Visibility is essential for effective security management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding the attack surface is key to protection.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Governance is necessary to mitigate risks after discovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MCP serves as a foundational layer for AI communication.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of API security is rapidly evolving and uncertain.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs must engage early in AI projects to ensure security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security should be integrated into AI development from the start.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations need to be aware of AI-related security threats. </li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to API Security and Visibility</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:24 The Rise of APIs and AI in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:04 Challenges in Securing APIs and AI Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:08 Discovery and Governance of APIs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:02 Understanding MCP and API Interactions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:04 Future of API Security in an AI-Driven World</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:37 Key Takeaways for CISOs</li></ol><br/><p>#AI #Cybersecurity #APISecurity #AIAgents #AutonomousAI #techpodcast #CISO #APIVisibility #ShadowAPIs #DigitalTransformation #SecurityStrategist</p>]]></description><content:encoded><![CDATA[<p>As companies speed up their adoption of AI, an old but increasingly serious problem is resurfacing: lack of visibility. In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, Eric Schwake, Director of Cybersecurity Strategy at Salt Security, joined analyst Richard Stiennon to discuss why APIs, which have long been the backbone of modern applications, have become essential for AI-driven businesses.</p><p>They particularly dive deep into the critical<strong><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank"> importance of API visibility and discovery</a></strong> in the context of rising AI integration within enterprises. They discuss the challenges organisations face in securing APIs, the significance of understanding the attack surface, and the role of governance in managing risks. </p><p>The conversation also covers the emerging <strong><a href="https://em360tech.com/tech-articles/what-model-context-protocol-bridging-gap-between-ai-and-enterprise-data" rel="noopener noreferrer" target="_blank">Model Context Protocol (MCP)</a></strong> and its implications for API security, as well as the future landscape of cybersecurity as AI systems become more autonomous. Schwake emphasises the need for CISOs to be proactive in engaging with AI projects to ensure security is prioritised.</p><p>If this system isn’t secured, the entire organisation faces risks.</p><h2>APIs: The Foundation of AI</h2><p>APIs have been vital to business structures for years, especially with the growth of microservices. However, Schwake argues that AI has changed the scale of the issue significantly.</p><p>“We saw a big increase in the number and usage of APIs when microservices became popular,” Schwake explained. “Now, with AI, it’s just 10 times or even 100 times whatever it is for APIs.”</p><p>While much of the industry talk has centred on <strong><a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a></strong>, Schwake emphasised that the real actions—and risks—occur one layer below.</p><p>“Everything happening is driven by APIs. The AI agents, the MCP servers, the agents communicating with the LLMs—all of it is API traffic.” In essence, AI may represent innovation, but APIs are the mechanisms that enable it.</p><h2>API is the “Nervous System” Organisations Overlook</h2><p>As companies rush to implement copilots, agents, and automation, security often takes a back seat. Schwake warned that this creates a dangerous blind spot. “You need to ensure that you’re securing that underlying nervous system of this new world—and that relies on APIs.”</p><p>This lack of attention has resulted in a surge of unknown, unmanaged, and “shadow” APIs, many of which were never documented or designed with security in mind. Without continuous discovery, security teams might not even know what they are trying to protect.</p><p>“Visibility is a challenge in security. If you don’t have visibility, you can’t see what you’re protecting—you’re essentially out of luck.”</p><h2>Discovery First, Governance Second</h2><p>For the Director of Cybersecurity Strategy, API security begins with understanding the attack surface. This principle hasn’t changed in 20 years, but AI has made it more crucial. “With AI, the attack surface on APIs could grow tenfold. If you don’t have a grasp of that attack surface, you won’t be able to protect it.”</p><p>After identifying APIs, the next step is governance. This includes finding owners, setting rules, and reducing risks before attackers exploit vulnerabilities. “You want to ensure that there isn’t a big open gap inviting attackers.”</p><p>This becomes even more important as AI tools start writing code and generating APIs, raising both speed and risk.</p><p>Schwake concluded the discussion with a clear message for security leaders. “From a CISO perspective, ensure that you engage as early as possible with these projects.”</p><p>AI initiatives often start outside of traditional security processes, increasing risk by default. CISOs need to insert themselves early, understand business developments, and safeguard the underlying APIs. “You want to support business success and speed, but also ensure it’s secure.”</p><p>API security is no longer a secondary issue. It’s essential for determining whether innovation can scale safely or risks becoming the next major breach story.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>API visibility and discovery have become crucial due to the rise of AI.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations are experiencing a massive increase in APIs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Visibility is essential for effective security management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding the attack surface is key to protection.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Governance is necessary to mitigate risks after discovery.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MCP serves as a foundational layer for AI communication.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of API security is rapidly evolving and uncertain.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs must engage early in AI projects to ensure security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security should be integrated into AI development from the start.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations need to be aware of AI-related security threats. </li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to API Security and Visibility</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:24 The Rise of APIs and AI in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:04 Challenges in Securing APIs and AI Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:08 Discovery and Governance of APIs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:02 Understanding MCP and API Interactions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:04 Future of API Security in an AI-Driven World</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:37 Key Takeaways for CISOs</li></ol><br/><p>#AI #Cybersecurity #APISecurity #AIAgents #AutonomousAI #techpodcast #CISO #APIVisibility #ShadowAPIs #DigitalTransformation #SecurityStrategist</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c44a6430-7e80-4338-a959-9ef34cac4515</guid><itunes:image href="https://artwork.captivate.fm/3ac6942f-1359-445e-aab8-f2bd7cf95103/131-This-new-world-runs-on-APIs-and-its-nervous-system-has-to-b.jpeg"/><pubDate>Fri, 16 Jan 2026 11:38:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c44a6430-7e80-4338-a959-9ef34cac4515.mp3" length="36268632" type="audio/mpeg"/><itunes:duration>15:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="What Happens to API Security When AI Agents Go Autonomous?"><podcast:source uri="https://youtu.be/dYbqKg8miaY"/></podcast:alternateEnclosure></item><item><title>Why AI Agents Demand a New Approach to Identity Security</title><itunes:title>Why AI Agents Demand a New Approach to Identity Security</itunes:title><description><![CDATA[<p>AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows, and make decisions at a speed and scale beyond human capability.</p><p>Matt Fangman, Field CTO at SailPoint, explains on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong> that this new power has costs. AI agents have turned into a new, mostly unmanaged identity type. Enterprises are just starting to realise how far behind they are.</p><p>In the recent episode of The Security Strategist podcast, guest Fangman sat down with Alejandro Leal, Senior Analyst at KuppingerCole. They talked about the implications of AI agents for identity security and the rapid evolution of AI agents, the challenges of visibility and governance, and the need for operational control in managing these agents. </p><p>The conversation highlights the importance of just-in-time permissions, the evolution of identity controls, and strategic moves for CISOs to manage the risks associated with agent-based operations.</p><h2>AI Agents Creating Brand New Identity Layers</h2><p>Fangman notes a turning point in the last 12 to 18 months, driven by the fast development of <strong><a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a></strong>. These models gave agents the reasoning and autonomy to change from toys in a sandbox to real virtual workers.</p><p>Organizations can now train agents with goals, equip them with tools, and connect them to one another. Since these agents do not tire, slow down, or forget, companies see a chance to grow their workforce without hiring new people.</p><p>The issue is: They didn’t establish identity controls for these AI workers.</p><p>“They’ve created a brand-new layer of identities,” Matt says, “but without the protections, ownership, or visibility that exist for humans.”</p><p>Shadow agents, sometimes numbering in the thousands, operate unnoticed. Identity teams are unaware of them, security teams can’t monitor them, and cloud teams might spot them briefly in a dashboard, thinking they are someone else’s issue. Meanwhile, the agents themselves explore, share tools, and adapt.</p><p>It’s a governance gap that keeps widening.</p><p>When Leal asks how the industry should respond, Fangman answers: “Start by treating agents like people. Give them roles. Define what they can access. Apply entitlements. Enforce policy.”</p><p>When asked for advice for CISOs and what they should do before agents start to overwhelm security programs?</p><p>The SailPoint Field CTO recommends beginning with inventory. If an organisation does not know what agents exist, what they access, or what they are doing, nothing else matters. Assigning each agent a corporate identity and tracking its behaviour is the essential foundation for everything that follows.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI agents are becoming operational actors in business systems.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The lack of visibility into agents creates governance risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Just-in-time permissions are essential for managing agents.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Agents are evolving into peer systems within organisations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity management is shifting towards relationships and context.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to inventory and track agent behaviour.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Behaviour logging is crucial for ensuring agent compliance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identities for agents will be a new focus area.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Control of basic identity management practices is vital.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The evolution of AI agents is reshaping identity security.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 The Rise of AI Agents in Identity Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:14 Challenges of Visibility and Governance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:51 Building an Operational Control Plane</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:03 Evolving Identity Controls for Multi-Agent Systems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:08 Strategic Moves for CISOs in Managing Agents</li></ol><br/>]]></description><content:encoded><![CDATA[<p>AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows, and make decisions at a speed and scale beyond human capability.</p><p>Matt Fangman, Field CTO at SailPoint, explains on <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong> that this new power has costs. AI agents have turned into a new, mostly unmanaged identity type. Enterprises are just starting to realise how far behind they are.</p><p>In the recent episode of The Security Strategist podcast, guest Fangman sat down with Alejandro Leal, Senior Analyst at KuppingerCole. They talked about the implications of AI agents for identity security and the rapid evolution of AI agents, the challenges of visibility and governance, and the need for operational control in managing these agents. </p><p>The conversation highlights the importance of just-in-time permissions, the evolution of identity controls, and strategic moves for CISOs to manage the risks associated with agent-based operations.</p><h2>AI Agents Creating Brand New Identity Layers</h2><p>Fangman notes a turning point in the last 12 to 18 months, driven by the fast development of <strong><a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a></strong>. These models gave agents the reasoning and autonomy to change from toys in a sandbox to real virtual workers.</p><p>Organizations can now train agents with goals, equip them with tools, and connect them to one another. Since these agents do not tire, slow down, or forget, companies see a chance to grow their workforce without hiring new people.</p><p>The issue is: They didn’t establish identity controls for these AI workers.</p><p>“They’ve created a brand-new layer of identities,” Matt says, “but without the protections, ownership, or visibility that exist for humans.”</p><p>Shadow agents, sometimes numbering in the thousands, operate unnoticed. Identity teams are unaware of them, security teams can’t monitor them, and cloud teams might spot them briefly in a dashboard, thinking they are someone else’s issue. Meanwhile, the agents themselves explore, share tools, and adapt.</p><p>It’s a governance gap that keeps widening.</p><p>When Leal asks how the industry should respond, Fangman answers: “Start by treating agents like people. Give them roles. Define what they can access. Apply entitlements. Enforce policy.”</p><p>When asked for advice for CISOs and what they should do before agents start to overwhelm security programs?</p><p>The SailPoint Field CTO recommends beginning with inventory. If an organisation does not know what agents exist, what they access, or what they are doing, nothing else matters. Assigning each agent a corporate identity and tracking its behaviour is the essential foundation for everything that follows.</p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI agents are becoming operational actors in business systems.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The lack of visibility into agents creates governance risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Just-in-time permissions are essential for managing agents.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Agents are evolving into peer systems within organisations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity management is shifting towards relationships and context.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to inventory and track agent behaviour.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Behaviour logging is crucial for ensuring agent compliance.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identities for agents will be a new focus area.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Control of basic identity management practices is vital.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The evolution of AI agents is reshaping identity security.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 The Rise of AI Agents in Identity Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:14 Challenges of Visibility and Governance</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:51 Building an Operational Control Plane</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:03 Evolving Identity Controls for Multi-Agent Systems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:08 Strategic Moves for CISOs in Managing Agents</li></ol><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3d31c02c-f5ae-4c86-a1fe-88723cfeab28</guid><itunes:image href="https://artwork.captivate.fm/e79bd508-07e4-4636-acff-09c2e8a93dc5/sailpoint-em360tech-podcast.png"/><pubDate>Tue, 23 Dec 2025 11:06:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/3d31c02c-f5ae-4c86-a1fe-88723cfeab28.mp3" length="31454748" type="audio/mpeg"/><itunes:duration>13:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is Your Holiday Traffic Human—or AI-Driven and Under Attack?</title><itunes:title>Is Your Holiday Traffic Human—or AI-Driven and Under Attack?</itunes:title><description><![CDATA[<p>As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing how attacks are launched and how organisations function daily.</p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pascal Geenens, VP of Threat Intelligence at Radware, to discuss why CISOs need to rethink their long-held beliefs about attackers, users, and what “web traffic” really means in an AI-driven world.</p><p>They talk about the dual nature of AI in cybercrime, the emergence of new tools that facilitate attacks, and the importance of automated pen testing as a defence strategy. The conversation also highlights vulnerabilities associated with AI assistants, such as indirect prompt injection, and emphasises the need for organisations to adopt best practices to safeguard against these threats.</p><p><strong><em><a href="https://em360tech.com/podcasts/prompt-engineering-agentic-ai-new-frontier-cyber-threats" rel="noopener noreferrer" target="_blank">Also Watch: From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</a></em></strong></p><h2>AI Attacks Lower the Barrier for Cybercrime</h2><p>Geenens tells Stiennon that AI’s biggest effect on security is not a new type of futuristic attack but rather its scale and accessibility. Tools like WormGPT, FraudGPT, and advanced platforms like Xanthorox AI provide reconnaissance, exploit development, data analysis, and phishing as subscription-based services. For a few hundred dollars each month, attackers can access AI-assisted tools that cover the entire cyber kill chain.</p><p>This “vibe hacking” model resembles vibe coding. Attackers describe their goals in natural language, and the AI generates scripts, reconnaissance workflows, or data extraction logic. While these tools have not fully automated attacks from start to finish, they significantly lower the skills needed to engage in cybercrime. As Geenens explains, attackers can now target hundreds or thousands of organisations simultaneously, a task that once required large teams.</p><p>Attackers can now afford to fail repeatedly as part of their learning process, while defenders cannot. Even flawed AI-generated exploits speed up scanning, vulnerability detection, and phishing at levels that security teams find challenging to handle. The result is a threat landscape that uses familiar techniques but operates with greater speed and intensity.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-stop-encrypted-ddos-attack-overcome-https-challenges" rel="noopener noreferrer" target="_blank">Also Watch: How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</a></em></strong></p><h2>AI Assistants &amp; Browsers Creating Invisible Data Leak Risks</h2><p>The second, and more alarming, change that the VP of Threat Intelligence emphasises occurs within companies themselves. As organisations use AI assistants and AI-powered browsers, they delegate authority along with convenience. These tools require access to emails, documents, and business systems to be effective, and this access creates new risks.</p><p>Indirect prompt injection, shadow leaks, and echo leaks turn normal workflows into potential attack vectors. For instance, an AI assistant summarising emails may unintentionally process hidden commands within a message. These commands can lead the model to inadvertently leak sensitive information without the user clicking any links or noticing anything unusual.</p><p>In some cases, the data doesn't even leave the endpoint; it exits directly from the AI provider's cloud infrastructure, completely bypassing established data loss prevention and network monitoring.</p><p>Meanwhile, Geenens points to a fundamental shift in traffic patterns. The web is moving from human-to-website interactions to machine-to-machine communications. AI agents browse, conduct transactions, and query on behalf of users.</p><p>Bot traffic is growing rapidly, surpassing human traffic, and traditional controls, such as CAPTCHA or login challenges, are no longer effective. Defenders must now focus on behaviour rather than identity—understanding what a machine is trying to do and whether that behaviour matches business intent.</p><p>For CISOs, the message is straightforward: AI is unavoidable, but it needs to be used with proper governance, monitoring, and behavioural security measures. Understand what data AI assistants can access, log their activities, and get ready for a future where most traffic is automated. Attackers have already adapted.</p><p><strong><em><a href="https://em360tech.com/podcasts/can-you-stop-api-business-logic-attack" rel="noopener noreferrer" target="_blank">Also Watch: Can You Stop an API Business Logic Attack?</a></em></strong></p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The holiday season sees an increase in cyber threats.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI tools like Worm GPT and Fraud GPT are changing the threat landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automated pen testing can help organisations defend against AI-driven attacks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Indirect prompt injection poses significant risks to data security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations must monitor AI assistant interactions closely.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Vibe hacking is a new trend that lowers the barrier to entry for cybercriminals.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Behavioural analysis is crucial as machine-to-machine communication increases.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pen testing remains essential to identify vulnerabilities before attackers do.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI can automate parts of attacks, but is not fully autonomous yet.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to implement strict controls when deploying AI technologies.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Threats During Holidays</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:37 AI's Role in Evolving Cyber Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:45 The Impact of AI Tools on Cybercrime</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:59 Automated Pen Testing and AI's Defensive Role</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:45 Indirect Prompt Injection and AI Vulnerabilities</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:37 Best Practices for CISOs in the Age of AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>21:39 The Future of Cybersecurity: Machine-to-Machine Communication</li></ol><br/>]]></description><content:encoded><![CDATA[<p>As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing how attacks are launched and how organisations function daily.</p><p>In the recent episode of <strong><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a></strong>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pascal Geenens, VP of Threat Intelligence at Radware, to discuss why CISOs need to rethink their long-held beliefs about attackers, users, and what “web traffic” really means in an AI-driven world.</p><p>They talk about the dual nature of AI in cybercrime, the emergence of new tools that facilitate attacks, and the importance of automated pen testing as a defence strategy. The conversation also highlights vulnerabilities associated with AI assistants, such as indirect prompt injection, and emphasises the need for organisations to adopt best practices to safeguard against these threats.</p><p><strong><em><a href="https://em360tech.com/podcasts/prompt-engineering-agentic-ai-new-frontier-cyber-threats" rel="noopener noreferrer" target="_blank">Also Watch: From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</a></em></strong></p><h2>AI Attacks Lower the Barrier for Cybercrime</h2><p>Geenens tells Stiennon that AI’s biggest effect on security is not a new type of futuristic attack but rather its scale and accessibility. Tools like WormGPT, FraudGPT, and advanced platforms like Xanthorox AI provide reconnaissance, exploit development, data analysis, and phishing as subscription-based services. For a few hundred dollars each month, attackers can access AI-assisted tools that cover the entire cyber kill chain.</p><p>This “vibe hacking” model resembles vibe coding. Attackers describe their goals in natural language, and the AI generates scripts, reconnaissance workflows, or data extraction logic. While these tools have not fully automated attacks from start to finish, they significantly lower the skills needed to engage in cybercrime. As Geenens explains, attackers can now target hundreds or thousands of organisations simultaneously, a task that once required large teams.</p><p>Attackers can now afford to fail repeatedly as part of their learning process, while defenders cannot. Even flawed AI-generated exploits speed up scanning, vulnerability detection, and phishing at levels that security teams find challenging to handle. The result is a threat landscape that uses familiar techniques but operates with greater speed and intensity.</p><p><strong><em><a href="https://em360tech.com/podcasts/how-stop-encrypted-ddos-attack-overcome-https-challenges" rel="noopener noreferrer" target="_blank">Also Watch: How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</a></em></strong></p><h2>AI Assistants &amp; Browsers Creating Invisible Data Leak Risks</h2><p>The second, and more alarming, change that the VP of Threat Intelligence emphasises occurs within companies themselves. As organisations use AI assistants and AI-powered browsers, they delegate authority along with convenience. These tools require access to emails, documents, and business systems to be effective, and this access creates new risks.</p><p>Indirect prompt injection, shadow leaks, and echo leaks turn normal workflows into potential attack vectors. For instance, an AI assistant summarising emails may unintentionally process hidden commands within a message. These commands can lead the model to inadvertently leak sensitive information without the user clicking any links or noticing anything unusual.</p><p>In some cases, the data doesn't even leave the endpoint; it exits directly from the AI provider's cloud infrastructure, completely bypassing established data loss prevention and network monitoring.</p><p>Meanwhile, Geenens points to a fundamental shift in traffic patterns. The web is moving from human-to-website interactions to machine-to-machine communications. AI agents browse, conduct transactions, and query on behalf of users.</p><p>Bot traffic is growing rapidly, surpassing human traffic, and traditional controls, such as CAPTCHA or login challenges, are no longer effective. Defenders must now focus on behaviour rather than identity—understanding what a machine is trying to do and whether that behaviour matches business intent.</p><p>For CISOs, the message is straightforward: AI is unavoidable, but it needs to be used with proper governance, monitoring, and behavioural security measures. Understand what data AI assistants can access, log their activities, and get ready for a future where most traffic is automated. Attackers have already adapted.</p><p><strong><em><a href="https://em360tech.com/podcasts/can-you-stop-api-business-logic-attack" rel="noopener noreferrer" target="_blank">Also Watch: Can You Stop an API Business Logic Attack?</a></em></strong></p><h3>Takeaways</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The holiday season sees an increase in cyber threats.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI tools like Worm GPT and Fraud GPT are changing the threat landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automated pen testing can help organisations defend against AI-driven attacks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Indirect prompt injection poses significant risks to data security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organisations must monitor AI assistant interactions closely.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Vibe hacking is a new trend that lowers the barrier to entry for cybercriminals.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Behavioural analysis is crucial as machine-to-machine communication increases.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pen testing remains essential to identify vulnerabilities before attackers do.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI can automate parts of attacks, but is not fully autonomous yet.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISOs need to implement strict controls when deploying AI technologies.</li></ol><br/><h3>Chapters</h3><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Cybersecurity Threats During Holidays</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:37 AI's Role in Evolving Cyber Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:45 The Impact of AI Tools on Cybercrime</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>08:59 Automated Pen Testing and AI's Defensive Role</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:45 Indirect Prompt Injection and AI Vulnerabilities</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:37 Best Practices for CISOs in the Age of AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>21:39 The Future of Cybersecurity: Machine-to-Machine Communication</li></ol><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9fc2bff4-8514-4389-8456-789a10902cc7</guid><itunes:image href="https://artwork.captivate.fm/2b959c00-d1d0-46ba-bd2c-876660ed13cd/holiday-cybersecurity-ai-attacks-radware-podcast.png"/><pubDate>Tue, 23 Dec 2025 10:40:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/9fc2bff4-8514-4389-8456-789a10902cc7.mp3" length="57895093" type="audio/mpeg"/><itunes:duration>24:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is Your Holiday Traffic Human—or AI-Driven and Under Attack?"><podcast:source uri="https://youtu.be/SAU1wv1DzWo"/></podcast:alternateEnclosure></item><item><title>From IoT to AIoT: Operational and Security Challenges for Modern Enterprises</title><itunes:title>From IoT to AIoT: Operational and Security Challenges for Modern Enterprises</itunes:title><description><![CDATA[<p>Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a> podcast, host <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> speaks with <a href="https://www.linkedin.com/in/berndgross/" rel="noopener noreferrer" target="_blank">Bernd Gross</a>, CEO of <a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">Cumulocity</a>, about how enterprises can navigate these complexities and scale their operations successfully.</p><p>Gross emphasises that the foundation of successful enterprise transformation is having the right data. Organisations need accurate information, clear visibility into device status, and meaningful context to make informed decisions. Without this foundation, even the most advanced platforms cannot deliver their full potential.</p><h2>Strengthening Security and Lifecycle Management</h2><p>As the number of connected devices grows, resilient cybersecurity and cloud security are critical. Bernd shares practical insights for protecting enterprise systems while maintaining smooth operations, from managing access to ensuring device integrity across distributed networks. Alongside security, lifecycle management ensures devices are monitored, maintained, and retired efficiently. Organisations that integrate lifecycle management into daily operations see fewer disruptions and higher overall reliability.</p><h2>Data Strategy and Automation for Smarter Operations</h2><p>Connected platforms are only as valuable as the data they generate and the processes they support. Bernd explains that a clear data strategy is essential for enriching information, understanding device performance, and driving operational decisions. Automation also plays a key role, allowing enterprises to act quickly, scale efficiently, and maintain control over complex systems. By connecting device management, enriched data, and automated processes, organisations can respond to challenges faster, optimise performance, and create a foundation for long-term transformation.</p><p>This episode provides practical guidance for technology leaders looking to improve operational efficiency, strengthen security, and optimise connected platforms. For more insights and resources on connected platforms, visit<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank"> <strong>Cumulocity</strong></a>.</p><h2>Takeaways</h2><ul><li>Cumulocity is a leading IoT platform focused on B2B industrial use cases.</li><li>Security in connected operations requires both IT and OT security measures.</li><li>No open ports towards the internet is a critical security rule.</li><li>Device certificates are essential for secure communication.</li><li>Lifecycle management is crucial for maintaining connected devices.</li><li>On-premise systems may not be as secure as perceived compared to cloud solutions.</li><li>Automation can significantly reduce maintenance costs and improve efficiency.</li><li>Data enrichment is necessary for effective AI model training.</li><li>Many enterprises struggle with the data challenge in AI deployment.</li><li>Clear business outcomes should guide IoT and AIoT initiatives.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IoT and AIoT Transformation</p><p>04:40 Security Challenges in Connected Enterprises</p><p>13:01 On-Premise vs Cloud Security Perceptions</p><p>17:44 The Value of Automation in Device Management</p><p>21:34 Operational Challenges in Deploying AI at Scale</p><p>26:11 Transitioning from IoT to AIoT Data Management</p><p>31:18 Practical Advice for Successful IoT and AIoT Initiatives</p>]]></description><content:encoded><![CDATA[<p>Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a> podcast, host <a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a> speaks with <a href="https://www.linkedin.com/in/berndgross/" rel="noopener noreferrer" target="_blank">Bernd Gross</a>, CEO of <a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank">Cumulocity</a>, about how enterprises can navigate these complexities and scale their operations successfully.</p><p>Gross emphasises that the foundation of successful enterprise transformation is having the right data. Organisations need accurate information, clear visibility into device status, and meaningful context to make informed decisions. Without this foundation, even the most advanced platforms cannot deliver their full potential.</p><h2>Strengthening Security and Lifecycle Management</h2><p>As the number of connected devices grows, resilient cybersecurity and cloud security are critical. Bernd shares practical insights for protecting enterprise systems while maintaining smooth operations, from managing access to ensuring device integrity across distributed networks. Alongside security, lifecycle management ensures devices are monitored, maintained, and retired efficiently. Organisations that integrate lifecycle management into daily operations see fewer disruptions and higher overall reliability.</p><h2>Data Strategy and Automation for Smarter Operations</h2><p>Connected platforms are only as valuable as the data they generate and the processes they support. Bernd explains that a clear data strategy is essential for enriching information, understanding device performance, and driving operational decisions. Automation also plays a key role, allowing enterprises to act quickly, scale efficiently, and maintain control over complex systems. By connecting device management, enriched data, and automated processes, organisations can respond to challenges faster, optimise performance, and create a foundation for long-term transformation.</p><p>This episode provides practical guidance for technology leaders looking to improve operational efficiency, strengthen security, and optimise connected platforms. For more insights and resources on connected platforms, visit<a href="https://www.cumulocity.com/" rel="noopener noreferrer" target="_blank"> <strong>Cumulocity</strong></a>.</p><h2>Takeaways</h2><ul><li>Cumulocity is a leading IoT platform focused on B2B industrial use cases.</li><li>Security in connected operations requires both IT and OT security measures.</li><li>No open ports towards the internet is a critical security rule.</li><li>Device certificates are essential for secure communication.</li><li>Lifecycle management is crucial for maintaining connected devices.</li><li>On-premise systems may not be as secure as perceived compared to cloud solutions.</li><li>Automation can significantly reduce maintenance costs and improve efficiency.</li><li>Data enrichment is necessary for effective AI model training.</li><li>Many enterprises struggle with the data challenge in AI deployment.</li><li>Clear business outcomes should guide IoT and AIoT initiatives.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IoT and AIoT Transformation</p><p>04:40 Security Challenges in Connected Enterprises</p><p>13:01 On-Premise vs Cloud Security Perceptions</p><p>17:44 The Value of Automation in Device Management</p><p>21:34 Operational Challenges in Deploying AI at Scale</p><p>26:11 Transitioning from IoT to AIoT Data Management</p><p>31:18 Practical Advice for Successful IoT and AIoT Initiatives</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a51eb318-b680-4886-8f54-28419358c548</guid><itunes:image href="https://artwork.captivate.fm/fb2588cf-9699-45b3-976a-74ac8252ca06/ry-1.png"/><pubDate>Mon, 22 Dec 2025 07:25:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/a51eb318-b680-4886-8f54-28419358c548.mp3" length="65696904" type="audio/mpeg"/><itunes:duration>27:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode><podcast:season>1</podcast:season></item><item><title>Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally</title><itunes:title>Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally</itunes:title><description><![CDATA[<p>Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastructure, operations, regulatory compliance, and user trust, all while delivering systems that are reliable, secure, and effective across diverse regions.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;explores these challenges with&nbsp;<a href="https://www.linkedin.com/in/grant-macwilliam-40832ba4/" rel="noopener noreferrer" target="_blank">Grant McWilliam</a>, Chief Technology Officer at&nbsp;<a href="https://www.aura.com/" rel="noopener noreferrer" target="_blank">Aura</a>. They discuss how enterprises can overcome regulatory compliance, technology infrastructure, and operational challenges while delivering trusted, reliable systems globally.</p><h2>Understanding Regulatory Compliance in Global Scaling</h2><p>Global expansion introduces different&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-governance-complete-guide-enterprises" rel="noopener noreferrer" target="_blank">regulatory landscapes</a>, from data privacy laws to communications standards. While some see these as hurdles, they can become strategic advantages: As Grant says, “Regulatory challenges can be opportunities.” He further explains that building a global framework with room for local adaptation, “design globally, implement locally,” ensures compliance while maintaining operational flexibility.</p><h2>Building Resilient Technology Infrastructure</h2><p>Reliable technology infrastructure is just as&nbsp;<a href="https://em360tech.com/tech-articles/how-meet-ccpa-compliance-enterprise-companies" rel="noopener noreferrer" target="_blank">important for platforms</a>&nbsp;operating across regions with varying telecom networks, mapping systems, and technical capabilities. In mission-critical contexts such as emergency response, reliability is non-negotiable, and technology should never limit service. Redundancy, failovers, and multi-region deployments ensure platforms remain responsive under pressure.</p><h2>Operational Excellence and Trust</h2><p>Gary notes that operational pressures grow as organisations scale. Teams need to act efficiently while respecting local regulations and cultural contexts. He emphasises: “Trust is essential in emergency response and emergency response must prioritise user needs.” By embedding processes as backups to the backups and adapting technology to local conditions, organisations build resilience and maintain user confidence. He adds, “Collaboration enhances operational efficiency.”</p><h2>Key Principles for Scaling Cybersecurity Globally</h2><ol><li>Global standards and local adaptation: Establish frameworks that scale but allow local execution.</li><li>Reliability and trust: Ensure mission-critical systems function under any circumstances.</li><li>Cultural and operational alignment: Integrate local knowledge and collaboration to make technology sustainable and effective.</li></ol><br/><p>Scaling technology globally requires&nbsp;<a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">balancing cybersecurity</a>, infrastructure, regulatory compliance, and operational agility. In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, the discussion highlights that success comes from combining technical excellence with strategic empathy, ensuring platforms are trusted, resilient, and effective for every user, in every region.</p><h2>Takeaways</h2><ul><li>Scaling technology globally requires navigating regulatory complexity and infrastructure demands.</li><li>Building trust is essential for emergency response technology to be effective.</li><li>Global standards must be adapted to local needs for successful implementation.</li><li>Adapting to different infrastructure environments is crucial for maintaining service quality.</li><li>Cultural understanding is key to adapting technology for different regions.</li><li>Regulatory challenges can be opportunities for improvement.</li><li>Collaboration with local teams enhances operational efficiency.</li></ul><br/><h2>Chapters</h2><ul><li>01:20 Introduction to Grant McWilliam</li><li>04:39 Challenges of Scaling Emergency Response Globally</li><li>08:39 Technical Challenges in Global Infrastructure</li><li>11:38 Maintaining Reliability and Redundancy in Emergencies</li><li>18:30 Strategies for Operational Efficiency and Security at Scale</li><li>22:26 Top Priorities for Enterprise Leaders and CISOs</li></ul><br/><h2>About Grant Macwilliam</h2><p><a href="https://www.linkedin.com/in/grant-macwilliam-40832ba4/" rel="noopener noreferrer" target="_blank">Grant Macwilliam</a>&nbsp;serves as Chief Technology Officer at Aura, leading the development and scaling of a global emergency response platform that connects users with vetted security and medical responders worldwide. An electrical engineer by training, he is passionate about creating technology and teams that deliver real-world impact. Under his leadership, Aura has expanded its platform across continents, supporting partners in ride-sharing, insurance, and public safety sectors while maintaining high standards of reliability, trust, and operational excellence.</p>]]></description><content:encoded><![CDATA[<p>Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastructure, operations, regulatory compliance, and user trust, all while delivering systems that are reliable, secure, and effective across diverse regions.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;explores these challenges with&nbsp;<a href="https://www.linkedin.com/in/grant-macwilliam-40832ba4/" rel="noopener noreferrer" target="_blank">Grant McWilliam</a>, Chief Technology Officer at&nbsp;<a href="https://www.aura.com/" rel="noopener noreferrer" target="_blank">Aura</a>. They discuss how enterprises can overcome regulatory compliance, technology infrastructure, and operational challenges while delivering trusted, reliable systems globally.</p><h2>Understanding Regulatory Compliance in Global Scaling</h2><p>Global expansion introduces different&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-governance-complete-guide-enterprises" rel="noopener noreferrer" target="_blank">regulatory landscapes</a>, from data privacy laws to communications standards. While some see these as hurdles, they can become strategic advantages: As Grant says, “Regulatory challenges can be opportunities.” He further explains that building a global framework with room for local adaptation, “design globally, implement locally,” ensures compliance while maintaining operational flexibility.</p><h2>Building Resilient Technology Infrastructure</h2><p>Reliable technology infrastructure is just as&nbsp;<a href="https://em360tech.com/tech-articles/how-meet-ccpa-compliance-enterprise-companies" rel="noopener noreferrer" target="_blank">important for platforms</a>&nbsp;operating across regions with varying telecom networks, mapping systems, and technical capabilities. In mission-critical contexts such as emergency response, reliability is non-negotiable, and technology should never limit service. Redundancy, failovers, and multi-region deployments ensure platforms remain responsive under pressure.</p><h2>Operational Excellence and Trust</h2><p>Gary notes that operational pressures grow as organisations scale. Teams need to act efficiently while respecting local regulations and cultural contexts. He emphasises: “Trust is essential in emergency response and emergency response must prioritise user needs.” By embedding processes as backups to the backups and adapting technology to local conditions, organisations build resilience and maintain user confidence. He adds, “Collaboration enhances operational efficiency.”</p><h2>Key Principles for Scaling Cybersecurity Globally</h2><ol><li>Global standards and local adaptation: Establish frameworks that scale but allow local execution.</li><li>Reliability and trust: Ensure mission-critical systems function under any circumstances.</li><li>Cultural and operational alignment: Integrate local knowledge and collaboration to make technology sustainable and effective.</li></ol><br/><p>Scaling technology globally requires&nbsp;<a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">balancing cybersecurity</a>, infrastructure, regulatory compliance, and operational agility. In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, the discussion highlights that success comes from combining technical excellence with strategic empathy, ensuring platforms are trusted, resilient, and effective for every user, in every region.</p><h2>Takeaways</h2><ul><li>Scaling technology globally requires navigating regulatory complexity and infrastructure demands.</li><li>Building trust is essential for emergency response technology to be effective.</li><li>Global standards must be adapted to local needs for successful implementation.</li><li>Adapting to different infrastructure environments is crucial for maintaining service quality.</li><li>Cultural understanding is key to adapting technology for different regions.</li><li>Regulatory challenges can be opportunities for improvement.</li><li>Collaboration with local teams enhances operational efficiency.</li></ul><br/><h2>Chapters</h2><ul><li>01:20 Introduction to Grant McWilliam</li><li>04:39 Challenges of Scaling Emergency Response Globally</li><li>08:39 Technical Challenges in Global Infrastructure</li><li>11:38 Maintaining Reliability and Redundancy in Emergencies</li><li>18:30 Strategies for Operational Efficiency and Security at Scale</li><li>22:26 Top Priorities for Enterprise Leaders and CISOs</li></ul><br/><h2>About Grant Macwilliam</h2><p><a href="https://www.linkedin.com/in/grant-macwilliam-40832ba4/" rel="noopener noreferrer" target="_blank">Grant Macwilliam</a>&nbsp;serves as Chief Technology Officer at Aura, leading the development and scaling of a global emergency response platform that connects users with vetted security and medical responders worldwide. An electrical engineer by training, he is passionate about creating technology and teams that deliver real-world impact. Under his leadership, Aura has expanded its platform across continents, supporting partners in ride-sharing, insurance, and public safety sectors while maintaining high standards of reliability, trust, and operational excellence.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">63ac2b9b-d0ce-419f-b0e4-ccf451d8a438</guid><itunes:image href="https://artwork.captivate.fm/c9b37c36-09d9-4f65-8005-07998185b566/Untitled-design.png"/><pubDate>Fri, 19 Dec 2025 08:24:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/63ac2b9b-d0ce-419f-b0e4-ccf451d8a438.mp3" length="59723137" type="audio/mpeg"/><itunes:duration>24:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode><podcast:season>1</podcast:season></item><item><title>How Can MSPs Move From Defense to Full Cyber Resilience?</title><itunes:title>How Can MSPs Move From Defense to Full Cyber Resilience?</itunes:title><description><![CDATA[<p>In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber resilience.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/jim-waggoner-76408b2/" rel="noopener noreferrer" target="_blank"><strong>Jim Waggoner, VP of Product Management at N-able</strong></a>, and<a href="https://www.linkedin.com/in/thesecuritypope/" rel="noopener noreferrer" target="_blank"><strong>&nbsp;Lewis Pope, CISSP and N-able Head Nerd</strong></a>, sit down with host&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care, the Lead Analyst at KuppingerCole</strong></a>.&nbsp;</p><p>MSPs have typically focused on technology layers, like backups, EDR, and MDR. However, as both Waggoner and Pope point out during the conversation, achieving resilience requires a bigger change – in operations, culture, and strategy.</p><h2><strong>Cyber Resilience is Being Prepared For Any Attack</strong></h2><p>When asked about redefining resilience, Pope underscores the need to move away from a classic technician mindset. He explains that MSPs should adopt a business-focused approach:</p><p>“You have to drop your technician glasses and put on your business glasses for a lot of these matters.”</p><p>Why is this important? MSPs often have a better understanding of their clients’ workflows than the clients themselves. This puts MSPs in a powerful position, but they must look both inward and outward, Pope further explains.&nbsp;</p><p>He emphasises the need for internal threat modelling, risk registers, and long-term business planning with clients: “You need to have that seat there so you can help them, guide them, and put your fingers on the scales of which direction they plan to take.”</p><p>Supporting this shift in tackling threats, Waggoner cites an example of tabletop&nbsp;<a href="https://em360tech.com/whitepapers/n-able-annual-threat-report-2025" rel="noopener noreferrer" target="_blank">exercises performed at N-able</a>&nbsp;internally. Imagine “you just got a call that someone believes that they've been compromised by ransomware. What do you do?”</p><p>The exercise didn’t focus on antivirus tools. Instead, it uncovered operational blind spots—like who to call, what steps to take, and how to keep the business running. The key lesson is that resilience is not about preventing every attack; it's about being prepared for the one that will happen.</p><p><a href="https://em360tech.com/podcasts/staying-competitive-why-mdr-essential-msp-n-able" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?</em></strong></a></p><h2><strong>‘Automation Should Strengthen Security Teams, Not Replace Them’</strong></h2><p>AI and automation is the rage in the cyber technology industry at the moment. While AI offers speed and scale, Waggoner warns it can lead to serious overreactions if not managed carefully: “If you're seeing something that looks suspicious and the automated response is to cut off these services, that can be great.”&nbsp;</p><p>The only way to balance a rogue AI and automation situation is “the human,” he added. The VP of Product Management asserts the importance of safeguards such as manual confirmation prompts, human-initiated rollbacks, and analyst reviews. Ultimately, automation should strengthen security teams, not replace them.</p><p>“You treat anything and everything that it does as something that a highly clever intern brought to you, but you still have to double-check it,” Pope added to the conversation. The Head Nerd emphasises a key detail often overlooked in AI discussions – precision. MSPs need to distinguish between LLMs, machine learning, and automated processes as each has different risks and policies.</p><p>Throughout the discussion, one message stands out – the MSPs who will succeed are those who embrace cultural change, practice operational readiness, and use automation wisely.</p><p>“You do need to say I've kept your business running. Constantly, it has not gone down,” Waggoner states. In a world where cyber incidents are a matter of when, not if, resilience is now an expectation, not just an added service.</p><p><a href="https://em360tech.com/podcasts/edr-xdr-mdr-real-difference-why-it-matters" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: EDR, XDR, or MDR — What’s the Real Difference and Why Does It Matter?</em></strong></a></p><h3><strong>Takeaways</strong></h3><ul><li>Cyber resilience is about keeping businesses running during attacks.</li><li>MSPs must shift from reactive to proactive security measures.</li><li>Compliance is becoming increasingly important for all businesses.</li><li>Operational and cultural changes are essential for resilience.</li><li>Automation and AI can enhance security but require human oversight.</li><li>MSPs should conduct tabletop exercises to prepare for attacks.</li><li>Building partnerships can help MSPs enhance their services.</li><li>Resilience planning should be an ongoing process, not a one-time effort.</li><li>Understanding client operations is crucial for effective security.</li><li>Urgency in response is key to managing cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cyber Resilience</li><li>02:47 Defining True Cyber Resilience</li><li>05:52 The Role of MSPs in Cyber Resilience</li><li>09:04 Compliance and Its Growing Importance</li><li>12:04 Operational and Cultural Changes for Resilience</li><li>14:59 The Impact of Automation and AI</li><li>18:06 Turning Compliance into Resilience Programs</li><li>20:58 Advice for Building Cyber Resilient Businesses</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber resilience.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/jim-waggoner-76408b2/" rel="noopener noreferrer" target="_blank"><strong>Jim Waggoner, VP of Product Management at N-able</strong></a>, and<a href="https://www.linkedin.com/in/thesecuritypope/" rel="noopener noreferrer" target="_blank"><strong>&nbsp;Lewis Pope, CISSP and N-able Head Nerd</strong></a>, sit down with host&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care, the Lead Analyst at KuppingerCole</strong></a>.&nbsp;</p><p>MSPs have typically focused on technology layers, like backups, EDR, and MDR. However, as both Waggoner and Pope point out during the conversation, achieving resilience requires a bigger change – in operations, culture, and strategy.</p><h2><strong>Cyber Resilience is Being Prepared For Any Attack</strong></h2><p>When asked about redefining resilience, Pope underscores the need to move away from a classic technician mindset. He explains that MSPs should adopt a business-focused approach:</p><p>“You have to drop your technician glasses and put on your business glasses for a lot of these matters.”</p><p>Why is this important? MSPs often have a better understanding of their clients’ workflows than the clients themselves. This puts MSPs in a powerful position, but they must look both inward and outward, Pope further explains.&nbsp;</p><p>He emphasises the need for internal threat modelling, risk registers, and long-term business planning with clients: “You need to have that seat there so you can help them, guide them, and put your fingers on the scales of which direction they plan to take.”</p><p>Supporting this shift in tackling threats, Waggoner cites an example of tabletop&nbsp;<a href="https://em360tech.com/whitepapers/n-able-annual-threat-report-2025" rel="noopener noreferrer" target="_blank">exercises performed at N-able</a>&nbsp;internally. Imagine “you just got a call that someone believes that they've been compromised by ransomware. What do you do?”</p><p>The exercise didn’t focus on antivirus tools. Instead, it uncovered operational blind spots—like who to call, what steps to take, and how to keep the business running. The key lesson is that resilience is not about preventing every attack; it's about being prepared for the one that will happen.</p><p><a href="https://em360tech.com/podcasts/staying-competitive-why-mdr-essential-msp-n-able" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?</em></strong></a></p><h2><strong>‘Automation Should Strengthen Security Teams, Not Replace Them’</strong></h2><p>AI and automation is the rage in the cyber technology industry at the moment. While AI offers speed and scale, Waggoner warns it can lead to serious overreactions if not managed carefully: “If you're seeing something that looks suspicious and the automated response is to cut off these services, that can be great.”&nbsp;</p><p>The only way to balance a rogue AI and automation situation is “the human,” he added. The VP of Product Management asserts the importance of safeguards such as manual confirmation prompts, human-initiated rollbacks, and analyst reviews. Ultimately, automation should strengthen security teams, not replace them.</p><p>“You treat anything and everything that it does as something that a highly clever intern brought to you, but you still have to double-check it,” Pope added to the conversation. The Head Nerd emphasises a key detail often overlooked in AI discussions – precision. MSPs need to distinguish between LLMs, machine learning, and automated processes as each has different risks and policies.</p><p>Throughout the discussion, one message stands out – the MSPs who will succeed are those who embrace cultural change, practice operational readiness, and use automation wisely.</p><p>“You do need to say I've kept your business running. Constantly, it has not gone down,” Waggoner states. In a world where cyber incidents are a matter of when, not if, resilience is now an expectation, not just an added service.</p><p><a href="https://em360tech.com/podcasts/edr-xdr-mdr-real-difference-why-it-matters" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: EDR, XDR, or MDR — What’s the Real Difference and Why Does It Matter?</em></strong></a></p><h3><strong>Takeaways</strong></h3><ul><li>Cyber resilience is about keeping businesses running during attacks.</li><li>MSPs must shift from reactive to proactive security measures.</li><li>Compliance is becoming increasingly important for all businesses.</li><li>Operational and cultural changes are essential for resilience.</li><li>Automation and AI can enhance security but require human oversight.</li><li>MSPs should conduct tabletop exercises to prepare for attacks.</li><li>Building partnerships can help MSPs enhance their services.</li><li>Resilience planning should be an ongoing process, not a one-time effort.</li><li>Understanding client operations is crucial for effective security.</li><li>Urgency in response is key to managing cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cyber Resilience</li><li>02:47 Defining True Cyber Resilience</li><li>05:52 The Role of MSPs in Cyber Resilience</li><li>09:04 Compliance and Its Growing Importance</li><li>12:04 Operational and Cultural Changes for Resilience</li><li>14:59 The Impact of Automation and AI</li><li>18:06 Turning Compliance into Resilience Programs</li><li>20:58 Advice for Building Cyber Resilient Businesses</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">63c3cbc9-f8da-46c7-944a-af79334f39a5</guid><itunes:image href="https://artwork.captivate.fm/302b48d7-3d40-4cfd-b923-b2d2a4f074c5/n-able-msp-respond-with-urgency-not-panic-podcast.png"/><pubDate>Mon, 15 Dec 2025 14:43:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/63c3cbc9-f8da-46c7-944a-af79334f39a5.mp3" length="72715717" type="audio/mpeg"/><itunes:duration>30:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Can MSPs Move From Defense to Full Cyber Resilience?"><podcast:source uri="https://youtu.be/eupaYt-hBzU"/></podcast:alternateEnclosure></item><item><title>What If We Could Fix Vulnerabilities Faster Than We Find Them?</title><itunes:title>What If We Could Fix Vulnerabilities Faster Than We Find Them?</itunes:title><description><![CDATA[<p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon, Chief Research Analyst at IT-Harvest</strong></a>, sat down with&nbsp;<a href="https://www.linkedin.com/in/john-amaral-a359241/" rel="noopener noreferrer" target="_blank"><strong>John Amaral, Co-Founder and CTO</strong></a>&nbsp;of&nbsp;<a href="https://www.root.io/" rel="noopener noreferrer" target="_blank"><strong>Root</strong></a>. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management.&nbsp;</p><p>Amaral, who has decades of experience in security leadership, argues for moving beyond the industry’s traditional “shift left” concept. He believes organisations should focus on systems that prioritise scale, speed, and effective fixes.</p><h2>Why Shift Left Failed</h2><p>Amaral says the “shift left” promise never came true. Even with positive intentions, sending vulnerability lists back to developers created overloaded backlogs and slow remediation times, resulting in frustration for everyone involved.</p><p>Engineers are experts in their application code, but not in the vast and complex open-source libraries their software relies on. When security scanners present hundreds of CVEs, “roadmap wins out over security,” Amaral explains. Often, maintainers only patch newer versions, leaving production teams stuck with outdated releases and no safe upgrade options.</p><p><a href="https://em360tech.com/tech-articles/what-devsecops-and-why-it-matters" rel="noopener noreferrer" target="_blank"><strong><em>Read: What is DevSecOps? and Why It Matters</em></strong></a></p><p><strong>Shift Out&nbsp;</strong>is Root’s solution to this flawed workflow. Instead of adding to developers' workloads, organisations can assign the entire fix process—including patch creation, testing, and delivery—to an automated system led by domain experts.&nbsp;</p><p>“Don’t give it to developers, give it to us,” The Root co-founder states. “We’ll take it.”</p><h2>A New Standard for Open-Source Maintenance</h2><p>When discussing the idea of an external system modifying customer code, Amaral clarifies that Root doesn’t alter first-party code. Instead, they fix the&nbsp;<a href="https://em360tech.com/tech-articles/open-source-ai-vs-proprietary-models" rel="noopener noreferrer" target="_blank"><strong>open-source libraries</strong></a>&nbsp;that customers use—libraries that are already out of their control.</p><p>Amaral points out that the current industry practice of blindly upgrading to new maintainer versions is much riskier. With the rise of supply-chain attacks, and maintainers often unable to apply fixes to older versions, companies increasingly face a troubling maintenance gap.</p><p>To build trust and transparency, Root publicly shares all of its backported patches in a GitHub repository. This allows maintainers, independent developers, and the broader open-source community to examine, use, or build upon Root’s work. “If people want to use them, they can,” Amaral states. “It’s our responsibility to make that available.”</p><p>Amaral’s message for technology leaders is that as AI changes the software landscape, organisations should adopt a&nbsp;<strong>remediation-first mindset</strong>. They should begin development with secure, pre-fixed libraries instead of rushing to address CVEs later. With&nbsp;<a href="https://em360tech.com/tech-articles/how-leverage-aiops-enterprise-management" rel="noopener noreferrer" target="_blank"><strong>AI-driven remediation</strong></a>&nbsp;now feasible at scale, maintaining secure software should become a standard practice, not an urgent afterthought.</p><h3>Takeaways</h3><ul><li>AI is revolutionising vulnerability management.</li><li>Shift Out is a new approach to security.</li><li>Automation can alleviate the burden on developers.</li><li>Trust is essential for adopting new security solutions.</li><li>Open source maintenance is crucial for security.</li><li>Backported patches benefit the wider community.</li><li>Traditional methods of vulnerability management are becoming obsolete.</li><li>Organisations need to start with secure libraries.</li><li>AI can provide scalable security solutions.</li><li>The future of security lies in automation and AI.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to AI in Vulnerability Management</li><li>03:06 The Shift Out Mindset</li><li>05:51 Make vs. Buy: The Agent Dilemma</li><li>09:02 Building Trust with Customers</li><li>11:54 Open Source and Backported Patches</li><li>14:59 The Future of Vulnerability Management</li></ul><br/><h2>About Root</h2><p>Root eradicates the CVE grind by delivering open source software that is free of known vulnerabilities, secure by default, and ready to use without additional engineering effort. Powered by thousands of specialised AI agents, Root continuously detects, patches, tests, and ships fixed components across any tech stack in minutes—with full transparency, no forced upgrades, and no vendor-locked images.</p><p>AppSec teams get immediate remediation without waiting on developers. Engineers stay focused on building products instead of managing patches. And organisations dramatically reduce exposure windows by moving security at AI speed. Root is building the backbone of the agentic software supply chain, where open source is secure from day one.</p>]]></description><content:encoded><![CDATA[<p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon, Chief Research Analyst at IT-Harvest</strong></a>, sat down with&nbsp;<a href="https://www.linkedin.com/in/john-amaral-a359241/" rel="noopener noreferrer" target="_blank"><strong>John Amaral, Co-Founder and CTO</strong></a>&nbsp;of&nbsp;<a href="https://www.root.io/" rel="noopener noreferrer" target="_blank"><strong>Root</strong></a>. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management.&nbsp;</p><p>Amaral, who has decades of experience in security leadership, argues for moving beyond the industry’s traditional “shift left” concept. He believes organisations should focus on systems that prioritise scale, speed, and effective fixes.</p><h2>Why Shift Left Failed</h2><p>Amaral says the “shift left” promise never came true. Even with positive intentions, sending vulnerability lists back to developers created overloaded backlogs and slow remediation times, resulting in frustration for everyone involved.</p><p>Engineers are experts in their application code, but not in the vast and complex open-source libraries their software relies on. When security scanners present hundreds of CVEs, “roadmap wins out over security,” Amaral explains. Often, maintainers only patch newer versions, leaving production teams stuck with outdated releases and no safe upgrade options.</p><p><a href="https://em360tech.com/tech-articles/what-devsecops-and-why-it-matters" rel="noopener noreferrer" target="_blank"><strong><em>Read: What is DevSecOps? and Why It Matters</em></strong></a></p><p><strong>Shift Out&nbsp;</strong>is Root’s solution to this flawed workflow. Instead of adding to developers' workloads, organisations can assign the entire fix process—including patch creation, testing, and delivery—to an automated system led by domain experts.&nbsp;</p><p>“Don’t give it to developers, give it to us,” The Root co-founder states. “We’ll take it.”</p><h2>A New Standard for Open-Source Maintenance</h2><p>When discussing the idea of an external system modifying customer code, Amaral clarifies that Root doesn’t alter first-party code. Instead, they fix the&nbsp;<a href="https://em360tech.com/tech-articles/open-source-ai-vs-proprietary-models" rel="noopener noreferrer" target="_blank"><strong>open-source libraries</strong></a>&nbsp;that customers use—libraries that are already out of their control.</p><p>Amaral points out that the current industry practice of blindly upgrading to new maintainer versions is much riskier. With the rise of supply-chain attacks, and maintainers often unable to apply fixes to older versions, companies increasingly face a troubling maintenance gap.</p><p>To build trust and transparency, Root publicly shares all of its backported patches in a GitHub repository. This allows maintainers, independent developers, and the broader open-source community to examine, use, or build upon Root’s work. “If people want to use them, they can,” Amaral states. “It’s our responsibility to make that available.”</p><p>Amaral’s message for technology leaders is that as AI changes the software landscape, organisations should adopt a&nbsp;<strong>remediation-first mindset</strong>. They should begin development with secure, pre-fixed libraries instead of rushing to address CVEs later. With&nbsp;<a href="https://em360tech.com/tech-articles/how-leverage-aiops-enterprise-management" rel="noopener noreferrer" target="_blank"><strong>AI-driven remediation</strong></a>&nbsp;now feasible at scale, maintaining secure software should become a standard practice, not an urgent afterthought.</p><h3>Takeaways</h3><ul><li>AI is revolutionising vulnerability management.</li><li>Shift Out is a new approach to security.</li><li>Automation can alleviate the burden on developers.</li><li>Trust is essential for adopting new security solutions.</li><li>Open source maintenance is crucial for security.</li><li>Backported patches benefit the wider community.</li><li>Traditional methods of vulnerability management are becoming obsolete.</li><li>Organisations need to start with secure libraries.</li><li>AI can provide scalable security solutions.</li><li>The future of security lies in automation and AI.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to AI in Vulnerability Management</li><li>03:06 The Shift Out Mindset</li><li>05:51 Make vs. Buy: The Agent Dilemma</li><li>09:02 Building Trust with Customers</li><li>11:54 Open Source and Backported Patches</li><li>14:59 The Future of Vulnerability Management</li></ul><br/><h2>About Root</h2><p>Root eradicates the CVE grind by delivering open source software that is free of known vulnerabilities, secure by default, and ready to use without additional engineering effort. Powered by thousands of specialised AI agents, Root continuously detects, patches, tests, and ships fixed components across any tech stack in minutes—with full transparency, no forced upgrades, and no vendor-locked images.</p><p>AppSec teams get immediate remediation without waiting on developers. Engineers stay focused on building products instead of managing patches. And organisations dramatically reduce exposure windows by moving security at AI speed. Root is building the backbone of the agentic software supply chain, where open source is secure from day one.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c044ecd7-7e63-459f-b766-b9f82b844815</guid><itunes:image href="https://artwork.captivate.fm/239dca95-a4e8-48ed-8821-ca21001e525f/126-Shift-out-overcomes-the-failures-of-shift-left-by-building-.jpg"/><pubDate>Mon, 15 Dec 2025 14:34:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c044ecd7-7e63-459f-b766-b9f82b844815.mp3" length="50127733" type="audio/mpeg"/><itunes:duration>20:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="What If We Could Fix Vulnerabilities Faster Than We Find Them?"><podcast:source uri="https://youtu.be/Upgw7kNJwQw"/></podcast:alternateEnclosure></item><item><title>Can Identity Security Close the AI Governance Gap?</title><itunes:title>Can Identity Security Close the AI Governance Gap?</itunes:title><description><![CDATA[<p>As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging.&nbsp;</p><p>In this episode of the Security Strategist Podcast, IT-Harvest Chief Research Analyst <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a> sits down with <a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">Art Gilliland</a>, CEO of <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea</a>, to discuss the explosive adoption of AI, the rise of shadow AI, and why identity-centric governance is becoming an urgent priority. Gilliland emphasises the importance of managing AI risks, particularly with machine identities, and the need for intelligent authorization systems to enhance security operations.&nbsp;</p><p>When Gilliland joined Delinea, he believed in focusing on identity, along with policies that govern it. “In the cloud, you share responsibility. In SaaS, you delegate. But you always own your users—human or machine—and your data.”</p><h2><strong>AI Reduced Inbound Call Volume by 60%</strong></h2><p>Delinea has been integrating AI internally for years. One of the most transformative outcomes was the launch of Delinea Expert, an AI assistant built directly into the product interface.&nbsp;Users can upload screenshots, logs, or questions and receive precise guidance on how to fix or configure the product. It acts, Gilliland says, like a support person on your shoulder.</p><p>“We shipped it about a year ago, and it reduced our inbound call volume by 60%.”</p><p>This dramatic result mirrors what Gilliland sees across customers: rapid adoption, often through quick toy implementations that still deliver massive value.</p><h2><strong>AI Prompts Wider Exposure Surface</strong></h2><p>But with the rapid adoption of AI comes a wider exposure surface. Business teams are driving AI, CEOs are demanding it, and developers are already using it. However, Gilliland believes security is still trying to catch up—again.</p><p>“There's this huge gap between the consumption and use of AI and a company’s ability to get in front of it.”</p><p>This gap is what many call shadow AI. Unlike historical shadow IT, this version is often approved—business leaders want it. But they lack visibility, policy, or governance structures to ensure it’s secure.&nbsp;Delinea’s recent survey found that “95 per cent of customers are already using or planning to use AI,” spotlights Gilliland, while just “40 per cent have any governance in place.”</p><p>Gilliland warns that the dynamic resembles earlier waves—laptops, mobile, Wi-Fi, cloud—but has accelerated dramatically. “It’s inevitably going to be used because it’s so powerful. You can’t hold it back—and you wouldn’t want to.”</p><h2>Use AI to Manage AI</h2><p>This is the future: using AI to manage AI. “AI behaves differently than traditional machine identities. It can make decisions. It has intent.” Because machine-to-machine connections now operate quickly and with shifting intent, organisations need systems capable of evaluating every single request in real time.</p><p>Traditional machine identities are predictable—like a robot performing the same task endlessly. Attacks happened when credentials were stolen and misused by humans with intent, as in the Salesforce/Drift breach.</p><p>“AI is going to have a machine connection, which tends to be overprivileged. But it can also make decisions on its own.”</p><p>Companies must not only build governance, inventory systems, and manage credentials—they must evolve toward understanding intent.</p><p>“AI is not static. There’s intent behind the connection. Your controls must be able to interpret that intent. That’s where AI is taking us,” Delinea CEO tells Stiennon.</p><h2><strong>Takeaways</strong></h2><ul><li>AI is a hot topic in cybersecurity today.</li><li>There is a significant gap between AI adoption and governance.</li><li>Shadow AI is becoming prevalent in organisations.</li><li>Companies need to establish a governance structure for AI.</li><li>AI-driven tools can enhance security operations.</li><li>Zero standing privileges are essential for security.</li><li>Organisations must manage machine identities effectively.</li><li>Intelligent authorisation can reduce security risks.</li><li>Understanding intent in AI interactions is crucial.</li><li>A crawl, walk, run approach is recommended for AI governance.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI in Identity Security</li><li>03:19 Governance Gaps in AI Usage</li><li>07:09 The Rise of Shadow AI</li><li>11:19 Managing AI Risks and Machine Identities</li><li>16:11 Intelligent Authorisation and Security Operations</li><li>20:27 Final Thoughts on AI Governance</li></ul><br/><h2><strong>About Delinea&nbsp;</strong></h2><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea</a> is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading cloud-native Identity Security Platform applies context throughout the entire identity lifecycle – across cloud and traditional infrastructure, data, SaaS applications, and AI. It is the only platform that enables you to discover all identities – including workforce, IT administrator, developers, and machines – assign appropriate access levels, detect irregularities, and respond to threats in real-time. With deployment in weeks, not months, 90% fewer resources to manage than the nearest competitor, and a 99.995% uptime, Delinea delivers robust security and operational efficiency without compromise. Learn more about Delinea on&nbsp;<a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea.com</a>,&nbsp;<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">LinkedIn</a>,&nbsp;<a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">X</a>, and&nbsp;<a href="https://www.youtube.com/@Delinea" rel="noopener noreferrer" target="_blank">YouTube</a>.</p>]]></description><content:encoded><![CDATA[<p>As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging.&nbsp;</p><p>In this episode of the Security Strategist Podcast, IT-Harvest Chief Research Analyst <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a> sits down with <a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">Art Gilliland</a>, CEO of <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea</a>, to discuss the explosive adoption of AI, the rise of shadow AI, and why identity-centric governance is becoming an urgent priority. Gilliland emphasises the importance of managing AI risks, particularly with machine identities, and the need for intelligent authorization systems to enhance security operations.&nbsp;</p><p>When Gilliland joined Delinea, he believed in focusing on identity, along with policies that govern it. “In the cloud, you share responsibility. In SaaS, you delegate. But you always own your users—human or machine—and your data.”</p><h2><strong>AI Reduced Inbound Call Volume by 60%</strong></h2><p>Delinea has been integrating AI internally for years. One of the most transformative outcomes was the launch of Delinea Expert, an AI assistant built directly into the product interface.&nbsp;Users can upload screenshots, logs, or questions and receive precise guidance on how to fix or configure the product. It acts, Gilliland says, like a support person on your shoulder.</p><p>“We shipped it about a year ago, and it reduced our inbound call volume by 60%.”</p><p>This dramatic result mirrors what Gilliland sees across customers: rapid adoption, often through quick toy implementations that still deliver massive value.</p><h2><strong>AI Prompts Wider Exposure Surface</strong></h2><p>But with the rapid adoption of AI comes a wider exposure surface. Business teams are driving AI, CEOs are demanding it, and developers are already using it. However, Gilliland believes security is still trying to catch up—again.</p><p>“There's this huge gap between the consumption and use of AI and a company’s ability to get in front of it.”</p><p>This gap is what many call shadow AI. Unlike historical shadow IT, this version is often approved—business leaders want it. But they lack visibility, policy, or governance structures to ensure it’s secure.&nbsp;Delinea’s recent survey found that “95 per cent of customers are already using or planning to use AI,” spotlights Gilliland, while just “40 per cent have any governance in place.”</p><p>Gilliland warns that the dynamic resembles earlier waves—laptops, mobile, Wi-Fi, cloud—but has accelerated dramatically. “It’s inevitably going to be used because it’s so powerful. You can’t hold it back—and you wouldn’t want to.”</p><h2>Use AI to Manage AI</h2><p>This is the future: using AI to manage AI. “AI behaves differently than traditional machine identities. It can make decisions. It has intent.” Because machine-to-machine connections now operate quickly and with shifting intent, organisations need systems capable of evaluating every single request in real time.</p><p>Traditional machine identities are predictable—like a robot performing the same task endlessly. Attacks happened when credentials were stolen and misused by humans with intent, as in the Salesforce/Drift breach.</p><p>“AI is going to have a machine connection, which tends to be overprivileged. But it can also make decisions on its own.”</p><p>Companies must not only build governance, inventory systems, and manage credentials—they must evolve toward understanding intent.</p><p>“AI is not static. There’s intent behind the connection. Your controls must be able to interpret that intent. That’s where AI is taking us,” Delinea CEO tells Stiennon.</p><h2><strong>Takeaways</strong></h2><ul><li>AI is a hot topic in cybersecurity today.</li><li>There is a significant gap between AI adoption and governance.</li><li>Shadow AI is becoming prevalent in organisations.</li><li>Companies need to establish a governance structure for AI.</li><li>AI-driven tools can enhance security operations.</li><li>Zero standing privileges are essential for security.</li><li>Organisations must manage machine identities effectively.</li><li>Intelligent authorisation can reduce security risks.</li><li>Understanding intent in AI interactions is crucial.</li><li>A crawl, walk, run approach is recommended for AI governance.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI in Identity Security</li><li>03:19 Governance Gaps in AI Usage</li><li>07:09 The Rise of Shadow AI</li><li>11:19 Managing AI Risks and Machine Identities</li><li>16:11 Intelligent Authorisation and Security Operations</li><li>20:27 Final Thoughts on AI Governance</li></ul><br/><h2><strong>About Delinea&nbsp;</strong></h2><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea</a> is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading cloud-native Identity Security Platform applies context throughout the entire identity lifecycle – across cloud and traditional infrastructure, data, SaaS applications, and AI. It is the only platform that enables you to discover all identities – including workforce, IT administrator, developers, and machines – assign appropriate access levels, detect irregularities, and respond to threats in real-time. With deployment in weeks, not months, 90% fewer resources to manage than the nearest competitor, and a 99.995% uptime, Delinea delivers robust security and operational efficiency without compromise. Learn more about Delinea on&nbsp;<a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea.com</a>,&nbsp;<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">LinkedIn</a>,&nbsp;<a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">X</a>, and&nbsp;<a href="https://www.youtube.com/@Delinea" rel="noopener noreferrer" target="_blank">YouTube</a>.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">510047a0-a52a-4215-93c5-4ee8a9c2ab12</guid><itunes:image href="https://artwork.captivate.fm/f094f091-1cdb-493c-972f-8885197e202d/114-There-s-a-huge-gap-between-the-consumption-and-use-of-AI-an.jpg"/><pubDate>Wed, 10 Dec 2025 15:59:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/510047a0-a52a-4215-93c5-4ee8a9c2ab12.mp3" length="51501637" type="audio/mpeg"/><itunes:duration>21:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode><podcast:season>1</podcast:season></item><item><title>EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?</title><itunes:title>EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?</itunes:title><description><![CDATA[<p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Jim Waggoner, VP of Product Strategy at&nbsp;<a href="https://em360tech.com/solution-providers/n-able" rel="noopener noreferrer" target="_blank"><strong>N-able</strong></a>, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting better at spotting threats, most still struggle to respond to them in real time.</p><p>“We live in a time where the threat landscape is changing instantly,” Steffen said. With threat actors speeding up their tactics, Waggoner and Ferla insist that the only way forward is constant reassessment.</p><h2><strong>When the ‘Response Action’ Doesn’t Deliver</strong></h2><p>Steffen began by asking the IT leaders about a key challenge faced by many CISOs. He says that the industry often talks about “EDR, MDR, XDR,” yet the promise of real-time response frequently remains unfulfilled.</p><p>Ferla identified a major problem here: the wrong people are making purchasing decisions. “In the small to mid market, I often see decision-makers who aren’t security experts, and they’re the ones driving the purchasing,” he explained. These executives “trust that the product works as they want, but they don’t know what they really need in the field,” which leads organizations to buy advanced tools they cannot actually use.</p><p><br></p><p>Even more troubling, Ferla noted that many customers request capabilities that no MDR could or should handle. “I have people at N-able coming to me thinking that we can manage backups as a response. And that's simply not possible.”</p><p><br></p><p>Waggoner, who spent years developing&nbsp;<a href="https://em360tech.com/top-10/top-10-incident-response-vendors-2022" rel="noopener noreferrer" target="_blank"><strong>incident response tools</strong></a>, sees another side of the issue. Vendors often downplay the “response” aspect. “When it came to the R,” he said, “it was a little R.” True MDR has to go well beyond automated blocking. “Can we disable accounts? Can we prevent ransomware from affecting other systems or stop lateral movement?”</p><p><br></p><p><a href="https://em360tech.com/whitepapers/n-able-annual-threat-report-2025" rel="noopener noreferrer" target="_blank"><strong><em>Also Read: N-able Annual Threat Report 2025</em></strong></a></p><h2><strong>Where AI and Cybersecurity Go Next</strong></h2><p>When asked about the future of detection and response, Ferla shed light on the increasing complexity. He remembered running an MSP alone just a few years ago. “Nowadays, I could not come anywhere near close to doing this,” he said. “It's impossible.”</p><p><br></p><p>Waggoner stated that AI will shape the next phase—not just for attackers, but also for defenders who face ongoing staffing shortages. Threat actors are already using AI to change tactics and automate reconnaissance. Defenders need to keep up: “Look at companies like us, using AI for detection models and for responses to address the people shortage.”</p><p><br></p><p>Waggoner encouraged IT decision-makers to find ways AI can strengthen their security, not make it more complicated. “Get ahead of it. See how you can truly use AI's capabilities to better protect yourself,” he stated.</p><h3><strong>Takeaways</strong></h3><ul><li>Detection and response tools are evolving rapidly.</li><li>Organizations often have unrealistic expectations of their security capabilities.</li><li>Continuous review of security strategies is essential.</li><li>MSPs play a crucial role in enhancing security for small to mid-sized businesses.</li><li>Proactive measures are necessary to stay ahead of threats.</li><li>AI is transforming the cybersecurity landscape.</li><li>Maturity in security means recognizing gaps and seeking help.</li><li>Implementing effective detection requires visibility across all systems.</li><li>The threat landscape is constantly changing, requiring adaptive strategies.</li><li>Basic security practices must be done well to mitigate risks.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cybersecurity Strategies</li><li>02:54 Understanding Detection and Response Tools</li><li>05:52 The Gap Between Expectation and Reality</li><li>09:06 The Importance of Continuous Strategy Review</li><li>12:11 The Role of Managed Service Providers (MSPs)</li><li>15:09 Implementing Effective Detection and Response</li><li>17:52 Future Trends in Cybersecurity</li><li>20:47 Final Thoughts and Key Takeaways</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Jim Waggoner, VP of Product Strategy at&nbsp;<a href="https://em360tech.com/solution-providers/n-able" rel="noopener noreferrer" target="_blank"><strong>N-able</strong></a>, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting better at spotting threats, most still struggle to respond to them in real time.</p><p>“We live in a time where the threat landscape is changing instantly,” Steffen said. With threat actors speeding up their tactics, Waggoner and Ferla insist that the only way forward is constant reassessment.</p><h2><strong>When the ‘Response Action’ Doesn’t Deliver</strong></h2><p>Steffen began by asking the IT leaders about a key challenge faced by many CISOs. He says that the industry often talks about “EDR, MDR, XDR,” yet the promise of real-time response frequently remains unfulfilled.</p><p>Ferla identified a major problem here: the wrong people are making purchasing decisions. “In the small to mid market, I often see decision-makers who aren’t security experts, and they’re the ones driving the purchasing,” he explained. These executives “trust that the product works as they want, but they don’t know what they really need in the field,” which leads organizations to buy advanced tools they cannot actually use.</p><p><br></p><p>Even more troubling, Ferla noted that many customers request capabilities that no MDR could or should handle. “I have people at N-able coming to me thinking that we can manage backups as a response. And that's simply not possible.”</p><p><br></p><p>Waggoner, who spent years developing&nbsp;<a href="https://em360tech.com/top-10/top-10-incident-response-vendors-2022" rel="noopener noreferrer" target="_blank"><strong>incident response tools</strong></a>, sees another side of the issue. Vendors often downplay the “response” aspect. “When it came to the R,” he said, “it was a little R.” True MDR has to go well beyond automated blocking. “Can we disable accounts? Can we prevent ransomware from affecting other systems or stop lateral movement?”</p><p><br></p><p><a href="https://em360tech.com/whitepapers/n-able-annual-threat-report-2025" rel="noopener noreferrer" target="_blank"><strong><em>Also Read: N-able Annual Threat Report 2025</em></strong></a></p><h2><strong>Where AI and Cybersecurity Go Next</strong></h2><p>When asked about the future of detection and response, Ferla shed light on the increasing complexity. He remembered running an MSP alone just a few years ago. “Nowadays, I could not come anywhere near close to doing this,” he said. “It's impossible.”</p><p><br></p><p>Waggoner stated that AI will shape the next phase—not just for attackers, but also for defenders who face ongoing staffing shortages. Threat actors are already using AI to change tactics and automate reconnaissance. Defenders need to keep up: “Look at companies like us, using AI for detection models and for responses to address the people shortage.”</p><p><br></p><p>Waggoner encouraged IT decision-makers to find ways AI can strengthen their security, not make it more complicated. “Get ahead of it. See how you can truly use AI's capabilities to better protect yourself,” he stated.</p><h3><strong>Takeaways</strong></h3><ul><li>Detection and response tools are evolving rapidly.</li><li>Organizations often have unrealistic expectations of their security capabilities.</li><li>Continuous review of security strategies is essential.</li><li>MSPs play a crucial role in enhancing security for small to mid-sized businesses.</li><li>Proactive measures are necessary to stay ahead of threats.</li><li>AI is transforming the cybersecurity landscape.</li><li>Maturity in security means recognizing gaps and seeking help.</li><li>Implementing effective detection requires visibility across all systems.</li><li>The threat landscape is constantly changing, requiring adaptive strategies.</li><li>Basic security practices must be done well to mitigate risks.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cybersecurity Strategies</li><li>02:54 Understanding Detection and Response Tools</li><li>05:52 The Gap Between Expectation and Reality</li><li>09:06 The Importance of Continuous Strategy Review</li><li>12:11 The Role of Managed Service Providers (MSPs)</li><li>15:09 Implementing Effective Detection and Response</li><li>17:52 Future Trends in Cybersecurity</li><li>20:47 Final Thoughts and Key Takeaways</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8d8d50d6-3245-4538-abff-b489fcbe2f17</guid><itunes:image href="https://artwork.captivate.fm/27cc39f8-5920-470b-b8fd-7d03ae122bf7/115-Shift-from-reactive-to-truly-proactive-moving-beyond-day-to.jpg"/><pubDate>Mon, 08 Dec 2025 15:09:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/8d8d50d6-3245-4538-abff-b489fcbe2f17.mp3" length="71627868" type="audio/mpeg"/><itunes:duration>29:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?"><podcast:source uri="https://youtu.be/EFbDifUvaow"/></podcast:alternateEnclosure></item><item><title>Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM</title><itunes:title>Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM</itunes:title><description><![CDATA[<p>Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>,&nbsp;<a href="https://www.linkedin.com/in/asyed/" rel="noopener noreferrer" target="_blank">Syed Ali</a>, Chief Executive Officer of&nbsp;<a href="https://ezo.io/" rel="noopener noreferrer" target="_blank">EZO</a>, joins host&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>&nbsp;to discuss how IT asset management (ITAM) and deterministic automation provide the visibility and control organizations need to secure their digital landscapes.</p><p>“There are risks lying around in the organization,” Ali explains. “A good ITAM solution helps identify them and forms the foundation for maturing IT operations.” His insights are drawn from years of experience as both an IT practitioner and entrepreneur, offering practical lessons for IT leaders and security professionals alike.</p><h2>Strengthening Cybersecurity and Risk Management with ITAM</h2><p>Effective&nbsp;<a href="https://ezo.io/resources/" rel="noopener noreferrer" target="_blank">ITAM solutions</a>&nbsp;are more than just inventory tools; they are central to reducing cybersecurity risk. By automating asset discovery, monitoring, and reporting, organizations gain accurate, up-to-date visibility into every device, software, and identity across their networks.</p><p>“Automation runs in IT; it has always run in IT,” Ali notes. Deterministic automation ensures processes are consistent and predictable, allowing IT teams to spot vulnerabilities, reduce the likelihood of human error, and respond quickly to emerging threats. This approach also makes data reliable for decision-making, supporting procurement, patch management, and risk mitigation strategies.</p><p>Unmanaged assets, he warns, can “come back to bite us,” particularly when organizations lack visibility into endpoints, applications, and shadow identities. Implementing ITAM proactively rather than reactively is crucial for organizations that want to minimize risk rather than simply meet compliance requirements.</p><h2>Future ITAM Trends</h2><p>Looking forward, agentic AI and identity-aware assets are shaping the future of ITAM. While AI introduces powerful capabilities, keeping it separate from deterministic automation ensures organizations maintain control while enhancing visibility and security.</p><p>Investing in effective ITAM and automation is an enduring strategy for securing assets, reducing risk, and enabling informed decision-making. As Syed explains, “The system is meant to work for you, but that only happens if there’s discipline and awareness in identifying risks. The danger of not having a solid item in place is very real. I also understand that an understaffed IT team, constantly reacting to issues, can’t always prioritise these risks effectively. Unfortunately, that’s the reality we’re dealing with.”</p><p>To learn more about effective ITAM solutions, visit&nbsp;<a href="https://ezo.io/assetsonar/" rel="noopener noreferrer" target="_blank">EZO</a>.</p><p>For more insights follow EZO:</p><ul><li>X:&nbsp;<a href="https://x.com/ezosolutions" rel="noopener noreferrer" target="_blank">@ezosolutions</a></li><li>Instagram:&nbsp;<a href="https://www.instagram.com/ezo.solutions/" rel="noopener noreferrer" target="_blank">@ezo.solutions</a></li><li>Facebook:&nbsp;<a href="https://www.facebook.com/EZOsolutions/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/EZOsolutions/</a></li><li>LinkedIn:&nbsp;<a href="https://www.linkedin.com/company/ezosolutions/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/ezosolutions/</a></li></ul><br/><h2>Takeaways</h2><ul><li>IT asset management is crucial for reducing cybersecurity risks.</li><li>Automation in IT has always been a fundamental practice.</li><li>Unmanaged assets pose significant risks to organizations.</li><li>Effective ITAM solutions provide reliable data for decision-making.</li><li>Organizations often implement ITAM reactively after incidents occur.</li><li>IT departments face challenges of being understaffed and prioritizing tasks.</li><li>Organizational maturity influences readiness for advanced ITAM tools.</li><li>Future ITAM trends include identity-aware items and usage-based pricing models.</li><li>A good ITAM solution helps identify risks faster and more effectively.</li><li>CISOs should focus on managing unmanaged assets and shadow identities.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IT Asset Management and Automation</p><p>07:59 The Importance of Deterministic Control in IT Management</p><p>13:06 Cybersecurity Risks and IT Asset Visibility</p><p>15:05 Challenges in Implementing IT Asset Management</p><p>19:11 Organizational Maturity and Tooling Readiness</p><p>21:27 Future Trends in IT Asset Management</p><h2>About EZO</h2><p><a href="https://www.linkedin.com/company/ezosolutions/" rel="noopener noreferrer" target="_blank">EZO</a>&nbsp;began as EZ Web Enterprises in 2011 with a mission to build easy-to-use yet powerful cloud-based applications for organizations worldwide. Our team is passionate about delivering consistently amazing user experiences with best-in-class functionality and enterprise scalability. EZO’s products help thousands of organizations around the globe streamline operations in many key areas, including physical asset management with EZOfficeInventory, IT asset management with EZO AssetSonar, equipment maintenance management with EZO CMMS and rental business management with EZRentOut.&nbsp;</p><p>Follow EM360Tech for more insights:</p><p>Website:&nbsp;<a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">www.em360tech.com</a></p><p>X:&nbsp;<a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></p><p>LinkedIn:&nbsp;<a href="https://www.linkedin.com/company/em360/" rel="noopener noreferrer" target="_blank">EM360Tech</a></p>]]></description><content:encoded><![CDATA[<p>Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>,&nbsp;<a href="https://www.linkedin.com/in/asyed/" rel="noopener noreferrer" target="_blank">Syed Ali</a>, Chief Executive Officer of&nbsp;<a href="https://ezo.io/" rel="noopener noreferrer" target="_blank">EZO</a>, joins host&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>&nbsp;to discuss how IT asset management (ITAM) and deterministic automation provide the visibility and control organizations need to secure their digital landscapes.</p><p>“There are risks lying around in the organization,” Ali explains. “A good ITAM solution helps identify them and forms the foundation for maturing IT operations.” His insights are drawn from years of experience as both an IT practitioner and entrepreneur, offering practical lessons for IT leaders and security professionals alike.</p><h2>Strengthening Cybersecurity and Risk Management with ITAM</h2><p>Effective&nbsp;<a href="https://ezo.io/resources/" rel="noopener noreferrer" target="_blank">ITAM solutions</a>&nbsp;are more than just inventory tools; they are central to reducing cybersecurity risk. By automating asset discovery, monitoring, and reporting, organizations gain accurate, up-to-date visibility into every device, software, and identity across their networks.</p><p>“Automation runs in IT; it has always run in IT,” Ali notes. Deterministic automation ensures processes are consistent and predictable, allowing IT teams to spot vulnerabilities, reduce the likelihood of human error, and respond quickly to emerging threats. This approach also makes data reliable for decision-making, supporting procurement, patch management, and risk mitigation strategies.</p><p>Unmanaged assets, he warns, can “come back to bite us,” particularly when organizations lack visibility into endpoints, applications, and shadow identities. Implementing ITAM proactively rather than reactively is crucial for organizations that want to minimize risk rather than simply meet compliance requirements.</p><h2>Future ITAM Trends</h2><p>Looking forward, agentic AI and identity-aware assets are shaping the future of ITAM. While AI introduces powerful capabilities, keeping it separate from deterministic automation ensures organizations maintain control while enhancing visibility and security.</p><p>Investing in effective ITAM and automation is an enduring strategy for securing assets, reducing risk, and enabling informed decision-making. As Syed explains, “The system is meant to work for you, but that only happens if there’s discipline and awareness in identifying risks. The danger of not having a solid item in place is very real. I also understand that an understaffed IT team, constantly reacting to issues, can’t always prioritise these risks effectively. Unfortunately, that’s the reality we’re dealing with.”</p><p>To learn more about effective ITAM solutions, visit&nbsp;<a href="https://ezo.io/assetsonar/" rel="noopener noreferrer" target="_blank">EZO</a>.</p><p>For more insights follow EZO:</p><ul><li>X:&nbsp;<a href="https://x.com/ezosolutions" rel="noopener noreferrer" target="_blank">@ezosolutions</a></li><li>Instagram:&nbsp;<a href="https://www.instagram.com/ezo.solutions/" rel="noopener noreferrer" target="_blank">@ezo.solutions</a></li><li>Facebook:&nbsp;<a href="https://www.facebook.com/EZOsolutions/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/EZOsolutions/</a></li><li>LinkedIn:&nbsp;<a href="https://www.linkedin.com/company/ezosolutions/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/ezosolutions/</a></li></ul><br/><h2>Takeaways</h2><ul><li>IT asset management is crucial for reducing cybersecurity risks.</li><li>Automation in IT has always been a fundamental practice.</li><li>Unmanaged assets pose significant risks to organizations.</li><li>Effective ITAM solutions provide reliable data for decision-making.</li><li>Organizations often implement ITAM reactively after incidents occur.</li><li>IT departments face challenges of being understaffed and prioritizing tasks.</li><li>Organizational maturity influences readiness for advanced ITAM tools.</li><li>Future ITAM trends include identity-aware items and usage-based pricing models.</li><li>A good ITAM solution helps identify risks faster and more effectively.</li><li>CISOs should focus on managing unmanaged assets and shadow identities.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to IT Asset Management and Automation</p><p>07:59 The Importance of Deterministic Control in IT Management</p><p>13:06 Cybersecurity Risks and IT Asset Visibility</p><p>15:05 Challenges in Implementing IT Asset Management</p><p>19:11 Organizational Maturity and Tooling Readiness</p><p>21:27 Future Trends in IT Asset Management</p><h2>About EZO</h2><p><a href="https://www.linkedin.com/company/ezosolutions/" rel="noopener noreferrer" target="_blank">EZO</a>&nbsp;began as EZ Web Enterprises in 2011 with a mission to build easy-to-use yet powerful cloud-based applications for organizations worldwide. Our team is passionate about delivering consistently amazing user experiences with best-in-class functionality and enterprise scalability. EZO’s products help thousands of organizations around the globe streamline operations in many key areas, including physical asset management with EZOfficeInventory, IT asset management with EZO AssetSonar, equipment maintenance management with EZO CMMS and rental business management with EZRentOut.&nbsp;</p><p>Follow EM360Tech for more insights:</p><p>Website:&nbsp;<a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">www.em360tech.com</a></p><p>X:&nbsp;<a href="https://x.com/EM360Tech" rel="noopener noreferrer" target="_blank">@EM360Tech</a></p><p>LinkedIn:&nbsp;<a href="https://www.linkedin.com/company/em360/" rel="noopener noreferrer" target="_blank">EM360Tech</a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6ae07061-7d6e-4619-91d8-07e30078263c</guid><itunes:image href="https://artwork.captivate.fm/6ee825c9-5b53-4cc6-82da-800b676a7fcb/Untitled-design-9.png"/><pubDate>Tue, 25 Nov 2025 14:26:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/6ae07061-7d6e-4619-91d8-07e30078263c.mp3" length="52120729" type="audio/mpeg"/><itunes:duration>21:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode><podcast:season>1</podcast:season></item><item><title>How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?</title><itunes:title>How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?</itunes:title><description><![CDATA[<p>“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, <a href="https://www.ory.com/" rel="noopener noreferrer" target="_blank"><strong>Ory</strong></a>, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.”</p><p>In the latest episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Ory’s Head of Customer Engineering, Jeff Hickman, speaks to host Richard Stiennon, the Chief Research Analyst at IT-Harvest. They discuss a pressing challenge for&nbsp;<strong>businesses adopting AI</strong>: managing permissions and identity as autonomous agents start making their own decisions.</p><p>They particularly explore the implications of AI agents acting autonomously, the need for fine-grained authorization, and the importance of human oversight. The conversation also touches on the skills required for effective management of AI permissions and the key concerns for CISOs in this rapidly changing environment.</p><p>The fear that AI agents can go rogue or exceed their bounds is very real. They are not just tools anymore; instead, they can now negotiate data, trigger actions, also process payments. Without the right authorisation model, Hickman warns that organizations will encounter both security gaps and operational chaos.</p><p><a href="https://em360tech.com/podcasts/ciam-ready-web-scale-agentic-ai-identity-security-ory" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can't Secure Agentic AI</em></strong></a></p><h2><strong>Human Element Vital to Prevent AI Agent from Going Wild</strong></h2><p>Traditional&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank"><strong>IAM frameworks</strong></a>&nbsp;aren’t designed for agents that think, adapt, and scale quickly. Anticipating a major shift, Hickman says, “It’s not just about role-based access anymore. We’re moving toward relationship-based authorization—models that understand context, identity, and intent among users, agents, and systems.”</p><p>Citing Google’s Zanzibar model, the Ory lead customer engineer says that it’s a starting point for this new era. Unlike static roles, it outlines flexible, one-to-one relationships between people, tools, and AI systems. This flexibility will be crucial as organizations deploy millions of autonomous agents operating under various levels of trust.</p><p>But technology alone won’t solve the issue. Hickman stresses the importance of the human element, saying, “We need humans to define the initial set of permissions. The person who creates an agent should be able to establish the boundaries—in plain language, if possible. The AI should understand those instructions as a core part of its operating model.”</p><p>This leads to a multi-pronged identity system where humans, agents, and services all verify authorization on behalf of the user before any action takes place—ensuring accountability even when AI acts autonomously.</p><h2>The New Organisational Skill Stack for AI Security</h2><p>As AI systems grow more sophisticated, the people managing them must also evolve. Hickman outlines a three-part skill structure every organization should develop:</p><ul><li><strong>Identity and Access Architects:</strong>&nbsp;<em>To define how agents authenticate, represent and act on behalf of users, and scale securely.</em></li><li><strong>AI Behaviour Analysts:</strong>&nbsp;<em>A new role that bridges technical and business insights, understanding how LLMs make decisions and how to align that behaviour with enterprise goals.</em></li><li><strong>Business Strategists:&nbsp;</strong><em>To figure out what data and capabilities the organization is willing to expose to agents and how those choices support the company’s broader objectives.</em></li></ul><br/><p>“This is more than IAM,” Hickman tells Stiennon. “It’s about understanding how AI consumes, interprets, and acts on information. We’ll need specialists who can analyse agent behaviour much like data analysts examine purchasing trends.”</p><p>Hickman adds that, similar to cybersecurity reputation systems, directories of “known good agents” will help organizations confirm the legitimacy and trustworthiness of the AI systems they interact with.</p><p>“The future of AI security,” Hickman concludes, “isn’t just about protecting data; it’s about protecting decisions.”</p><p>Explore how Ory helps global businesses build fine-grained, scalable, and future-ready identity systems for humans and machines. Visit&nbsp;<a href="http://ory.com/" rel="noopener noreferrer" target="_blank">Ory.com</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>AI agents are increasingly autonomous and can operate outside defined boundaries.</li><li>Permissions for AI agents must evolve beyond traditional models like OAuth.</li><li>The scale of AI agents will significantly impact identity infrastructure.</li><li>Fine-grained authorization is essential for managing AI agent access.</li><li>Human oversight is crucial in ensuring AI agents operate within acceptable limits.</li><li>Organizations need to define clear guardrails for AI agent behaviour.</li><li>The role of traditional IAM professionals will change with AI integration.</li><li>Understanding AI behaviour patterns will become a necessary skill.</li><li>CISOs should prioritise the prompt identification of risks in AI security.</li><li>A new class of professionals will emerge to manage AI interactions.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI Agents and Permissions</li><li>02:47 Challenges in AI Agent Authorization</li><li>05:59 The Scale Problem of AI Agents</li><li>09:01 Fine-Grained Authorization for AI Agents</li><li>12:07 The Role of Human Oversight in AI</li><li>14:56 Evolving Responsibilities in AI Permissions</li><li>17:56 Skills Needed for Effective AI Management</li><li>20:46 Key Concerns for CISOs Regarding AI Agents</li></ul><br/>]]></description><content:encoded><![CDATA[<p>“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, <a href="https://www.ory.com/" rel="noopener noreferrer" target="_blank"><strong>Ory</strong></a>, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.”</p><p>In the latest episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Ory’s Head of Customer Engineering, Jeff Hickman, speaks to host Richard Stiennon, the Chief Research Analyst at IT-Harvest. They discuss a pressing challenge for&nbsp;<strong>businesses adopting AI</strong>: managing permissions and identity as autonomous agents start making their own decisions.</p><p>They particularly explore the implications of AI agents acting autonomously, the need for fine-grained authorization, and the importance of human oversight. The conversation also touches on the skills required for effective management of AI permissions and the key concerns for CISOs in this rapidly changing environment.</p><p>The fear that AI agents can go rogue or exceed their bounds is very real. They are not just tools anymore; instead, they can now negotiate data, trigger actions, also process payments. Without the right authorisation model, Hickman warns that organizations will encounter both security gaps and operational chaos.</p><p><a href="https://em360tech.com/podcasts/ciam-ready-web-scale-agentic-ai-identity-security-ory" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can't Secure Agentic AI</em></strong></a></p><h2><strong>Human Element Vital to Prevent AI Agent from Going Wild</strong></h2><p>Traditional&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank"><strong>IAM frameworks</strong></a>&nbsp;aren’t designed for agents that think, adapt, and scale quickly. Anticipating a major shift, Hickman says, “It’s not just about role-based access anymore. We’re moving toward relationship-based authorization—models that understand context, identity, and intent among users, agents, and systems.”</p><p>Citing Google’s Zanzibar model, the Ory lead customer engineer says that it’s a starting point for this new era. Unlike static roles, it outlines flexible, one-to-one relationships between people, tools, and AI systems. This flexibility will be crucial as organizations deploy millions of autonomous agents operating under various levels of trust.</p><p>But technology alone won’t solve the issue. Hickman stresses the importance of the human element, saying, “We need humans to define the initial set of permissions. The person who creates an agent should be able to establish the boundaries—in plain language, if possible. The AI should understand those instructions as a core part of its operating model.”</p><p>This leads to a multi-pronged identity system where humans, agents, and services all verify authorization on behalf of the user before any action takes place—ensuring accountability even when AI acts autonomously.</p><h2>The New Organisational Skill Stack for AI Security</h2><p>As AI systems grow more sophisticated, the people managing them must also evolve. Hickman outlines a three-part skill structure every organization should develop:</p><ul><li><strong>Identity and Access Architects:</strong>&nbsp;<em>To define how agents authenticate, represent and act on behalf of users, and scale securely.</em></li><li><strong>AI Behaviour Analysts:</strong>&nbsp;<em>A new role that bridges technical and business insights, understanding how LLMs make decisions and how to align that behaviour with enterprise goals.</em></li><li><strong>Business Strategists:&nbsp;</strong><em>To figure out what data and capabilities the organization is willing to expose to agents and how those choices support the company’s broader objectives.</em></li></ul><br/><p>“This is more than IAM,” Hickman tells Stiennon. “It’s about understanding how AI consumes, interprets, and acts on information. We’ll need specialists who can analyse agent behaviour much like data analysts examine purchasing trends.”</p><p>Hickman adds that, similar to cybersecurity reputation systems, directories of “known good agents” will help organizations confirm the legitimacy and trustworthiness of the AI systems they interact with.</p><p>“The future of AI security,” Hickman concludes, “isn’t just about protecting data; it’s about protecting decisions.”</p><p>Explore how Ory helps global businesses build fine-grained, scalable, and future-ready identity systems for humans and machines. Visit&nbsp;<a href="http://ory.com/" rel="noopener noreferrer" target="_blank">Ory.com</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>AI agents are increasingly autonomous and can operate outside defined boundaries.</li><li>Permissions for AI agents must evolve beyond traditional models like OAuth.</li><li>The scale of AI agents will significantly impact identity infrastructure.</li><li>Fine-grained authorization is essential for managing AI agent access.</li><li>Human oversight is crucial in ensuring AI agents operate within acceptable limits.</li><li>Organizations need to define clear guardrails for AI agent behaviour.</li><li>The role of traditional IAM professionals will change with AI integration.</li><li>Understanding AI behaviour patterns will become a necessary skill.</li><li>CISOs should prioritise the prompt identification of risks in AI security.</li><li>A new class of professionals will emerge to manage AI interactions.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI Agents and Permissions</li><li>02:47 Challenges in AI Agent Authorization</li><li>05:59 The Scale Problem of AI Agents</li><li>09:01 Fine-Grained Authorization for AI Agents</li><li>12:07 The Role of Human Oversight in AI</li><li>14:56 Evolving Responsibilities in AI Permissions</li><li>17:56 Skills Needed for Effective AI Management</li><li>20:46 Key Concerns for CISOs Regarding AI Agents</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ea65354f-b114-42ee-a858-a99687fc2a53</guid><itunes:image href="https://artwork.captivate.fm/55d1fce6-8913-4f2a-b09e-e1dcd814ee2c/111-Permissions-will-quickly-become-the-top-AI-agent-concern-pa.jpg"/><pubDate>Wed, 19 Nov 2025 11:37:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/ea65354f-b114-42ee-a858-a99687fc2a53.mp3" length="59851549" type="audio/mpeg"/><itunes:duration>24:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?"><podcast:source uri="https://youtu.be/XHbIR1LXWMA"/></podcast:alternateEnclosure></item><item><title>Is Current DLP Failing Data Security in the Age of Generative AI?</title><itunes:title>Is Current DLP Failing Data Security in the Age of Generative AI?</itunes:title><description><![CDATA[<p>With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge.&nbsp;</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, guest Gidi Cohen, CEO and Co-Founder of&nbsp;<a href="https://em360tech.com/solution-providers/bonfy-ai" rel="noopener noreferrer" target="_blank"><strong>Bonfy.AI</strong></a>, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional&nbsp;<strong>data loss prevention (DLP) systems</strong>&nbsp;fail. Cohen stressed that understanding data context is now crucial for securing AI-driven enterprises.</p><h2><strong>What Happens When “Trusted” AI Tools Become Paramount Risk</strong></h2><p>The rise of generative AI, from chatbots to embedded assistants in SaaS platforms, has created a complex web of&nbsp;<a href="https://em360tech.com/whitepapers/bonfy-adaptive-content-security-datasheet" rel="noopener noreferrer" target="_blank"><strong>data interactions</strong></a>&nbsp;that many organisations do not fully grasp. Cohen argues that this new reality has made&nbsp;<a href="https://em360tech.com/tech-articles/common-causes-data-loss-and-how-dlp-can-help" rel="noopener noreferrer" target="_blank"><strong>legacy DLP</strong></a>&nbsp;technologies completely irrelevant.</p><p>“Even before generative AI, DLP never really worked well,” he told Stiennon. “It relied on static classification and outdated detection models that created noise and false positives. Now, with dynamic content generated and shared instantly — and humans often out of the loop — those tools can’t keep up.”</p><p>While “shadow AI” applications have gained much attention, Cohen believes the larger threat lies in the trusted tools organisations already use. “We’re using Microsoft 365, Google Workspace, Salesforce — all of which now embed AI models,” the Bonfy CEO explains. “They process vast amounts of sensitive data every day. Yet most companies have no control or visibility over how that data is accessed, transformed, or shared.”</p><p>This lack of visibility creates a perfect storm for data exposure. “You might use an LLM to summarise a customer meeting, which is fine,” Cohen says. “But if that summary is later shared with the wrong client or synced with another app, you’ve just leaked confidential information — and no one will even notice.”</p><p>The main issue, he adds, isn’t about whether AI vendors misuse data. “The model itself isn’t the main problem. It’s what happens afterwards — how the data and outputs move through the organisation.”</p><h2><strong>How to Create a New Model for AI-Aware Data Security</strong></h2><p>Cohen’s solution to this growing complexity is what he calls a context-driven, multichannel architecture. Such a way perceives data protection as an ecosystem rather than a single checkpoint.</p><p>“The flows are too complex for simple guardrails,” he explains. “You can’t just block uploads of credit card numbers and call it a day. You need to understand the context — who’s sharing the information, through what channel, for what purpose, and whether it’s leaving the organisation.”</p><p>Bonfy’s approach looks across multiple communication layers — from email and file sharing to APIs, AI agents, and web traffic. They create a complete view of how information moves. Cohen says it’s essential for spotting risky behaviour, whether it comes from a careless employee or an autonomous AI agent working in the background.</p><p>As organisations start using multimodal AI — incorporating text, images, audio, and video — this overall visibility becomes even more important. Browser extensions or regex-based filters, he notes, simply won’t catch everything. “An AI agent isn’t using a browser. It’s running somewhere on your network, processing sensitive data on its own. You need a system that can detect that.”</p><p>Alluding to turning points in cybersecurity, Cohen explained: “What happened with firewalls 20 years ago or endpoint protection 15 years ago is happening again with data security. We’re entering a new generation.”</p><p>“AI is moving faster than defenders. Waiting to figure it out later is not an option. The risks are growing rapidly — and the time to act is now.”</p><p>Ultimately, as AI changes how organisations create, share, and use information, traditional data security methods are struggling to keep up. The&nbsp;<a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank">Bonfy</a>&nbsp;co-founder believes the future belongs to tools that understand context — not just content — and that can protect data wherever and however AI is used.</p><h3><strong>Takeaways</strong></h3><ul><li>The rise of LLMs introduces significant new risks to data security.</li><li>Traditional DLP solutions are inadequate for modern data flows.</li><li>Shadow AI poses hidden risks that organisations often overlook.</li><li>Embedded models in SaaS applications increase data leakage risks.</li><li>Contextual understanding is crucial for effective data protection.</li><li>Organisations must adapt to the dynamic nature of data sharing.</li><li>Guardrails are essential to prevent data misuse and leaks.</li><li>Data security controls need to evolve with technological advancements.</li><li>The integrity of data can be compromised by AI hallucinations.</li><li>Trust in AI tools must be balanced with robust security measures.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cybersecurity Challenges</li><li>02:47 The Rise of LLMs and Data Risks</li><li>06:04 Shadow AI and Embedded Models</li><li>08:59 Guardrails and Data Protection Strategies</li></ul><br/><h3><strong>About&nbsp;</strong><a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank"><strong>Bonfy.AI</strong></a></h3><p>Bonfy.AI empowers enterprises to safely adopt GenAI and productivity platforms, such as Microsoft 365 and Copilot, without sacrificing security, compliance, or innovation. Legacy DLP and DSPM is increasingly inadequate against the risks of prompt injection, shadow AI, and over-permissioned access inherited by AI agents. Bonfy.AI’s solutions go beyond static detection, offering a context-driven, multi-channel data security architecture that understands not just content, but the full context of data flows within the modern enterprise.</p><p>Bonfy Adaptive Content Security™ (Bonfy ACS™) enables real-time monitoring, automated labeling, and risk-based remediation of AI-generated content across email, file sharing, cloud applications, and enterprise collaboration platforms. Deep integrations with Microsoft 365 ensure full visibility and policy enforcement in critical channels (Mail, SharePoint, Entra, Purview, and Copilot outputs) while adaptive knowledge graphs and behavioral analytics detect and prevent ten times more real-world risk scenarios with far fewer false positives.</p><p>Bonfy ensures audit-readiness and regulatory compliance for frameworks such as GDPR, HIPAA, PCI, and CCPA by blocking unauthorized AI access, labeling confidential data in real time, and providing security teams with actionable visibility across all information flows. Organizations in regulated industries, including financial services, healthcare, insurance, and technology, leverage Bonfy.AI to enable secure AI adoption, prevent costly data leaks, and achieve balanced productivity gains without introducing compliance crises or reputational risk. To learn more, visit&nbsp;<a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank">bonfy.ai</a>&nbsp;and follow us on&nbsp;<a href="https://www.linkedin.com/company/bonfy-ai" rel="noopener noreferrer" target="_blank">LinkedIn</a>.</p>]]></description><content:encoded><![CDATA[<p>With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge.&nbsp;</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, guest Gidi Cohen, CEO and Co-Founder of&nbsp;<a href="https://em360tech.com/solution-providers/bonfy-ai" rel="noopener noreferrer" target="_blank"><strong>Bonfy.AI</strong></a>, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional&nbsp;<strong>data loss prevention (DLP) systems</strong>&nbsp;fail. Cohen stressed that understanding data context is now crucial for securing AI-driven enterprises.</p><h2><strong>What Happens When “Trusted” AI Tools Become Paramount Risk</strong></h2><p>The rise of generative AI, from chatbots to embedded assistants in SaaS platforms, has created a complex web of&nbsp;<a href="https://em360tech.com/whitepapers/bonfy-adaptive-content-security-datasheet" rel="noopener noreferrer" target="_blank"><strong>data interactions</strong></a>&nbsp;that many organisations do not fully grasp. Cohen argues that this new reality has made&nbsp;<a href="https://em360tech.com/tech-articles/common-causes-data-loss-and-how-dlp-can-help" rel="noopener noreferrer" target="_blank"><strong>legacy DLP</strong></a>&nbsp;technologies completely irrelevant.</p><p>“Even before generative AI, DLP never really worked well,” he told Stiennon. “It relied on static classification and outdated detection models that created noise and false positives. Now, with dynamic content generated and shared instantly — and humans often out of the loop — those tools can’t keep up.”</p><p>While “shadow AI” applications have gained much attention, Cohen believes the larger threat lies in the trusted tools organisations already use. “We’re using Microsoft 365, Google Workspace, Salesforce — all of which now embed AI models,” the Bonfy CEO explains. “They process vast amounts of sensitive data every day. Yet most companies have no control or visibility over how that data is accessed, transformed, or shared.”</p><p>This lack of visibility creates a perfect storm for data exposure. “You might use an LLM to summarise a customer meeting, which is fine,” Cohen says. “But if that summary is later shared with the wrong client or synced with another app, you’ve just leaked confidential information — and no one will even notice.”</p><p>The main issue, he adds, isn’t about whether AI vendors misuse data. “The model itself isn’t the main problem. It’s what happens afterwards — how the data and outputs move through the organisation.”</p><h2><strong>How to Create a New Model for AI-Aware Data Security</strong></h2><p>Cohen’s solution to this growing complexity is what he calls a context-driven, multichannel architecture. Such a way perceives data protection as an ecosystem rather than a single checkpoint.</p><p>“The flows are too complex for simple guardrails,” he explains. “You can’t just block uploads of credit card numbers and call it a day. You need to understand the context — who’s sharing the information, through what channel, for what purpose, and whether it’s leaving the organisation.”</p><p>Bonfy’s approach looks across multiple communication layers — from email and file sharing to APIs, AI agents, and web traffic. They create a complete view of how information moves. Cohen says it’s essential for spotting risky behaviour, whether it comes from a careless employee or an autonomous AI agent working in the background.</p><p>As organisations start using multimodal AI — incorporating text, images, audio, and video — this overall visibility becomes even more important. Browser extensions or regex-based filters, he notes, simply won’t catch everything. “An AI agent isn’t using a browser. It’s running somewhere on your network, processing sensitive data on its own. You need a system that can detect that.”</p><p>Alluding to turning points in cybersecurity, Cohen explained: “What happened with firewalls 20 years ago or endpoint protection 15 years ago is happening again with data security. We’re entering a new generation.”</p><p>“AI is moving faster than defenders. Waiting to figure it out later is not an option. The risks are growing rapidly — and the time to act is now.”</p><p>Ultimately, as AI changes how organisations create, share, and use information, traditional data security methods are struggling to keep up. The&nbsp;<a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank">Bonfy</a>&nbsp;co-founder believes the future belongs to tools that understand context — not just content — and that can protect data wherever and however AI is used.</p><h3><strong>Takeaways</strong></h3><ul><li>The rise of LLMs introduces significant new risks to data security.</li><li>Traditional DLP solutions are inadequate for modern data flows.</li><li>Shadow AI poses hidden risks that organisations often overlook.</li><li>Embedded models in SaaS applications increase data leakage risks.</li><li>Contextual understanding is crucial for effective data protection.</li><li>Organisations must adapt to the dynamic nature of data sharing.</li><li>Guardrails are essential to prevent data misuse and leaks.</li><li>Data security controls need to evolve with technological advancements.</li><li>The integrity of data can be compromised by AI hallucinations.</li><li>Trust in AI tools must be balanced with robust security measures.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Cybersecurity Challenges</li><li>02:47 The Rise of LLMs and Data Risks</li><li>06:04 Shadow AI and Embedded Models</li><li>08:59 Guardrails and Data Protection Strategies</li></ul><br/><h3><strong>About&nbsp;</strong><a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank"><strong>Bonfy.AI</strong></a></h3><p>Bonfy.AI empowers enterprises to safely adopt GenAI and productivity platforms, such as Microsoft 365 and Copilot, without sacrificing security, compliance, or innovation. Legacy DLP and DSPM is increasingly inadequate against the risks of prompt injection, shadow AI, and over-permissioned access inherited by AI agents. Bonfy.AI’s solutions go beyond static detection, offering a context-driven, multi-channel data security architecture that understands not just content, but the full context of data flows within the modern enterprise.</p><p>Bonfy Adaptive Content Security™ (Bonfy ACS™) enables real-time monitoring, automated labeling, and risk-based remediation of AI-generated content across email, file sharing, cloud applications, and enterprise collaboration platforms. Deep integrations with Microsoft 365 ensure full visibility and policy enforcement in critical channels (Mail, SharePoint, Entra, Purview, and Copilot outputs) while adaptive knowledge graphs and behavioral analytics detect and prevent ten times more real-world risk scenarios with far fewer false positives.</p><p>Bonfy ensures audit-readiness and regulatory compliance for frameworks such as GDPR, HIPAA, PCI, and CCPA by blocking unauthorized AI access, labeling confidential data in real time, and providing security teams with actionable visibility across all information flows. Organizations in regulated industries, including financial services, healthcare, insurance, and technology, leverage Bonfy.AI to enable secure AI adoption, prevent costly data leaks, and achieve balanced productivity gains without introducing compliance crises or reputational risk. To learn more, visit&nbsp;<a href="http://bonfy.ai/" rel="noopener noreferrer" target="_blank">bonfy.ai</a>&nbsp;and follow us on&nbsp;<a href="https://www.linkedin.com/company/bonfy-ai" rel="noopener noreferrer" target="_blank">LinkedIn</a>.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">33e6bfd0-06a7-4c1e-ae4a-27ddd9c83137</guid><itunes:image href="https://artwork.captivate.fm/d31d7c69-9312-4666-9ae3-cb7c6f0389a8/bonfy-ai-podcast-dlp-data-security.png"/><pubDate>Tue, 18 Nov 2025 15:37:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/33e6bfd0-06a7-4c1e-ae4a-27ddd9c83137.mp3" length="48646297" type="audio/mpeg"/><itunes:duration>20:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is Current DLP Failing Data Security in the Age of Generative AI?"><podcast:source uri="https://youtu.be/hl_49ZrhU6U"/></podcast:alternateEnclosure></item><item><title>The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity</title><itunes:title>The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity</itunes:title><description><![CDATA[<p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care, Lead Analyst at KuppingerCole Analysts</strong></a>, speaks with<a href="http://v/" rel="noopener noreferrer" target="_blank"><strong>&nbsp;Sudhir Reddy, the Chief Technology Officer (CTO)</strong></a>&nbsp;of&nbsp;<a href="https://www.esper.io/" rel="noopener noreferrer" target="_blank"><strong>Esper</strong></a>, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively.&nbsp;</p><p>Reddy emphasises the need for intelligent friction in security measures, allowing for a balance between security and business operations. The conversation also highlights the importance of understanding user needs and building trust within security systems to ensure effective implementation of Zero Trust strategies.</p><h2><strong>How to Build Trust in a "Zero Trust" World?</strong></h2><p>“Security should be a seatbelt, not a straightjacket,” Esper CTO said, describing the nature of&nbsp;<a href="https://em360tech.com/tech-articles/what-zero-trust-architecture-zta-and-why-it-matters" rel="noopener noreferrer" target="_blank"><strong>zero trust in cybersecurity</strong></a>. For Reddy, zero trust isn’t just about “trust no one.” It’s about verifying everything while still allowing people to do their work.</p><p>“Zero Trust is really about verification,” he explains. “But the paradox is that it’s built to create trust among the people using it.” As systems, devices, and AI tools grow, security can’t just mean adding more barriers. “The number of people interacting with systems has increased a lot,” Reddy adds.&nbsp;</p><p>“But if the system doesn’t support the business, people will find a way around it.” That, he says, poses a risk where extremely rigid security could defeat its own purpose.</p><h2><strong>From “Friction” to “Intelligent Friction”</strong></h2><p>The&nbsp;<a href="https://em360tech.com/solution-providers/esper" rel="noopener noreferrer" target="_blank"><strong>Esper</strong></a>&nbsp;CTO explains Intelligent Friction designs systems that adjust security based on the situation. “You want the least friction where there is friction,” he says. “Add friction where it matters most, and make it disappear when it doesn’t.”</p><p>Alluding to an example of banking apps, Reddy explains intelligent friction as a simple login for checking balances and extra verification for large transfers. “That’s intelligent design — progressive, contextual, and trusted.”</p><p>When asked about the key message for CISOs, CEOs and IT decision-makers, he urges them to “stop measuring adherence to rules.” Instead, “start measuring where people are bypassing them — that’s where your friction is hurting the business.”</p><p>At Esper, this approach guides everything from device management to enterprise policy design: security that protects without slowing you down. Discover how Esper is redefining Zero Trust through Intelligent Friction. Learn more at Esper.io.</p><h3><strong>Takeaways</strong></h3><ul><li>Zero Trust is fundamentally about verification at every step.</li><li>The shift to Zero Trust is driven by increased exposure and sophisticated attack vectors.</li><li>Human trust is essential for Zero Trust systems to function effectively.</li><li>Intelligent friction allows for security measures that adapt to user needs.</li><li>Security should not hinder business operations; it should support them.</li><li>CISOs should measure rebellion against security rules, not just adherence.</li><li>Progressive security checks can enhance user trust in systems.</li><li>Cultural change is necessary for effective security implementation.</li><li>Feedback from users is crucial for improving security systems.</li><li>Trust should be the primary driver in designing security systems.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Zero Trust and Its Importance</li><li>02:07 Understanding Zero Trust: Verification at Every Step</li><li>03:03 The Shift to Zero Trust: Why Now?</li><li>04:34 The Trust Paradox in Zero Trust Systems</li><li>06:10 Real-World Examples of Trust Breakdown</li><li>08:15 Intelligent Friction: A Solution to the Paradox</li><li>10:48 Implementing Intelligent Friction in Retail</li><li>12:40 Measuring Security: Moving Beyond Rule Adherence</li><li>14:40 Balancing Security and Business Velocity</li><li>16:39 Actionable Insights for CISOs</li><li>18:51 Key Takeaway: Embracing Trust in Security Systems</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care, Lead Analyst at KuppingerCole Analysts</strong></a>, speaks with<a href="http://v/" rel="noopener noreferrer" target="_blank"><strong>&nbsp;Sudhir Reddy, the Chief Technology Officer (CTO)</strong></a>&nbsp;of&nbsp;<a href="https://www.esper.io/" rel="noopener noreferrer" target="_blank"><strong>Esper</strong></a>, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively.&nbsp;</p><p>Reddy emphasises the need for intelligent friction in security measures, allowing for a balance between security and business operations. The conversation also highlights the importance of understanding user needs and building trust within security systems to ensure effective implementation of Zero Trust strategies.</p><h2><strong>How to Build Trust in a "Zero Trust" World?</strong></h2><p>“Security should be a seatbelt, not a straightjacket,” Esper CTO said, describing the nature of&nbsp;<a href="https://em360tech.com/tech-articles/what-zero-trust-architecture-zta-and-why-it-matters" rel="noopener noreferrer" target="_blank"><strong>zero trust in cybersecurity</strong></a>. For Reddy, zero trust isn’t just about “trust no one.” It’s about verifying everything while still allowing people to do their work.</p><p>“Zero Trust is really about verification,” he explains. “But the paradox is that it’s built to create trust among the people using it.” As systems, devices, and AI tools grow, security can’t just mean adding more barriers. “The number of people interacting with systems has increased a lot,” Reddy adds.&nbsp;</p><p>“But if the system doesn’t support the business, people will find a way around it.” That, he says, poses a risk where extremely rigid security could defeat its own purpose.</p><h2><strong>From “Friction” to “Intelligent Friction”</strong></h2><p>The&nbsp;<a href="https://em360tech.com/solution-providers/esper" rel="noopener noreferrer" target="_blank"><strong>Esper</strong></a>&nbsp;CTO explains Intelligent Friction designs systems that adjust security based on the situation. “You want the least friction where there is friction,” he says. “Add friction where it matters most, and make it disappear when it doesn’t.”</p><p>Alluding to an example of banking apps, Reddy explains intelligent friction as a simple login for checking balances and extra verification for large transfers. “That’s intelligent design — progressive, contextual, and trusted.”</p><p>When asked about the key message for CISOs, CEOs and IT decision-makers, he urges them to “stop measuring adherence to rules.” Instead, “start measuring where people are bypassing them — that’s where your friction is hurting the business.”</p><p>At Esper, this approach guides everything from device management to enterprise policy design: security that protects without slowing you down. Discover how Esper is redefining Zero Trust through Intelligent Friction. Learn more at Esper.io.</p><h3><strong>Takeaways</strong></h3><ul><li>Zero Trust is fundamentally about verification at every step.</li><li>The shift to Zero Trust is driven by increased exposure and sophisticated attack vectors.</li><li>Human trust is essential for Zero Trust systems to function effectively.</li><li>Intelligent friction allows for security measures that adapt to user needs.</li><li>Security should not hinder business operations; it should support them.</li><li>CISOs should measure rebellion against security rules, not just adherence.</li><li>Progressive security checks can enhance user trust in systems.</li><li>Cultural change is necessary for effective security implementation.</li><li>Feedback from users is crucial for improving security systems.</li><li>Trust should be the primary driver in designing security systems.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Zero Trust and Its Importance</li><li>02:07 Understanding Zero Trust: Verification at Every Step</li><li>03:03 The Shift to Zero Trust: Why Now?</li><li>04:34 The Trust Paradox in Zero Trust Systems</li><li>06:10 Real-World Examples of Trust Breakdown</li><li>08:15 Intelligent Friction: A Solution to the Paradox</li><li>10:48 Implementing Intelligent Friction in Retail</li><li>12:40 Measuring Security: Moving Beyond Rule Adherence</li><li>14:40 Balancing Security and Business Velocity</li><li>16:39 Actionable Insights for CISOs</li><li>18:51 Key Takeaway: Embracing Trust in Security Systems</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9abf1b0c-4f59-4dc5-bc7a-672702af6314</guid><itunes:image href="https://artwork.captivate.fm/a8139395-6e93-417e-8450-e8e4268e82f0/sudhir-reddy-esper-cto-zero-trust-podcast.png"/><pubDate>Mon, 10 Nov 2025 12:42:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/9abf1b0c-4f59-4dc5-bc7a-672702af6314.mp3" length="48175453" type="audio/mpeg"/><itunes:duration>20:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity"><podcast:source uri="https://youtu.be/lol8jxjwGxQ"/></podcast:alternateEnclosure></item><item><title>Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI</title><itunes:title>Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI</itunes:title><description><![CDATA[<p><strong>Can your organization truly trust every identity, human, machine, and AI?</strong></p><p>The traditional security perimeter is no longer a reliable boundary. As enterprises adopt hybrid infrastructures, cloud services, and autonomous AI systems, identity has emerged as the central element of effective cybersecurity.</p><p>In the latest episode of&nbsp;<em>The Security Strategist Podcast</em>,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks with StrongDM’s Chief Executive Officer&nbsp;<a href="https://www.linkedin.com/in/tprendergast/" rel="noopener noreferrer" target="_blank">Tim Prendergast</a>&nbsp;about how organizations can secure human users, machines, and agentic AI through identity-based controls.</p><h2>Identity at the Center of Zero Trust</h2><p>Both Stiennon and Prendergast believe identity has become the true control plane for modern cybersecurity. While&nbsp;<a href="https://www.strongdm.com/zero-trust?redirect=aHR0cHM6Ly9kaXNjb3Zlci5zdHJvbmdkbS5jb20vemVyby10cnVzdA%3D%3D&amp;ct=SEARCH&amp;pid=21126185&amp;cid=67996656647&amp;t=emVybyB0cnVzdA%3D%3D&amp;d=discover.strongdm.com&amp;c=2&amp;c=3&amp;c=6&amp;rp=1&amp;ab=false&amp;opcid=&amp;rs=UNKNOWN&amp;hs-expires=1792827712&amp;hs-version=1&amp;hs-signature=APUk-v6YD96eZoG5mqwbX_3BNC43S1TO1g" rel="noopener noreferrer" target="_blank">Zero Trust frameworks</a>&nbsp;are widely promoted, they often remain theoretical until grounded in strong identity governance. By continuously verifying and managing every identity—human, machine, and AI—organizations can strengthen access control, reduce the risk of credential theft, and enforce clear operational boundaries across their environments.</p><p>As Prendergast explains, “No one wants to go out of business tomorrow, no matter how good their security is. You have to balance the needs of the business, the needs of your user or customer populations, and practical security.</p><h2>Securing Human Users</h2><p>For human users, particularly those with privileged access, identity management must strike a balance between security and productivity. CISOs need visibility into who is accessing critical assets, when, and under what context.&nbsp;<a href="https://www.strongdm.com/" rel="noopener noreferrer" target="_blank">StrongDM’s</a>&nbsp;approach emphasizes just-in-time access, ensuring users receive only the permissions they need, precisely when they need them.</p><h2>Implementation Considerations</h2><p>Deploying identity-based security requires a strategic, phased approach. Prendergast stresses that security measures must align with business priorities to minimize disruption. By treating users, machines, and AI agents as identities rather than simply devices or services, organizations can enforce dynamic policies, respond to threats more effectively, and maintain compliance in increasingly distributed IT environments.</p><p>StrongDM’s approach demonstrates that the future of security lies in&nbsp;<a href="http://discover.strongdm.com/blog/from-legacy-pam-to-identity-firewall?redirect=aHR0cHM6Ly9kaXNjb3Zlci5zdHJvbmdkbS5jb20vYmxvZy9mcm9tLWxlZ2FjeS1wYW0tdG8taWRlbnRpdHktZmlyZXdhbGw%3D&amp;ct=SEARCH&amp;pid=21126185&amp;cid=194417051013&amp;t=aWRlbnRpdHkgZmlyZXdhbGw%3D&amp;d=discover.strongdm.com&amp;c=2&amp;c=3&amp;c=6&amp;rp=1&amp;ab=false&amp;opcid=&amp;rs=UNKNOWN&amp;hs-expires=1792827757&amp;hs-version=1&amp;hs-signature=APUk-v6PgPV1DmpbYkzVKBRZQgM_ZQ4M0w" rel="noopener noreferrer" target="_blank">identity-first models</a>&nbsp;where humans, machines, and AI agents are governed under the same principles, ensuring that the right identities have the right access at the right time.</p><h2>Takeaways</h2><ul><li>Identity is the new control plane for security.</li><li>Zero Trust is often theoretical; real progress lies in identity-based security.</li><li>Stolen credentials are the primary attack vector.</li><li>A Renaissance in identity security is overdue.</li><li>StrongDM offers just-in-time access for identities.</li><li>Real-time interrogation of entities is crucial for security.</li><li>CISOs need better visibility and resources for identity management.</li><li>Agentic AI presents both risks and opportunities for businesses.</li><li>Implementation of identity security must be strategic and gradual.</li><li>The shift from authentication to authorization is essential for future security.</li></ul><br/><p>&nbsp;Whether you’re a CISO, security leader, or tech enthusiast, this episode shows you&nbsp;<strong>how to rethink trust in a hybrid, AI-driven world</strong>.</p><p><strong>Follow StrongDM for more insights:</strong></p><ul><li>Twitter:<a href="https://twitter.com/strongdm" rel="noopener noreferrer" target="_blank">&nbsp;@strongdm</a></li><li>LinkedIn:<a href="https://www.linkedin.com/company/strongdm" rel="noopener noreferrer" target="_blank">&nbsp;@strongdm</a></li><li>Facebook:<a href="https://www.facebook.com/strongDM" rel="noopener noreferrer" target="_blank">&nbsp;@strongDM</a></li><li>YouTube:<a href="https://www.youtube.com/channel/UCYMSnwT5uCwczfT0hrWelkQ?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">&nbsp;StrongDM Channel</a></li><li><strong>Website</strong>:&nbsp;<a href="http://www.strongdm.com/" rel="noopener noreferrer" target="_blank">www.strongdm.com</a></li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Identity-Based Security</p><p>03:08 The Role of Identity in Zero Trust</p><p>06:45 Understanding Critical Assets and Identity Approaches</p><p>09:41 Agentic AI and Its Implications</p><p>17:51 Implementation Challenges in Identity Security</p><p>21:32 Key Takeaways for CISOs</p><h1>About StrongDM</h1><p>Founded in 2015, <a href="https://www.strongdm.com/" rel="noopener noreferrer" target="_blank">StrongDM</a> helps organizations manage and audit access to databases, servers, clusters, and web applications. Trusted by technical teams worldwide, our platform is secure by design, operationally effective, and easy to use. With a 98 per cent customer retention rate, we turn customers into lifelong fans. Our mission-driven values ensure we stay true to helping organizations simplify access management while keeping security uncompromised.</p>]]></description><content:encoded><![CDATA[<p><strong>Can your organization truly trust every identity, human, machine, and AI?</strong></p><p>The traditional security perimeter is no longer a reliable boundary. As enterprises adopt hybrid infrastructures, cloud services, and autonomous AI systems, identity has emerged as the central element of effective cybersecurity.</p><p>In the latest episode of&nbsp;<em>The Security Strategist Podcast</em>,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks with StrongDM’s Chief Executive Officer&nbsp;<a href="https://www.linkedin.com/in/tprendergast/" rel="noopener noreferrer" target="_blank">Tim Prendergast</a>&nbsp;about how organizations can secure human users, machines, and agentic AI through identity-based controls.</p><h2>Identity at the Center of Zero Trust</h2><p>Both Stiennon and Prendergast believe identity has become the true control plane for modern cybersecurity. While&nbsp;<a href="https://www.strongdm.com/zero-trust?redirect=aHR0cHM6Ly9kaXNjb3Zlci5zdHJvbmdkbS5jb20vemVyby10cnVzdA%3D%3D&amp;ct=SEARCH&amp;pid=21126185&amp;cid=67996656647&amp;t=emVybyB0cnVzdA%3D%3D&amp;d=discover.strongdm.com&amp;c=2&amp;c=3&amp;c=6&amp;rp=1&amp;ab=false&amp;opcid=&amp;rs=UNKNOWN&amp;hs-expires=1792827712&amp;hs-version=1&amp;hs-signature=APUk-v6YD96eZoG5mqwbX_3BNC43S1TO1g" rel="noopener noreferrer" target="_blank">Zero Trust frameworks</a>&nbsp;are widely promoted, they often remain theoretical until grounded in strong identity governance. By continuously verifying and managing every identity—human, machine, and AI—organizations can strengthen access control, reduce the risk of credential theft, and enforce clear operational boundaries across their environments.</p><p>As Prendergast explains, “No one wants to go out of business tomorrow, no matter how good their security is. You have to balance the needs of the business, the needs of your user or customer populations, and practical security.</p><h2>Securing Human Users</h2><p>For human users, particularly those with privileged access, identity management must strike a balance between security and productivity. CISOs need visibility into who is accessing critical assets, when, and under what context.&nbsp;<a href="https://www.strongdm.com/" rel="noopener noreferrer" target="_blank">StrongDM’s</a>&nbsp;approach emphasizes just-in-time access, ensuring users receive only the permissions they need, precisely when they need them.</p><h2>Implementation Considerations</h2><p>Deploying identity-based security requires a strategic, phased approach. Prendergast stresses that security measures must align with business priorities to minimize disruption. By treating users, machines, and AI agents as identities rather than simply devices or services, organizations can enforce dynamic policies, respond to threats more effectively, and maintain compliance in increasingly distributed IT environments.</p><p>StrongDM’s approach demonstrates that the future of security lies in&nbsp;<a href="http://discover.strongdm.com/blog/from-legacy-pam-to-identity-firewall?redirect=aHR0cHM6Ly9kaXNjb3Zlci5zdHJvbmdkbS5jb20vYmxvZy9mcm9tLWxlZ2FjeS1wYW0tdG8taWRlbnRpdHktZmlyZXdhbGw%3D&amp;ct=SEARCH&amp;pid=21126185&amp;cid=194417051013&amp;t=aWRlbnRpdHkgZmlyZXdhbGw%3D&amp;d=discover.strongdm.com&amp;c=2&amp;c=3&amp;c=6&amp;rp=1&amp;ab=false&amp;opcid=&amp;rs=UNKNOWN&amp;hs-expires=1792827757&amp;hs-version=1&amp;hs-signature=APUk-v6PgPV1DmpbYkzVKBRZQgM_ZQ4M0w" rel="noopener noreferrer" target="_blank">identity-first models</a>&nbsp;where humans, machines, and AI agents are governed under the same principles, ensuring that the right identities have the right access at the right time.</p><h2>Takeaways</h2><ul><li>Identity is the new control plane for security.</li><li>Zero Trust is often theoretical; real progress lies in identity-based security.</li><li>Stolen credentials are the primary attack vector.</li><li>A Renaissance in identity security is overdue.</li><li>StrongDM offers just-in-time access for identities.</li><li>Real-time interrogation of entities is crucial for security.</li><li>CISOs need better visibility and resources for identity management.</li><li>Agentic AI presents both risks and opportunities for businesses.</li><li>Implementation of identity security must be strategic and gradual.</li><li>The shift from authentication to authorization is essential for future security.</li></ul><br/><p>&nbsp;Whether you’re a CISO, security leader, or tech enthusiast, this episode shows you&nbsp;<strong>how to rethink trust in a hybrid, AI-driven world</strong>.</p><p><strong>Follow StrongDM for more insights:</strong></p><ul><li>Twitter:<a href="https://twitter.com/strongdm" rel="noopener noreferrer" target="_blank">&nbsp;@strongdm</a></li><li>LinkedIn:<a href="https://www.linkedin.com/company/strongdm" rel="noopener noreferrer" target="_blank">&nbsp;@strongdm</a></li><li>Facebook:<a href="https://www.facebook.com/strongDM" rel="noopener noreferrer" target="_blank">&nbsp;@strongDM</a></li><li>YouTube:<a href="https://www.youtube.com/channel/UCYMSnwT5uCwczfT0hrWelkQ?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">&nbsp;StrongDM Channel</a></li><li><strong>Website</strong>:&nbsp;<a href="http://www.strongdm.com/" rel="noopener noreferrer" target="_blank">www.strongdm.com</a></li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Identity-Based Security</p><p>03:08 The Role of Identity in Zero Trust</p><p>06:45 Understanding Critical Assets and Identity Approaches</p><p>09:41 Agentic AI and Its Implications</p><p>17:51 Implementation Challenges in Identity Security</p><p>21:32 Key Takeaways for CISOs</p><h1>About StrongDM</h1><p>Founded in 2015, <a href="https://www.strongdm.com/" rel="noopener noreferrer" target="_blank">StrongDM</a> helps organizations manage and audit access to databases, servers, clusters, and web applications. Trusted by technical teams worldwide, our platform is secure by design, operationally effective, and easy to use. With a 98 per cent customer retention rate, we turn customers into lifelong fans. Our mission-driven values ensure we stay true to helping organizations simplify access management while keeping security uncompromised.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">287f3a23-3744-43a2-8566-ad1191ded7ea</guid><itunes:image href="https://artwork.captivate.fm/1898b276-58eb-44e6-bb4b-635b4e8aaf15/Untitled-design.png"/><pubDate>Fri, 07 Nov 2025 14:39:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/287f3a23-3744-43a2-8566-ad1191ded7ea.mp3" length="56335357" type="audio/mpeg"/><itunes:duration>23:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode><podcast:season>1</podcast:season></item><item><title>How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?</title><itunes:title>How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?</itunes:title><description><![CDATA[<p>In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind.&nbsp;</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon, Chief Research Analyst at IT-Harvest</strong></a>, talks with&nbsp;<a href="https://www.linkedin.com/in/stefanie-hammond/" rel="noopener noreferrer" target="_blank"><strong>Stefanie Hammond, Head Nerd at N-able</strong></a>, and&nbsp;<a href="https://www.linkedin.com/in/jim-waggoner-76408b2/" rel="noopener noreferrer" target="_blank"><strong>Jim Waggoner, Vice President of Product Management at N-able</strong></a>. They discuss how MSPs can tackle rising threats, bridge the talent gap, and maintain profitability in a quickly evolving market.</p><p>The speakers particularly explore the critical need for MSPs to adopt Managed Detection and Response (MDR) services, the importance of internal security investments, and how AI can enhance efficiency. The conversation also touches on compliance challenges and future trends in pricing strategies for MSPs, emphasising the need for continuous adaptation in a rapidly changing threat environment.</p><p>When Stiennon asked, “How quickly must an MSP change their entire model to a managed detection and response offering to stay competitive?” Hammond's answer was straightforward: “If an MSP hasn’t done that yet, I don’t know how much longer they can wait.”&nbsp;</p><p>This sets the stage for the podcast.</p><h2><strong>MDR Is No Longer Optional but Critical for MSPs</strong></h2><p>For MSPs serving clients in tightly regulated fields like finance, healthcare, government, or education,&nbsp;<a href="https://em360tech.com/tech-articles/mdr-v-traditional-security-measures" rel="noopener noreferrer" target="_blank">Managed Detection and Response (MDR)</a>&nbsp;is a necessity.</p><p>“Organisations in those sectors face a greater risk,” says Hammond. “<a href="https://em360tech.com/top-10/top-10-managed-service-providers" rel="noopener noreferrer" target="_blank">Managed Service Providers (MSPs)</a>&nbsp;need to incorporate MDR into their security offerings and make it standard for their customers to stay competitive.”</p><p>However, Hammond cautions against selling MDR as a standalone solution.“We shouldn’t sell any security tools as a separate service.” Instead, she suggests packaging MDR with other prevention, detection, and recovery options—like backup and data protection—to create a layered cybersecurity package.</p><p>Agreeing, Waggoner steps in and describes this as a natural growth process for MSPs: “It becomes a maturity lifecycle. You start by managing hardware and software, move on to daily security, and eventually cover full detection and response. If MSPs don’t want to develop that in-house, N-able can assist—we can co-manage it or handle it for them as they grow.”</p><h2><strong>MSPs for Smarter Security and AI-Backed Efficiency</strong></h2><p>The speakers also talked about howtalked how AI and automation are changing cybersecurity, not just for spotting threats but also for improving operations and driving sales. “We automatically handle 90 per cent of security alerts using AI,” expressed Waggoner.&nbsp;</p><p>“If you’re not automating, you’re falling behind,” the Vice President of Product Management at N-able added.</p><p>For Hammond, AI is equally beneficial in marketing and communication. She recommends MSPs not to manage sales and marketing on their own but to use AI to support themselves.&nbsp;</p><p>Both experts agree that compliance, identity protection, and education are essential parts of a resilient security framework. “It always comes down to identity,” Waggoner emphasises. “Use unique logins, change passwords regularly, and set up MFA—those basics prevent most attacks.”</p><p>As for the future of MSPs, Hammond envisions a shift beyond just technology.</p><p>“Don’t stick with the status quo. The market keeps evolving, and if you fail to update your pricing, services, and messaging, you’ll risk becoming obsolete within five years.”</p><p>Listen to the full episode to discover how N-able’s experts are assisting MSPs in reshaping their business models, adopting MDR, and turning security challenges into new opportunities.&nbsp;</p><p>Stream now on your favourite podcast platform or visit&nbsp;<a href="http://n-able.com/" rel="noopener noreferrer" target="_blank">n-able.com</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>MDR is essential for MSPs in regulated industries.</li><li>MSPs must adopt a proactive approach to security.</li><li>Identity management is crucial to prevent breaches.</li><li>AI can significantly improve operational efficiency.</li><li>Compliance should be viewed as a revenue opportunity.</li><li>MSPs need to evolve their pricing strategies.</li><li>Security awareness training is vital for employees.</li><li>The threat landscape is constantly changing.</li><li>MSPs should focus on value-based pricing models.</li><li>Continuous learning and adaptation are key for MSP success.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Managed Service Providers (MSPs) and Cybersecurity</li><li>05:55 The Importance of Managed Detection and Response (MDR)</li><li>12:10 Internal Security Investments for MSPs</li><li>14:55 Developing an AI Strategy for Efficiency</li><li>19:59 Navigating Compliance Challenges</li><li>25:01 Future Trends in Cybersecurity and MSP Pricing Strategies</li><li>29:01 Key Takeaways for CIOs and CTOs</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind.&nbsp;</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon, Chief Research Analyst at IT-Harvest</strong></a>, talks with&nbsp;<a href="https://www.linkedin.com/in/stefanie-hammond/" rel="noopener noreferrer" target="_blank"><strong>Stefanie Hammond, Head Nerd at N-able</strong></a>, and&nbsp;<a href="https://www.linkedin.com/in/jim-waggoner-76408b2/" rel="noopener noreferrer" target="_blank"><strong>Jim Waggoner, Vice President of Product Management at N-able</strong></a>. They discuss how MSPs can tackle rising threats, bridge the talent gap, and maintain profitability in a quickly evolving market.</p><p>The speakers particularly explore the critical need for MSPs to adopt Managed Detection and Response (MDR) services, the importance of internal security investments, and how AI can enhance efficiency. The conversation also touches on compliance challenges and future trends in pricing strategies for MSPs, emphasising the need for continuous adaptation in a rapidly changing threat environment.</p><p>When Stiennon asked, “How quickly must an MSP change their entire model to a managed detection and response offering to stay competitive?” Hammond's answer was straightforward: “If an MSP hasn’t done that yet, I don’t know how much longer they can wait.”&nbsp;</p><p>This sets the stage for the podcast.</p><h2><strong>MDR Is No Longer Optional but Critical for MSPs</strong></h2><p>For MSPs serving clients in tightly regulated fields like finance, healthcare, government, or education,&nbsp;<a href="https://em360tech.com/tech-articles/mdr-v-traditional-security-measures" rel="noopener noreferrer" target="_blank">Managed Detection and Response (MDR)</a>&nbsp;is a necessity.</p><p>“Organisations in those sectors face a greater risk,” says Hammond. “<a href="https://em360tech.com/top-10/top-10-managed-service-providers" rel="noopener noreferrer" target="_blank">Managed Service Providers (MSPs)</a>&nbsp;need to incorporate MDR into their security offerings and make it standard for their customers to stay competitive.”</p><p>However, Hammond cautions against selling MDR as a standalone solution.“We shouldn’t sell any security tools as a separate service.” Instead, she suggests packaging MDR with other prevention, detection, and recovery options—like backup and data protection—to create a layered cybersecurity package.</p><p>Agreeing, Waggoner steps in and describes this as a natural growth process for MSPs: “It becomes a maturity lifecycle. You start by managing hardware and software, move on to daily security, and eventually cover full detection and response. If MSPs don’t want to develop that in-house, N-able can assist—we can co-manage it or handle it for them as they grow.”</p><h2><strong>MSPs for Smarter Security and AI-Backed Efficiency</strong></h2><p>The speakers also talked about howtalked how AI and automation are changing cybersecurity, not just for spotting threats but also for improving operations and driving sales. “We automatically handle 90 per cent of security alerts using AI,” expressed Waggoner.&nbsp;</p><p>“If you’re not automating, you’re falling behind,” the Vice President of Product Management at N-able added.</p><p>For Hammond, AI is equally beneficial in marketing and communication. She recommends MSPs not to manage sales and marketing on their own but to use AI to support themselves.&nbsp;</p><p>Both experts agree that compliance, identity protection, and education are essential parts of a resilient security framework. “It always comes down to identity,” Waggoner emphasises. “Use unique logins, change passwords regularly, and set up MFA—those basics prevent most attacks.”</p><p>As for the future of MSPs, Hammond envisions a shift beyond just technology.</p><p>“Don’t stick with the status quo. The market keeps evolving, and if you fail to update your pricing, services, and messaging, you’ll risk becoming obsolete within five years.”</p><p>Listen to the full episode to discover how N-able’s experts are assisting MSPs in reshaping their business models, adopting MDR, and turning security challenges into new opportunities.&nbsp;</p><p>Stream now on your favourite podcast platform or visit&nbsp;<a href="http://n-able.com/" rel="noopener noreferrer" target="_blank">n-able.com</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>MDR is essential for MSPs in regulated industries.</li><li>MSPs must adopt a proactive approach to security.</li><li>Identity management is crucial to prevent breaches.</li><li>AI can significantly improve operational efficiency.</li><li>Compliance should be viewed as a revenue opportunity.</li><li>MSPs need to evolve their pricing strategies.</li><li>Security awareness training is vital for employees.</li><li>The threat landscape is constantly changing.</li><li>MSPs should focus on value-based pricing models.</li><li>Continuous learning and adaptation are key for MSP success.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to Managed Service Providers (MSPs) and Cybersecurity</li><li>05:55 The Importance of Managed Detection and Response (MDR)</li><li>12:10 Internal Security Investments for MSPs</li><li>14:55 Developing an AI Strategy for Efficiency</li><li>19:59 Navigating Compliance Challenges</li><li>25:01 Future Trends in Cybersecurity and MSP Pricing Strategies</li><li>29:01 Key Takeaways for CIOs and CTOs</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">991f3668-0155-43c8-90b1-13f90e5307d1</guid><itunes:image href="https://artwork.captivate.fm/d79fa7f1-036f-4f1a-97b7-6418581862dc/mdr-must-msp-n-able-security-podcast.png"/><pubDate>Thu, 06 Nov 2025 16:27:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/991f3668-0155-43c8-90b1-13f90e5307d1.mp3" length="68226516" type="audio/mpeg"/><itunes:duration>28:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?"><podcast:source uri="https://youtu.be/bf4dlJDrqgY"/></podcast:alternateEnclosure></item><item><title>Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security</title><itunes:title>Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security</itunes:title><description><![CDATA[<p>"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature."</p><p>According to Robert Rogenmoser, the CEO of&nbsp;<a href="https://em360tech.com/solution-providers/securosys" rel="noopener noreferrer" target="_blank">Securosys</a>, storing keys insecurely creates immediate risk. This makes it crucial to maintain strong key security. "If it's just in a software system, you can easily get hacked. If I have your encryption key, I can read your data. If I have your Bitcoin keys, I can spend your money,” says Rogenmoser.</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Robert Rogenmoser, the CEO of Securosys, about safeguarding the digital world with cryptographic keys. Rogenmoser puts up a case to rally&nbsp;<a href="https://em360tech.com/tech-articles/what-is-hardware-security-module" rel="noopener noreferrer" target="_blank">Hardware Security Modules (HSMs)</a>&nbsp;as the best solution for this critical challenge.</p><p>In addition to discussing how hardware security modules (HSMs) protect encryption keys, they also talk about the evolution of HSMs, their applications in financial services, the implications of&nbsp;<a href="https://em360tech.com/whitepapers/transitioning-to-pqc-with-securosys" rel="noopener noreferrer" target="_blank">post-quantum cryptography</a>, and the integration of AI in security practices.&nbsp;</p><h2>Are Hardware Security Modules (HSMs) the Ultimate Solution?</h2><p>The conversation stresses the importance of key management and the need for organisations to adapt to emerging technologies while ensuring data security.</p><p>In order to mitigate the cybersecurity risks, the priority is to securely store the keys, control access, and generate impenetrable keys that cannot be easily guessed by cyber criminals. HSMs are the ultimate solution to the key issue, believes Rogenmoser.&nbsp;</p><p>Firms tend to shift their data to the cloud, making it even more essential to secure keys. The main challenge arises when both the data and the keys are managed by the same cloud provider, as this setup can compromise the integrity of key control and raise concerns about data sovereignty.&nbsp;</p><p>However,&nbsp;<a href="https://em360tech.com/whitepaper/safe-and-hsm-strengthening-cloud-security" rel="noopener noreferrer" target="_blank">Securosys approaches</a>&nbsp;this challenge differently. Rogenmoser explains that organisations can keep their data encrypted in the cloud. At the same time, they keep the key somewhere else, where only they have control over it.</p><h2>Multi-Authorisation System for High-Stakes Transactions</h2><p>Rogenmoser pointed out the company's patented system for multi-authorisation of Bitcoin keys. This system is essential because blockchain transactions are high-stakes and irreversible.</p><p>"Crypto custody for bitcoins or any cryptocurrency is a major business for our HSM," he said. Banks that hold large amounts of customer crypto cannot afford a single point of failure. "A blockchain operation is a one-way thing. You sign a transaction, and the money is gone."</p><p>The multi-authorisation system addresses this issue by requiring a "quorum" of people to approve each transaction. Rogenmoser explained, "You can say this transaction can only be signed and sent to the blockchain if one out of three compliance officers signs this, plus two out of five traders."&nbsp;</p><p>This approach creates a "more secure system" because "the HSM then checks, do we have a quorum? Did everyone actually sign the same transaction?" Only after verification is "the actual key for the blockchain […] used to sign a transaction and send it to the blockchain."</p><p>Looking to the future, Rogenmoser believes HSMs will be vital for securing the growth of artificial intelligence (AI). With "AI and AI agents doing tasks for us, they might modify things or purchase items on our behalf," which requires both authorisation and attestation.</p><h3>Takeaways</h3><ul><li>HSMs are essential for protecting encryption keys.</li><li>The Swiss National Bank was a key client for Securosys.</li><li>Securosys HSMs are used to secure financial transactions worth trillions.</li><li>Cloud-based HSMs offer convenience but require careful key management.</li><li>Post-quantum cryptography is a significant industry transition.</li><li>NIST is developing algorithms resistant to quantum attacks.</li><li>Multi-authorisation systems enhance security in cryptocurrency transactions.</li><li>AI will require new security measures and audit trails.</li><li>Organisations must assess their key management practices.</li><li>Transitioning to post-quantum systems will take time and planning.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to HSMs and Their Importance</li><li>03:55 The Role of HSMs in Financial Services</li><li>08:44 Post-Quantum Cryptography: Preparing for the Future</li><li>13:30 Multi-Authorisation Systems in Cryptocurrency</li><li>16:48 AI and the Future of HSMs</li><li>19:19 Key Takeaways for IT Decision Makers</li></ul><br/><h2>About Securosys</h2><p>Securosys SA, based in Zurich, is a global leader in cyber security, encryption and digital identity protection, prioritising data sovereignty. Their Swiss-built Hardware Security Modules (HSM) secure financial markets, serving over half of the Tier 1 banks worldwide. Certified to the highest standards, their on-premises and cloud HSM solutions offer secure key generation, encryption, digital signing, and post-quantum readiness for finance, healthcare, government, and other industries.</p>]]></description><content:encoded><![CDATA[<p>"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature."</p><p>According to Robert Rogenmoser, the CEO of&nbsp;<a href="https://em360tech.com/solution-providers/securosys" rel="noopener noreferrer" target="_blank">Securosys</a>, storing keys insecurely creates immediate risk. This makes it crucial to maintain strong key security. "If it's just in a software system, you can easily get hacked. If I have your encryption key, I can read your data. If I have your Bitcoin keys, I can spend your money,” says Rogenmoser.</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Robert Rogenmoser, the CEO of Securosys, about safeguarding the digital world with cryptographic keys. Rogenmoser puts up a case to rally&nbsp;<a href="https://em360tech.com/tech-articles/what-is-hardware-security-module" rel="noopener noreferrer" target="_blank">Hardware Security Modules (HSMs)</a>&nbsp;as the best solution for this critical challenge.</p><p>In addition to discussing how hardware security modules (HSMs) protect encryption keys, they also talk about the evolution of HSMs, their applications in financial services, the implications of&nbsp;<a href="https://em360tech.com/whitepapers/transitioning-to-pqc-with-securosys" rel="noopener noreferrer" target="_blank">post-quantum cryptography</a>, and the integration of AI in security practices.&nbsp;</p><h2>Are Hardware Security Modules (HSMs) the Ultimate Solution?</h2><p>The conversation stresses the importance of key management and the need for organisations to adapt to emerging technologies while ensuring data security.</p><p>In order to mitigate the cybersecurity risks, the priority is to securely store the keys, control access, and generate impenetrable keys that cannot be easily guessed by cyber criminals. HSMs are the ultimate solution to the key issue, believes Rogenmoser.&nbsp;</p><p>Firms tend to shift their data to the cloud, making it even more essential to secure keys. The main challenge arises when both the data and the keys are managed by the same cloud provider, as this setup can compromise the integrity of key control and raise concerns about data sovereignty.&nbsp;</p><p>However,&nbsp;<a href="https://em360tech.com/whitepaper/safe-and-hsm-strengthening-cloud-security" rel="noopener noreferrer" target="_blank">Securosys approaches</a>&nbsp;this challenge differently. Rogenmoser explains that organisations can keep their data encrypted in the cloud. At the same time, they keep the key somewhere else, where only they have control over it.</p><h2>Multi-Authorisation System for High-Stakes Transactions</h2><p>Rogenmoser pointed out the company's patented system for multi-authorisation of Bitcoin keys. This system is essential because blockchain transactions are high-stakes and irreversible.</p><p>"Crypto custody for bitcoins or any cryptocurrency is a major business for our HSM," he said. Banks that hold large amounts of customer crypto cannot afford a single point of failure. "A blockchain operation is a one-way thing. You sign a transaction, and the money is gone."</p><p>The multi-authorisation system addresses this issue by requiring a "quorum" of people to approve each transaction. Rogenmoser explained, "You can say this transaction can only be signed and sent to the blockchain if one out of three compliance officers signs this, plus two out of five traders."&nbsp;</p><p>This approach creates a "more secure system" because "the HSM then checks, do we have a quorum? Did everyone actually sign the same transaction?" Only after verification is "the actual key for the blockchain […] used to sign a transaction and send it to the blockchain."</p><p>Looking to the future, Rogenmoser believes HSMs will be vital for securing the growth of artificial intelligence (AI). With "AI and AI agents doing tasks for us, they might modify things or purchase items on our behalf," which requires both authorisation and attestation.</p><h3>Takeaways</h3><ul><li>HSMs are essential for protecting encryption keys.</li><li>The Swiss National Bank was a key client for Securosys.</li><li>Securosys HSMs are used to secure financial transactions worth trillions.</li><li>Cloud-based HSMs offer convenience but require careful key management.</li><li>Post-quantum cryptography is a significant industry transition.</li><li>NIST is developing algorithms resistant to quantum attacks.</li><li>Multi-authorisation systems enhance security in cryptocurrency transactions.</li><li>AI will require new security measures and audit trails.</li><li>Organisations must assess their key management practices.</li><li>Transitioning to post-quantum systems will take time and planning.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to HSMs and Their Importance</li><li>03:55 The Role of HSMs in Financial Services</li><li>08:44 Post-Quantum Cryptography: Preparing for the Future</li><li>13:30 Multi-Authorisation Systems in Cryptocurrency</li><li>16:48 AI and the Future of HSMs</li><li>19:19 Key Takeaways for IT Decision Makers</li></ul><br/><h2>About Securosys</h2><p>Securosys SA, based in Zurich, is a global leader in cyber security, encryption and digital identity protection, prioritising data sovereignty. Their Swiss-built Hardware Security Modules (HSM) secure financial markets, serving over half of the Tier 1 banks worldwide. Certified to the highest standards, their on-premises and cloud HSM solutions offer secure key generation, encryption, digital signing, and post-quantum readiness for finance, healthcare, government, and other industries.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4d4be26b-770b-4a80-870f-7230d6ac6a2a</guid><itunes:image href="https://artwork.captivate.fm/a8e14018-f94a-4ca6-b460-56d1fb2e8f2b/securosys-podcast-the-security-strategist-em360tech.png"/><pubDate>Wed, 29 Oct 2025 12:49:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/4d4be26b-770b-4a80-870f-7230d6ac6a2a.mp3" length="46339057" type="audio/mpeg"/><itunes:duration>19:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security"><podcast:source uri="https://youtu.be/erEQN-GhrUs"/></podcast:alternateEnclosure></item><item><title>Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can&apos;t Secure Agentic AI</title><itunes:title>Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can&apos;t Secure Agentic AI</itunes:title><description><![CDATA[<p>"With any new technology, there's always a turning point: we need something new to solve the old problems,” states&nbsp;<a href="https://www.linkedin.com/in/jeffrey-hickman/" rel="noopener noreferrer" target="_blank"><strong>Jeffrey Hickman,&nbsp;Head of Customer Engineering at ORY</strong></a>, setting the stage for this episode of The Security Strategist podcast.</p><p>The key challenge enterprises face today, pertaining to identity and security, particularly, is the quick rise of AI agents. Many organisations are trying to annex advanced AI features into old systems, only to realise, post-cost investment, that serious issues have come to the surface. The high number of automated interactions could easily overload the current infrastructure.&nbsp;</p><p>"The scale of agent workloads will be the weak spot for organisations that simply try to apply current identity solutions to the rapidly growing interaction volume,” cautions Hickman.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank"><strong>Alejandro Leal, Host, Cybersecurity Thought Leader</strong></a>, and Senior Analyst at KuppingerCole Analysts AG, speaks with Jeffrey Hickman, Head of Customer Engineering at ORY, about customer identity and access management in the age of AI agents.&nbsp;</p><p>They discuss the urgent need for new self-managed identity solutions to address the challenges posed by AI, the limitations of traditional Customer Identity and Access Management (CIAM), and the importance of adaptability and control in identity management. The conversation also explores the future of AI agents as coworkers and customers, emphasising the need for secure practices and the role of CISOs in pulling through these changes.</p><h2>AI Agents – The Achilles Heel of Legacy Identity</h2><p>Hickman explains that many companies face an immediate and serious issue at the moment. He said: "The scale of agentic workloads will be the Achilles heel for organisations that simply try to map existing identity solutions onto the drastically ballooning interaction volume."</p><p>This scale not only overwhelms current systems but also creates perilous complexity. AI agents, acting on their own or on behalf of humans, lead to a huge increase in authentication events. This is called an "authentication sprawl." Such strain on old technology often positions security as an afterthought.</p><p>The main unresolved technical issue is context: figuring out what an individual agent is allowed to do and what specific data it can access, Hickman tells Leal. "The problem is defining the context—what an agent is allowed to do and gather. Legacy IM solutions don't address this well; it's an unsolved area."</p><p>To gain the necessary control, organisations must move beyond complicated scope chains and rethink how granular permissions function. Meanwhile, the risk of AI-driven phishing targeting human users, fueled by manipulated prompts, will grow until we can ensure the authenticity of human-in-the-loop moments using technologies like Passkeys.</p><p><a href="https://em360tech.com/whitepapers/open-ai-ory-case-study-support-active-users" rel="noopener noreferrer" target="_blank"><strong><em>Also Read: OpenAI leverages Ory platform to support over 400M weekly active users</em></strong></a></p><h3>Takeaways</h3><ul><li>The rise of AI agents is reshaping customer identity management.</li><li>Traditional SIAM systems struggle with the scale of AI interactions.</li><li>Adaptability is crucial for organisations facing new identity challenges.</li><li>Control over identity solutions is essential for enterprises.</li><li>Security must not be sacrificed for user experience.</li><li>AI agents can amplify existing identity management challenges.</li><li>Organisations need to understand the permissions of AI agents.</li><li>The future of identity management is evolving rapidly.</li><li>CISOs must embrace modern standards for identity solutions.</li><li>Observability in identity management enhances security and adaptability.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Customer Identity and AI Agents</p><p>03:00 The Impact of AI on Identity Management</p><p>06:13 Challenges of Traditional SIAM Systems</p><p>08:58 The Need for Adaptability in Identity Solutions</p><p>11:49 Control and Flexibility in Identity Management</p><p>15:12 Future of AI Agents and Security Practices</p><p>17:49 Key Takeaways for CISOs</p><h2><a href="https://www.ory.com/" rel="noopener noreferrer" target="_blank"><strong>About ORY</strong></a></h2><p>With tens of thousands of active projects and trillions of identities managed across its open-source and managed environments,&nbsp;<a href="https://em360tech.com/solution-providers/ory" rel="noopener noreferrer" target="_blank"><strong>Ory is on a mission</strong></a>&nbsp;to redefine what it means to secure digital identities (customers, employees, partners, machines, and agents). Ory provides a modern and modular approach to c/IAM programs that provides unmatched scale, user experience, and deployment flexibility. From open-source to self-managed but supported enterprise licenses, to a fully managed and compliant global service, our composable architecture allows organisations to easily customise experiences for their users.</p>]]></description><content:encoded><![CDATA[<p>"With any new technology, there's always a turning point: we need something new to solve the old problems,” states&nbsp;<a href="https://www.linkedin.com/in/jeffrey-hickman/" rel="noopener noreferrer" target="_blank"><strong>Jeffrey Hickman,&nbsp;Head of Customer Engineering at ORY</strong></a>, setting the stage for this episode of The Security Strategist podcast.</p><p>The key challenge enterprises face today, pertaining to identity and security, particularly, is the quick rise of AI agents. Many organisations are trying to annex advanced AI features into old systems, only to realise, post-cost investment, that serious issues have come to the surface. The high number of automated interactions could easily overload the current infrastructure.&nbsp;</p><p>"The scale of agent workloads will be the weak spot for organisations that simply try to apply current identity solutions to the rapidly growing interaction volume,” cautions Hickman.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank"><strong>Alejandro Leal, Host, Cybersecurity Thought Leader</strong></a>, and Senior Analyst at KuppingerCole Analysts AG, speaks with Jeffrey Hickman, Head of Customer Engineering at ORY, about customer identity and access management in the age of AI agents.&nbsp;</p><p>They discuss the urgent need for new self-managed identity solutions to address the challenges posed by AI, the limitations of traditional Customer Identity and Access Management (CIAM), and the importance of adaptability and control in identity management. The conversation also explores the future of AI agents as coworkers and customers, emphasising the need for secure practices and the role of CISOs in pulling through these changes.</p><h2>AI Agents – The Achilles Heel of Legacy Identity</h2><p>Hickman explains that many companies face an immediate and serious issue at the moment. He said: "The scale of agentic workloads will be the Achilles heel for organisations that simply try to map existing identity solutions onto the drastically ballooning interaction volume."</p><p>This scale not only overwhelms current systems but also creates perilous complexity. AI agents, acting on their own or on behalf of humans, lead to a huge increase in authentication events. This is called an "authentication sprawl." Such strain on old technology often positions security as an afterthought.</p><p>The main unresolved technical issue is context: figuring out what an individual agent is allowed to do and what specific data it can access, Hickman tells Leal. "The problem is defining the context—what an agent is allowed to do and gather. Legacy IM solutions don't address this well; it's an unsolved area."</p><p>To gain the necessary control, organisations must move beyond complicated scope chains and rethink how granular permissions function. Meanwhile, the risk of AI-driven phishing targeting human users, fueled by manipulated prompts, will grow until we can ensure the authenticity of human-in-the-loop moments using technologies like Passkeys.</p><p><a href="https://em360tech.com/whitepapers/open-ai-ory-case-study-support-active-users" rel="noopener noreferrer" target="_blank"><strong><em>Also Read: OpenAI leverages Ory platform to support over 400M weekly active users</em></strong></a></p><h3>Takeaways</h3><ul><li>The rise of AI agents is reshaping customer identity management.</li><li>Traditional SIAM systems struggle with the scale of AI interactions.</li><li>Adaptability is crucial for organisations facing new identity challenges.</li><li>Control over identity solutions is essential for enterprises.</li><li>Security must not be sacrificed for user experience.</li><li>AI agents can amplify existing identity management challenges.</li><li>Organisations need to understand the permissions of AI agents.</li><li>The future of identity management is evolving rapidly.</li><li>CISOs must embrace modern standards for identity solutions.</li><li>Observability in identity management enhances security and adaptability.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Customer Identity and AI Agents</p><p>03:00 The Impact of AI on Identity Management</p><p>06:13 Challenges of Traditional SIAM Systems</p><p>08:58 The Need for Adaptability in Identity Solutions</p><p>11:49 Control and Flexibility in Identity Management</p><p>15:12 Future of AI Agents and Security Practices</p><p>17:49 Key Takeaways for CISOs</p><h2><a href="https://www.ory.com/" rel="noopener noreferrer" target="_blank"><strong>About ORY</strong></a></h2><p>With tens of thousands of active projects and trillions of identities managed across its open-source and managed environments,&nbsp;<a href="https://em360tech.com/solution-providers/ory" rel="noopener noreferrer" target="_blank"><strong>Ory is on a mission</strong></a>&nbsp;to redefine what it means to secure digital identities (customers, employees, partners, machines, and agents). Ory provides a modern and modular approach to c/IAM programs that provides unmatched scale, user experience, and deployment flexibility. From open-source to self-managed but supported enterprise licenses, to a fully managed and compliant global service, our composable architecture allows organisations to easily customise experiences for their users.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0aca6759-f6b2-42e2-ab55-7a454d885ca6</guid><itunes:image href="https://artwork.captivate.fm/ed1c35cf-c4c3-4a0a-8045-7e39ab10ca2a/92-The-multifaceted-nature-of-CIAM-is-why-it-s-becoming-a-press.jpg"/><pubDate>Wed, 15 Oct 2025 10:44:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/0aca6759-f6b2-42e2-ab55-7a454d885ca6.mp3" length="52296121" type="audio/mpeg"/><itunes:duration>21:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is Your CIAM Ready for Web-Scale and Agentic AI? Why Legacy Identity Can&apos;t Secure Agentic AI"><podcast:source uri="https://youtu.be/hg4-3s0XQO4"/></podcast:alternateEnclosure></item><item><title>AI-Powered Scam Factories: The Industrialisation of Fake Shops &amp; Online Fraud</title><itunes:title>AI-Powered Scam Factories: The Industrialisation of Fake Shops &amp; Online Fraud</itunes:title><description><![CDATA[<p>"The harsh reality is the site wasn't real. The ad was fake. The reality is you've clicked through to a steward ad that's taken you to a fake site. That fake site then has taken your details, your credit card,” articulated&nbsp;<a href="https://www.linkedin.com/in/lisadeegan/" rel="noopener noreferrer" target="_blank"><strong>Lisa Deegan, Senior Director, UK and International Growth at EBRAND</strong></a>, in the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>.</p><p>Host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Steinnon, Chief Research Analyst at IT-Harvest</strong></a>, sits down with Deegan to talk about cybersecurity in brand protection against online fraud. They explore&nbsp;<a href="https://em360tech.com/whitepapers/fake-shop-epidemic" rel="noopener noreferrer" target="_blank"><strong>how AI is being used by criminals</strong></a>&nbsp;to create convincing fake shops, the impact of these scams on consumer trust, and the need for a comprehensive approach to brand protection.&nbsp;</p><p>Deegan emphasises the importance of understanding consumer behaviour, the mechanics of online scams, and the necessity for organisations to adopt proactive strategies to combat these threats.&nbsp;</p><h2>The Alarming Rise of AI Fake Shops</h2><p>While the digital world seems like a boon to most, about two-thirds of humanity (five billion people), to be precise. This online community, heavily relying on mobile devices, have become prey for savvy cybercriminals. These criminals are now using Generative AI to create highly convincing, yet entirely fake, online retail experiences.</p><p>Deegan, a cybersecurity and brand protection expert at EBRAND, illustrates the situation trapping the digital community. She asks the audience to imagine a consumer scrolling through social media, sees an ad for a favourite brand offering a deep discount. The consumer clicks, is taken to a professional-looking website that appears legitimate, enters payment details, and loses their money. The product never existed, and the consumer's data is stolen. The speed and scale of these attacks are unprecedented; single campaigns can target over 250,000 people in a single day, points out Deegan.</p><p>The EBRAND senior director proposes a massive change in brand protection strategy. Instead of just dealing with surface-level violations, she wants to target the underlying criminal infrastructure.&nbsp;</p><p>"It's no longer about firefighting individual infringements. It's about looking at the domains, the ads and the payment channels&nbsp;<a href="https://em360tech.com/tech-articles/cybercriminals-stole-resold-eras-tour-tickets" rel="noopener noreferrer" target="_blank"><strong>cyber criminals are using</strong></a>. And it's also the bad actors before that.”</p><p>“It's bringing that all together and making sure that you're taking it down the infrastructure at source so that it's leaving them no opportunity to rebuild again," added Deegan.</p><p>The speakers agree that the traditional method has become a continuous "whack-a-mole" game against sites that instantly reappear due to AI. To be effective, brands "need to embed monitoring with intelligence and rapid enforcement" to break down the entire operation, making it too costly and difficult for the criminals, who will "eventually get fed up and move on to some other soft target."</p><h3>Takeaways</h3><ul><li>The landscape of online fraud is rapidly evolving due to AI.</li><li>Two-thirds of humanity is now online, increasing vulnerability.</li><li>Fake shops can deceive consumers with convincing ads and websites.</li><li>Trust in brands is significantly impacted by online scams.</li><li>Organisations need to dismantle the networks behind scams, not just individual sites.</li><li>AI can be used for both scams and brand protection.</li><li>Consumer education is crucial in combating online fraud.</li><li>The rise of autonomous AI poses new challenges for brand protection.</li><li>Monitoring and rapid enforcement are essential for effective protection.</li><li>Every department in an organisation has a role in brand protection.&nbsp;</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity and Brand Protection</li><li>02:55 The Evolution of Online Fraud</li><li>05:56 The Impact of AI on Scams</li><li>09:03 Understanding the Mechanics of Fake Shops</li><li>12:10 Strategies for Effective Brand Protection</li><li>14:44 The Role of AI in Brand Protection</li><li>17:52 Consumer Awareness and Education</li><li>21:00 Engaging with EBRAND for Protection Solutions</li></ul><br/><h2><a href="https://em360tech.com/whitepapers/ebrand-online-brand-protection" rel="noopener noreferrer" target="_blank"><strong>About EBRAND</strong></a></h2><p><a href="https://ebrand.com/" rel="noopener noreferrer" target="_blank"><strong>EBRAND</strong></a>&nbsp;detects and eliminates infringements, supporting streamlined, well-protected organisations. Safeguarding IP, cyberspace, and domain portfolios, we deliver the tools you need to stay ahead of scammers and impersonators in an AI-enhanced ecommerce world. With local experts and an international scope, our hubs across Europe, North America, and Asia boost and protect leading organisations across the globe. Comprehensive EBRAND services meet business needs across sectors, industries, and markets, so get in touch! Together, we'll implement a future-proof solution to help your team embrace your next challenges with the tools to succeed.</p>]]></description><content:encoded><![CDATA[<p>"The harsh reality is the site wasn't real. The ad was fake. The reality is you've clicked through to a steward ad that's taken you to a fake site. That fake site then has taken your details, your credit card,” articulated&nbsp;<a href="https://www.linkedin.com/in/lisadeegan/" rel="noopener noreferrer" target="_blank"><strong>Lisa Deegan, Senior Director, UK and International Growth at EBRAND</strong></a>, in the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>.</p><p>Host&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Steinnon, Chief Research Analyst at IT-Harvest</strong></a>, sits down with Deegan to talk about cybersecurity in brand protection against online fraud. They explore&nbsp;<a href="https://em360tech.com/whitepapers/fake-shop-epidemic" rel="noopener noreferrer" target="_blank"><strong>how AI is being used by criminals</strong></a>&nbsp;to create convincing fake shops, the impact of these scams on consumer trust, and the need for a comprehensive approach to brand protection.&nbsp;</p><p>Deegan emphasises the importance of understanding consumer behaviour, the mechanics of online scams, and the necessity for organisations to adopt proactive strategies to combat these threats.&nbsp;</p><h2>The Alarming Rise of AI Fake Shops</h2><p>While the digital world seems like a boon to most, about two-thirds of humanity (five billion people), to be precise. This online community, heavily relying on mobile devices, have become prey for savvy cybercriminals. These criminals are now using Generative AI to create highly convincing, yet entirely fake, online retail experiences.</p><p>Deegan, a cybersecurity and brand protection expert at EBRAND, illustrates the situation trapping the digital community. She asks the audience to imagine a consumer scrolling through social media, sees an ad for a favourite brand offering a deep discount. The consumer clicks, is taken to a professional-looking website that appears legitimate, enters payment details, and loses their money. The product never existed, and the consumer's data is stolen. The speed and scale of these attacks are unprecedented; single campaigns can target over 250,000 people in a single day, points out Deegan.</p><p>The EBRAND senior director proposes a massive change in brand protection strategy. Instead of just dealing with surface-level violations, she wants to target the underlying criminal infrastructure.&nbsp;</p><p>"It's no longer about firefighting individual infringements. It's about looking at the domains, the ads and the payment channels&nbsp;<a href="https://em360tech.com/tech-articles/cybercriminals-stole-resold-eras-tour-tickets" rel="noopener noreferrer" target="_blank"><strong>cyber criminals are using</strong></a>. And it's also the bad actors before that.”</p><p>“It's bringing that all together and making sure that you're taking it down the infrastructure at source so that it's leaving them no opportunity to rebuild again," added Deegan.</p><p>The speakers agree that the traditional method has become a continuous "whack-a-mole" game against sites that instantly reappear due to AI. To be effective, brands "need to embed monitoring with intelligence and rapid enforcement" to break down the entire operation, making it too costly and difficult for the criminals, who will "eventually get fed up and move on to some other soft target."</p><h3>Takeaways</h3><ul><li>The landscape of online fraud is rapidly evolving due to AI.</li><li>Two-thirds of humanity is now online, increasing vulnerability.</li><li>Fake shops can deceive consumers with convincing ads and websites.</li><li>Trust in brands is significantly impacted by online scams.</li><li>Organisations need to dismantle the networks behind scams, not just individual sites.</li><li>AI can be used for both scams and brand protection.</li><li>Consumer education is crucial in combating online fraud.</li><li>The rise of autonomous AI poses new challenges for brand protection.</li><li>Monitoring and rapid enforcement are essential for effective protection.</li><li>Every department in an organisation has a role in brand protection.&nbsp;</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity and Brand Protection</li><li>02:55 The Evolution of Online Fraud</li><li>05:56 The Impact of AI on Scams</li><li>09:03 Understanding the Mechanics of Fake Shops</li><li>12:10 Strategies for Effective Brand Protection</li><li>14:44 The Role of AI in Brand Protection</li><li>17:52 Consumer Awareness and Education</li><li>21:00 Engaging with EBRAND for Protection Solutions</li></ul><br/><h2><a href="https://em360tech.com/whitepapers/ebrand-online-brand-protection" rel="noopener noreferrer" target="_blank"><strong>About EBRAND</strong></a></h2><p><a href="https://ebrand.com/" rel="noopener noreferrer" target="_blank"><strong>EBRAND</strong></a>&nbsp;detects and eliminates infringements, supporting streamlined, well-protected organisations. Safeguarding IP, cyberspace, and domain portfolios, we deliver the tools you need to stay ahead of scammers and impersonators in an AI-enhanced ecommerce world. With local experts and an international scope, our hubs across Europe, North America, and Asia boost and protect leading organisations across the globe. Comprehensive EBRAND services meet business needs across sectors, industries, and markets, so get in touch! Together, we'll implement a future-proof solution to help your team embrace your next challenges with the tools to succeed.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3e37d175-0d17-4ea8-aece-6ba6cc0963ff</guid><itunes:image href="https://artwork.captivate.fm/d31764a6-2502-40d3-8253-d76a056e771a/ai-fake-shops-brand-protection-podcast-ebrand-em360tech.jpg"/><pubDate>Tue, 14 Oct 2025 11:19:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/3e37d175-0d17-4ea8-aece-6ba6cc0963ff.mp3" length="60037381" type="audio/mpeg"/><itunes:duration>25:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="AI-Powered Scam Factories: The Industrialisation of Fake Shops &amp; Online Fraud"><podcast:source uri="https://youtu.be/s90IQsXrt4U"/></podcast:alternateEnclosure></item><item><title>Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?</title><itunes:title>Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?</itunes:title><description><![CDATA[<p>Identity fabric, a contemporary, flexible&nbsp;<a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank"><strong>identity and access management (IAM)</strong></a>&nbsp;architecture, should “be involved at every stage of authentication and authorisation,” says&nbsp;<a href="https://www.linkedin.com/in/stephenmcdermid/" rel="noopener noreferrer" target="_blank">Stephen McDermid</a>, CSO, EMEA at&nbsp;<a href="https://www.okta.com/?utm_source=google&amp;utm_campaign=emea_uki_mult_all_wf-all_dg-ao_a-wf_search_google_text_kw_dsa_utm2&amp;utm_medium=cpc&amp;utm_id=aNKKZ00000003OB4AY&amp;gad_source=1&amp;gad_campaignid=22869946250&amp;gbraid=0AAAAACww3aFptcugCBEm1BDfKJ4IPPkQ1&amp;gclid=Cj0KCQjwovPGBhDxARIsAFhgkwTn72BRISciW-XKun-_kc94qgB7bl-S3-fYVwMLqpFGCG5raBHbn9AaAlUyEALw_wcB" rel="noopener noreferrer" target="_blank">Okta Security</a>.&nbsp;</p><p><a href="https://technologymagazine.com/news/identity-crisis-cisco-study-reveals-security-confidence-gap" rel="noopener noreferrer" target="_blank">According to CISCO’s VP</a>, 94 per cent of CISOs believe that complexity in identity infrastructure decreases their overall security.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank">Alejandro Leal</a>, podcast host and cybersecurity thought leader, speaks with McDermid about Identity Fabric, the modern threats to identity security, the role of AI in cybersecurity, and the importance of collaboration among industry players to combat these novel threats.&nbsp;</p><p><br></p><p>Stephen emphasises the need for organisations to adopt a proactive approach to identity governance and to recognise that identity security is a critical component of overall cybersecurity strategy.</p><h2>Poor Identity Governance</h2><p>Enterprises today face a complicated web of users, applications, and data. Identity, once hailed as a small IT problem, is now at the forefront of cyberattacks, and they are becoming highly lucrative targets for cybercriminals.&nbsp;</p><p><br></p><p>Alluding to recent high-profile breaches on the UK high street, McDermid points out the financial impact estimated in hundreds of millions of dollars. The common feature observed among these cyber incidents is the misuse of “poor identity governance.” This happens when users’ old login information lacks&nbsp;<a href="https://em360tech.com/tech-articles/what-multi-factor-authentication-mfa-and-why-you-need-it" rel="noopener noreferrer" target="_blank"><strong>multi-factor authentication (MFA)</strong></a>&nbsp;or when attackers use social engineering to reset passwords.&nbsp;</p><p><br></p><p>The reality today is that attackers now use automation and AI to find valid identities, which makes their work easier than ever, owing to a vast number of compromised credentials available online. The scale of the threat is massive. McDermid noted that "fraudulent sign-ups actually outnumbered legitimate attempts by a factor of 120." This indicates that organisations need to accept that "a breach is inevitable."</p><p><br></p><p>Ultimately, McDermid's message was clear and pressing. He urged CISOs to understand where their identities are throughout their businesses. Furthermore, he stressed on the need to assume a breach and consider how to respond.&nbsp;</p><p><br></p><p>The CSO also called for them to challenge their SaaS vendors to commit to the new standards. In his opinion, only through this type of collective action can the security community hope to make a difference in what seems to be a losing battle right now.</p><h3><strong>Takeaways</strong></h3><ul><li>Identity Fabric is a framework for managing identities at scale.</li><li>Modern attacks exploit poor identity governance and lack of MFA.</li><li>Organisations must assume breaches are inevitable and prepare accordingly.</li><li>AI can enhance identity threat detection and response.</li><li>Collaboration among vendors is essential for improving security standards.</li><li>Human oversight is crucial in AI decision-making processes.</li><li>Shared Signals Framework improves API efficiency and security.</li><li>Interoperability is key to addressing identity security challenges.</li><li>Organisations should centralise governance of identities throughout their lifecycle.</li><li>CISOs must stay informed about emerging threats and trends.</li></ul><br/><h2><strong>Chapters</strong></h2><ul><li>00:00 Understanding Identity Fabric</li><li>02:21 Modern Threats to Identity Security</li><li>06:32 Collaboration in Cybersecurity</li><li>10:38 AI Agents and Identity Security</li><li>14:14 Key Takeaways for CISOs</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Identity fabric, a contemporary, flexible&nbsp;<a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank"><strong>identity and access management (IAM)</strong></a>&nbsp;architecture, should “be involved at every stage of authentication and authorisation,” says&nbsp;<a href="https://www.linkedin.com/in/stephenmcdermid/" rel="noopener noreferrer" target="_blank">Stephen McDermid</a>, CSO, EMEA at&nbsp;<a href="https://www.okta.com/?utm_source=google&amp;utm_campaign=emea_uki_mult_all_wf-all_dg-ao_a-wf_search_google_text_kw_dsa_utm2&amp;utm_medium=cpc&amp;utm_id=aNKKZ00000003OB4AY&amp;gad_source=1&amp;gad_campaignid=22869946250&amp;gbraid=0AAAAACww3aFptcugCBEm1BDfKJ4IPPkQ1&amp;gclid=Cj0KCQjwovPGBhDxARIsAFhgkwTn72BRISciW-XKun-_kc94qgB7bl-S3-fYVwMLqpFGCG5raBHbn9AaAlUyEALw_wcB" rel="noopener noreferrer" target="_blank">Okta Security</a>.&nbsp;</p><p><a href="https://technologymagazine.com/news/identity-crisis-cisco-study-reveals-security-confidence-gap" rel="noopener noreferrer" target="_blank">According to CISCO’s VP</a>, 94 per cent of CISOs believe that complexity in identity infrastructure decreases their overall security.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank">Alejandro Leal</a>, podcast host and cybersecurity thought leader, speaks with McDermid about Identity Fabric, the modern threats to identity security, the role of AI in cybersecurity, and the importance of collaboration among industry players to combat these novel threats.&nbsp;</p><p><br></p><p>Stephen emphasises the need for organisations to adopt a proactive approach to identity governance and to recognise that identity security is a critical component of overall cybersecurity strategy.</p><h2>Poor Identity Governance</h2><p>Enterprises today face a complicated web of users, applications, and data. Identity, once hailed as a small IT problem, is now at the forefront of cyberattacks, and they are becoming highly lucrative targets for cybercriminals.&nbsp;</p><p><br></p><p>Alluding to recent high-profile breaches on the UK high street, McDermid points out the financial impact estimated in hundreds of millions of dollars. The common feature observed among these cyber incidents is the misuse of “poor identity governance.” This happens when users’ old login information lacks&nbsp;<a href="https://em360tech.com/tech-articles/what-multi-factor-authentication-mfa-and-why-you-need-it" rel="noopener noreferrer" target="_blank"><strong>multi-factor authentication (MFA)</strong></a>&nbsp;or when attackers use social engineering to reset passwords.&nbsp;</p><p><br></p><p>The reality today is that attackers now use automation and AI to find valid identities, which makes their work easier than ever, owing to a vast number of compromised credentials available online. The scale of the threat is massive. McDermid noted that "fraudulent sign-ups actually outnumbered legitimate attempts by a factor of 120." This indicates that organisations need to accept that "a breach is inevitable."</p><p><br></p><p>Ultimately, McDermid's message was clear and pressing. He urged CISOs to understand where their identities are throughout their businesses. Furthermore, he stressed on the need to assume a breach and consider how to respond.&nbsp;</p><p><br></p><p>The CSO also called for them to challenge their SaaS vendors to commit to the new standards. In his opinion, only through this type of collective action can the security community hope to make a difference in what seems to be a losing battle right now.</p><h3><strong>Takeaways</strong></h3><ul><li>Identity Fabric is a framework for managing identities at scale.</li><li>Modern attacks exploit poor identity governance and lack of MFA.</li><li>Organisations must assume breaches are inevitable and prepare accordingly.</li><li>AI can enhance identity threat detection and response.</li><li>Collaboration among vendors is essential for improving security standards.</li><li>Human oversight is crucial in AI decision-making processes.</li><li>Shared Signals Framework improves API efficiency and security.</li><li>Interoperability is key to addressing identity security challenges.</li><li>Organisations should centralise governance of identities throughout their lifecycle.</li><li>CISOs must stay informed about emerging threats and trends.</li></ul><br/><h2><strong>Chapters</strong></h2><ul><li>00:00 Understanding Identity Fabric</li><li>02:21 Modern Threats to Identity Security</li><li>06:32 Collaboration in Cybersecurity</li><li>10:38 AI Agents and Identity Security</li><li>14:14 Key Takeaways for CISOs</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">351d23d2-8533-4b89-996f-a5cd008fb8db</guid><itunes:image href="https://artwork.captivate.fm/1301ad6b-a748-448a-9848-c363c60a9b1a/identity-access-management-okta-podcast-em360tech.png"/><pubDate>Wed, 01 Oct 2025 10:37:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/351d23d2-8533-4b89-996f-a5cd008fb8db.mp3" length="37981836" type="audio/mpeg"/><itunes:duration>15:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?"><podcast:source uri="https://youtu.be/ZNV-mBtEcdU"/></podcast:alternateEnclosure></item><item><title>Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence</title><itunes:title>Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence</itunes:title><description><![CDATA[<p>Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the same time, security teams face an endless stream of new threats. The middle ground is clear, and that is software must be secure and resilient from the start, without slowing innovation.</p><p>This is the philosophy&nbsp;<a href="https://www.linkedin.com/in/iamit/" rel="noopener noreferrer" target="_blank">Ian Amit</a>, CEO of&nbsp;<a href="https://www.linkedin.com/company/gomboc-ai/" rel="noopener noreferrer" target="_blank">Gomboc AI</a>, shared in a recent conversation with&nbsp;<a href="https://www.linkedin.com/in/danagardner/" rel="noopener noreferrer" target="_blank">Dana Gardner</a>, Principal Analyst at Interarbor, on the&nbsp;<em>Security Strategist</em>&nbsp;podcast. Amit argues that the next era of DevSecOps depends on rethinking how engineering and security come together.</p><h2>Moving Beyond Shift-Left Fatigue</h2><p>The traditional push to “shift security left” has often backfired. Developers face alert fatigue, drowning in warnings that obscure the real issues. Security teams end up chasing vulnerabilities rather than preventing them. Amit reframes the goal as engineering excellence:</p><p><em>“I want to be proud of my code. It should be secure, resilient, efficient, and fully optimized. That’s what I call engineering excellence.”</em>&nbsp;— Ian Amit, CEO, Gomboc AI</p><p>Attackers only need to succeed once; defenders must be right every time. By closing the gap between development and operations, organizations can cut MTTR and reduce risk exposure.</p><h2>Balancing Accuracy</h2><p>Generative tools can accelerate development, but they introduce instability.</p><p><em>“With that 10x code, you’re also getting 10x the bugs,”</em>&nbsp;Amit explains.</p><p>Deterministic approaches, by contrast, deliver repeatability and precision. Neither alone is a silver bullet. As Amit puts it:</p><p><em>“Use generative to cut through tedious work. Use deterministic approaches to align output to your own standards. You don’t want someone else’s standards creeping into your environment.”</em></p><h2>Seamless DevSecOps</h2><p>The future of enterprise security isn’t about more checkpoints. It’s about weaving security into development pipelines, enabling distributed teams to collaborate without friction.&nbsp;<a href="https://www.gomboc.ai/" rel="noopener noreferrer" target="_blank">Gomboc AI’s</a>&nbsp;approach centres on reducing engineering toil and empowering enterprises to achieve fast, safe, and automated development.</p><h2>Key Takeaways</h2><ul><li>Traditional shift-left security can create alert fatigue.</li><li>Generative tools speed development but may increase bugs.</li><li>Deterministic approaches offer accuracy and repeatability.</li><li>Mean time to remediate (MTTR) is the most critical success metric.</li><li>Collaboration across distributed teams is essential.</li><li>Security must integrate seamlessly with DevOps processes.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to DevSecOps and Its Importance</p><p>03:08 Challenges in Traditional Shift Left Approaches</p><p>06:07 The Role of AI in Development and Security</p><p>08:58 Balancing Generative and Deterministic AI</p><p>11:52 Automation and Metrics of Success in Security</p><p>14:44 Collaboration in Distributed Teams</p><p>17:59 Integrating SecOps into Existing Processes</p><p>20:56 Future of AI in DevSecOps</p><p>23:53 Gomboc AI's Approach to Bridging Gaps</p><h2>About Gomboc AI</h2><p><a href="http://gomboc.ai/" rel="noopener noreferrer" target="_blank">Gomboc.ai</a>&nbsp;is a cloud infrastructure security platform built to simplify and strengthen security at scale. By connecting directly to cloud environments it provides complete visibility and protection across risks. Its deterministic engine automatically detects and fixes policy deviations in Infrastructure as Code (IaC), delivering tailored, policy-aligned fixes as pull requests or commits straight into existing DevOps workflows. With Gomboc.ai, enterprises eliminate security backlogs, accelerate remediation, and release with confidence—without slowing innovation.</p>]]></description><content:encoded><![CDATA[<p>Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the same time, security teams face an endless stream of new threats. The middle ground is clear, and that is software must be secure and resilient from the start, without slowing innovation.</p><p>This is the philosophy&nbsp;<a href="https://www.linkedin.com/in/iamit/" rel="noopener noreferrer" target="_blank">Ian Amit</a>, CEO of&nbsp;<a href="https://www.linkedin.com/company/gomboc-ai/" rel="noopener noreferrer" target="_blank">Gomboc AI</a>, shared in a recent conversation with&nbsp;<a href="https://www.linkedin.com/in/danagardner/" rel="noopener noreferrer" target="_blank">Dana Gardner</a>, Principal Analyst at Interarbor, on the&nbsp;<em>Security Strategist</em>&nbsp;podcast. Amit argues that the next era of DevSecOps depends on rethinking how engineering and security come together.</p><h2>Moving Beyond Shift-Left Fatigue</h2><p>The traditional push to “shift security left” has often backfired. Developers face alert fatigue, drowning in warnings that obscure the real issues. Security teams end up chasing vulnerabilities rather than preventing them. Amit reframes the goal as engineering excellence:</p><p><em>“I want to be proud of my code. It should be secure, resilient, efficient, and fully optimized. That’s what I call engineering excellence.”</em>&nbsp;— Ian Amit, CEO, Gomboc AI</p><p>Attackers only need to succeed once; defenders must be right every time. By closing the gap between development and operations, organizations can cut MTTR and reduce risk exposure.</p><h2>Balancing Accuracy</h2><p>Generative tools can accelerate development, but they introduce instability.</p><p><em>“With that 10x code, you’re also getting 10x the bugs,”</em>&nbsp;Amit explains.</p><p>Deterministic approaches, by contrast, deliver repeatability and precision. Neither alone is a silver bullet. As Amit puts it:</p><p><em>“Use generative to cut through tedious work. Use deterministic approaches to align output to your own standards. You don’t want someone else’s standards creeping into your environment.”</em></p><h2>Seamless DevSecOps</h2><p>The future of enterprise security isn’t about more checkpoints. It’s about weaving security into development pipelines, enabling distributed teams to collaborate without friction.&nbsp;<a href="https://www.gomboc.ai/" rel="noopener noreferrer" target="_blank">Gomboc AI’s</a>&nbsp;approach centres on reducing engineering toil and empowering enterprises to achieve fast, safe, and automated development.</p><h2>Key Takeaways</h2><ul><li>Traditional shift-left security can create alert fatigue.</li><li>Generative tools speed development but may increase bugs.</li><li>Deterministic approaches offer accuracy and repeatability.</li><li>Mean time to remediate (MTTR) is the most critical success metric.</li><li>Collaboration across distributed teams is essential.</li><li>Security must integrate seamlessly with DevOps processes.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to DevSecOps and Its Importance</p><p>03:08 Challenges in Traditional Shift Left Approaches</p><p>06:07 The Role of AI in Development and Security</p><p>08:58 Balancing Generative and Deterministic AI</p><p>11:52 Automation and Metrics of Success in Security</p><p>14:44 Collaboration in Distributed Teams</p><p>17:59 Integrating SecOps into Existing Processes</p><p>20:56 Future of AI in DevSecOps</p><p>23:53 Gomboc AI's Approach to Bridging Gaps</p><h2>About Gomboc AI</h2><p><a href="http://gomboc.ai/" rel="noopener noreferrer" target="_blank">Gomboc.ai</a>&nbsp;is a cloud infrastructure security platform built to simplify and strengthen security at scale. By connecting directly to cloud environments it provides complete visibility and protection across risks. Its deterministic engine automatically detects and fixes policy deviations in Infrastructure as Code (IaC), delivering tailored, policy-aligned fixes as pull requests or commits straight into existing DevOps workflows. With Gomboc.ai, enterprises eliminate security backlogs, accelerate remediation, and release with confidence—without slowing innovation.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">111052b1-62e5-4f52-b723-bf6e8850d100</guid><itunes:image href="https://artwork.captivate.fm/330e8653-d2a1-4982-a419-fdfff0d9cb20/79-Traditional-shift-left-approaches-often-fall-short-due-to-al.jpg"/><pubDate>Wed, 01 Oct 2025 08:37:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/111052b1-62e5-4f52-b723-bf6e8850d100.mp3" length="65706301" type="audio/mpeg"/><itunes:duration>27:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode><podcast:season>1</podcast:season></item><item><title>What Does the Rise of Agentic AI Mean for Traditional Security Models?</title><itunes:title>What Does the Rise of Agentic AI Mean for Traditional Security Models?</itunes:title><description><![CDATA[<p>In an era of AI, it’s no longer a question of whether we should use it, but instead, we need to understand how it should be used effectively, conveys Sam Curry, the Chief Information Security Officer (CISO) at Zscaler. He believes that the growth of agentic AI is not meant to replace human security teams; rather, it aims to improve the industry as a whole.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host Richard Stiennon, an author and&nbsp;<em>the Chief Research Analyst at IT-Harvest,&nbsp;</em>speaks with Curry, <a href="https://www.zscaler.com/products-and-solutions/zero-trust-exchange-zte?igaag=172900270710&amp;igaat=&amp;igacm=21825574531&amp;igacr=717607996930&amp;igakw=zscaler%20products&amp;igamt=p&amp;igant=g&amp;utm_source=google&amp;utm_medium=cpc&amp;cq_plac=&amp;cq_net=g&amp;cq_plt=gp&amp;campaign_name=google-search-b-mixed_assets-emea_tier1-dm&amp;utm_campaign=21825574531&amp;utm_term=p-zscaler%20products&amp;gad_source=1&amp;gad_campaignid=21825574531&amp;gbraid=0AAAAADBtrYPE6ny9T8C1cxLRB8hBwoA2L&amp;gclid=CjwKCAjw_-3GBhAYEiwAjh9fUNMATZozi9e67WqgK8cJjtQzT2YRnRJOTfg4Q7wdvoSLkNuTfJ66ZhoC-WcQAvD_BwE" rel="noopener noreferrer" target="_blank">Zscaler</a> CISO, about the need for a shift to a model derived from authenticity, the role of&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">agentic AI&nbsp;</a>in security operations, and the criticality of awareness in adopting to changes brought by AI.</p><p>The conversation also touches on the necessity of establishing trust and accountability in&nbsp;<a href="https://em360tech.com/tech-articles/how-understand-and-prepare-7-levels-ai-agents" rel="noopener noreferrer" target="_blank">AI systems</a>, as well as the implications for cybersecurity professionals in an increasingly automated world.</p><h2>AI Allows Easy Transition to Complex &amp; Strategic Work&nbsp;</h2><p>The cybersecurity industry is constantly warring against malicious actors. As attackers become more skilled, especially with AI in the picture now. Security professionals must step up their skills just to keep pace with the advancements brought by AI. Instead of taking away jobs, it enables security experts to break free from repetitive manual tasks. Such a transition allows them to focus on more complex and strategic work.</p><p>"We spend a lot of our time in the SOC doing manual tasks repetitively and trying to glue things together," Curry says. "When you manage not to think about the tools, your ability to perform a task improves drastically."</p><p>AI adaptations bring other changes that also help IT teams find better ways to perform their jobs. They move from simple detection and response to a more proactive approach to security. Curry believes that in this new environment, there will still be plenty of jobs; they'll just be more engaging and valuable.</p><h2>Ethics &amp; Logic are Crucial to Work With AI</h2><p>For universities and educational institutions, the rise of AI in cybersecurity poses a significant challenge. The traditional emphasis on technical certifications like Certified Ethical Hacking and Security+ is no longer adequate. Future jobs will demand a deeper understanding of fundamental principles.</p><p>"They're going to have to walk over to the philosophy department," Curry explains. "They'll probably need to engage with the social sciences department. Understanding ethics and logic is crucial because they have to work with AI and assess whether the information it provides is logical."</p><p>The key is in coding, running scripts, but most importantly, it’s in learning to&nbsp;<a href="https://em360tech.com/tech-articles/open-source-ai-vs-proprietary-models" rel="noopener noreferrer" target="_blank">collaborate with AI</a>&nbsp;as a partner. However, a boost in education is necessary to help cybersecurity professionals comprehend the principles of logic, ethics, and sociology. Such an approach to awareness will help IT teams find their way through the convoluted relationships between humans and AI.</p><p>As agentic AI becomes more common, we are shifting away from traditional security models. Authentication and authorisation are no longer sufficient. The new reality calls for a focus on authenticity.</p><h3>Takeaways</h3><ul><li>The rise of agentic AI necessitates a new security model based on authenticity.</li><li>AI is not just a tool for attacks; it can enhance defensive strategies.</li><li>Organisations must consider privacy and data handling when implementing AI.</li><li>The role of cybersecurity professionals will evolve, focusing on more complex tasks.</li><li>Education in cybersecurity must adapt to include ethics and logic.</li><li>AI can help automate repetitive tasks, allowing for more interesting work.</li><li>Trust and accountability are crucial in the deployment of AI systems.</li><li>Consumption metrics can provide deeper insights into product value.</li><li>Understanding user engagement is more important than just satisfaction surveys.</li><li>The future of cybersecurity will involve continuous adaptation to new threats.&nbsp;</li></ul><br/><h3>Chapters</h3><ul><li>00:00 The Rise of Agentic AI in Cybersecurity</li><li>09:05 The Future of Cybersecurity Jobs</li><li>12:45 The Role of Education in Cybersecurity</li><li>19:42 Establishing Trust in Agentic AI</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In an era of AI, it’s no longer a question of whether we should use it, but instead, we need to understand how it should be used effectively, conveys Sam Curry, the Chief Information Security Officer (CISO) at Zscaler. He believes that the growth of agentic AI is not meant to replace human security teams; rather, it aims to improve the industry as a whole.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, host Richard Stiennon, an author and&nbsp;<em>the Chief Research Analyst at IT-Harvest,&nbsp;</em>speaks with Curry, <a href="https://www.zscaler.com/products-and-solutions/zero-trust-exchange-zte?igaag=172900270710&amp;igaat=&amp;igacm=21825574531&amp;igacr=717607996930&amp;igakw=zscaler%20products&amp;igamt=p&amp;igant=g&amp;utm_source=google&amp;utm_medium=cpc&amp;cq_plac=&amp;cq_net=g&amp;cq_plt=gp&amp;campaign_name=google-search-b-mixed_assets-emea_tier1-dm&amp;utm_campaign=21825574531&amp;utm_term=p-zscaler%20products&amp;gad_source=1&amp;gad_campaignid=21825574531&amp;gbraid=0AAAAADBtrYPE6ny9T8C1cxLRB8hBwoA2L&amp;gclid=CjwKCAjw_-3GBhAYEiwAjh9fUNMATZozi9e67WqgK8cJjtQzT2YRnRJOTfg4Q7wdvoSLkNuTfJ66ZhoC-WcQAvD_BwE" rel="noopener noreferrer" target="_blank">Zscaler</a> CISO, about the need for a shift to a model derived from authenticity, the role of&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">agentic AI&nbsp;</a>in security operations, and the criticality of awareness in adopting to changes brought by AI.</p><p>The conversation also touches on the necessity of establishing trust and accountability in&nbsp;<a href="https://em360tech.com/tech-articles/how-understand-and-prepare-7-levels-ai-agents" rel="noopener noreferrer" target="_blank">AI systems</a>, as well as the implications for cybersecurity professionals in an increasingly automated world.</p><h2>AI Allows Easy Transition to Complex &amp; Strategic Work&nbsp;</h2><p>The cybersecurity industry is constantly warring against malicious actors. As attackers become more skilled, especially with AI in the picture now. Security professionals must step up their skills just to keep pace with the advancements brought by AI. Instead of taking away jobs, it enables security experts to break free from repetitive manual tasks. Such a transition allows them to focus on more complex and strategic work.</p><p>"We spend a lot of our time in the SOC doing manual tasks repetitively and trying to glue things together," Curry says. "When you manage not to think about the tools, your ability to perform a task improves drastically."</p><p>AI adaptations bring other changes that also help IT teams find better ways to perform their jobs. They move from simple detection and response to a more proactive approach to security. Curry believes that in this new environment, there will still be plenty of jobs; they'll just be more engaging and valuable.</p><h2>Ethics &amp; Logic are Crucial to Work With AI</h2><p>For universities and educational institutions, the rise of AI in cybersecurity poses a significant challenge. The traditional emphasis on technical certifications like Certified Ethical Hacking and Security+ is no longer adequate. Future jobs will demand a deeper understanding of fundamental principles.</p><p>"They're going to have to walk over to the philosophy department," Curry explains. "They'll probably need to engage with the social sciences department. Understanding ethics and logic is crucial because they have to work with AI and assess whether the information it provides is logical."</p><p>The key is in coding, running scripts, but most importantly, it’s in learning to&nbsp;<a href="https://em360tech.com/tech-articles/open-source-ai-vs-proprietary-models" rel="noopener noreferrer" target="_blank">collaborate with AI</a>&nbsp;as a partner. However, a boost in education is necessary to help cybersecurity professionals comprehend the principles of logic, ethics, and sociology. Such an approach to awareness will help IT teams find their way through the convoluted relationships between humans and AI.</p><p>As agentic AI becomes more common, we are shifting away from traditional security models. Authentication and authorisation are no longer sufficient. The new reality calls for a focus on authenticity.</p><h3>Takeaways</h3><ul><li>The rise of agentic AI necessitates a new security model based on authenticity.</li><li>AI is not just a tool for attacks; it can enhance defensive strategies.</li><li>Organisations must consider privacy and data handling when implementing AI.</li><li>The role of cybersecurity professionals will evolve, focusing on more complex tasks.</li><li>Education in cybersecurity must adapt to include ethics and logic.</li><li>AI can help automate repetitive tasks, allowing for more interesting work.</li><li>Trust and accountability are crucial in the deployment of AI systems.</li><li>Consumption metrics can provide deeper insights into product value.</li><li>Understanding user engagement is more important than just satisfaction surveys.</li><li>The future of cybersecurity will involve continuous adaptation to new threats.&nbsp;</li></ul><br/><h3>Chapters</h3><ul><li>00:00 The Rise of Agentic AI in Cybersecurity</li><li>09:05 The Future of Cybersecurity Jobs</li><li>12:45 The Role of Education in Cybersecurity</li><li>19:42 Establishing Trust in Agentic AI</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3dfcf88e-8303-437e-8ef5-e97850edda05</guid><itunes:image href="https://artwork.captivate.fm/67c89283-1e77-4475-9507-ed2644cd6a0d/zscaler-em360tech-podcast-agentic-ai-traditional-security-model.png"/><pubDate>Tue, 30 Sep 2025 11:53:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/3dfcf88e-8303-437e-8ef5-e97850edda05.mp3" length="52912081" type="audio/mpeg"/><itunes:duration>22:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="What Does the Rise of Agentic AI Mean for Traditional Security Models?"><podcast:source uri="https://youtu.be/yvUzv-2jhPM"/></podcast:alternateEnclosure></item><item><title>Container Security Uncovered: Lessons from NIST SP 800-190</title><itunes:title>Container Security Uncovered: Lessons from NIST SP 800-190</itunes:title><description><![CDATA[<p>It has been eight years since the&nbsp;<a href="https://csrc.nist.gov/pubs/sp/800/190/final" rel="noopener noreferrer" target="_blank">NIST Special Publication 800-190</a>: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority.</p><p>In this episode,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest and host of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, discusses container security with&nbsp;<a href="https://www.linkedin.com/in/john-morello/" rel="noopener noreferrer" target="_blank">John Morello</a>, CTO and Co-Founder of&nbsp;<a href="https://www.linkedin.com/company/minimusio/" rel="noopener noreferrer" target="_blank">Minimus</a>, and&nbsp;<a href="https://www.linkedin.com/in/murugiah/" rel="noopener noreferrer" target="_blank">Murugiah Souppaya</a>, Former Computer Scientist at the&nbsp;<a href="https://www.nist.gov/" rel="noopener noreferrer" target="_blank">National Institute of Standards and Technology (NIST)</a>. Together, they focus on NIST Special Publication 800-190, exploring its role in providing best practices for securing containers, the recommendations outlined in the guide, and the approach required for effective container security.&nbsp;</p><p>The conversation also examines current best practices and the future of container security, emphasizing the importance of compliance and the integration of security throughout the development lifecycle.</p><h1>Why NIST SP 800-190 Still Matters</h1><p>NIST’s framework was designed for both government and industry, offering guidance on how to:</p><ul><li>Integrate security early in the application lifecycle.</li><li>Apply a holistic approach from hardware to workload.</li><li>Build with minimalistic and secure container images.</li><li>Maintain compliance with regulations and standards.</li><li>Continuously monitor and update security practices.</li><li>Understand the full container lifecycle from creation to retirement.</li></ul><br/><p>As Murugiah Souppaya explains:</p><p>“We want to make sure that people think of container security holistically, and also think about the full lifecycle management of the container itself. Like anything else in the enterprise, you want to look at this end-to-end and fill those gaps.”</p><h2>Insights on the Development of Container Security</h2><p>NIST SP 800-190 arrived at a time when containers were new to most organizations. Now, they have become the standard way to deploy applications at scale.</p><p>John Morello recalls:</p><p>“Around 2016 or so, containers were pretty new in the world. Containers and containerization in other forms had existed in the past, but it was really becoming a mainstream technology that was commonly used across many organizations.”</p><p>This fast-paced adoption forced organizations to rethink their security culture. Containers required not only new technical controls, but also a shift in mindset: security had to be built-in from the start.</p><h2>Takeaways</h2><ul><li>Container security became critical with the rise of cloud-native applications.</li><li>NIST aims to provide guidance for both government and industry.</li><li>The 800-190 guide offers a framework for securing containers.</li><li>Security must be integrated early in the application lifecycle.</li><li>Containers require a shift in security culture and practices.</li><li>Holistic security involves securing hardware to workload.</li><li>Best practices include using minimalistic and secure images.</li><li>Compliance with regulations is essential for container security.</li><li>Continuous monitoring and updating of security practices are necessary.</li><li>Understanding the full lifecycle of containers is crucial for security.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Container Security and NIST 800-190</p><p>02:58 The Importance of NIST in Container Security</p><p>05:52 Key Recommendations from the NIST Guide</p><p>08:44 Holistic Approach to Container Security</p><p>11:53 Current Best Practices in Container Security</p><p>14:47 Future of Container Security and Continuous Improvement</p><h2>About Minimus</h2><p>Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing them from existing. Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs. Founded by the team behind container security pioneer Twistlock, Minimus raised $51 million seed funding from YL Ventures and Mayfield. The company is headquartered in Baton Rouge with offices in New York, Tel Aviv, and Portland, OR. To learn more, visit&nbsp;<a href="http://minimus.io/" rel="noopener noreferrer" target="_blank">minimus.io</a>.</p>]]></description><content:encoded><![CDATA[<p>It has been eight years since the&nbsp;<a href="https://csrc.nist.gov/pubs/sp/800/190/final" rel="noopener noreferrer" target="_blank">NIST Special Publication 800-190</a>: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority.</p><p>In this episode,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest and host of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, discusses container security with&nbsp;<a href="https://www.linkedin.com/in/john-morello/" rel="noopener noreferrer" target="_blank">John Morello</a>, CTO and Co-Founder of&nbsp;<a href="https://www.linkedin.com/company/minimusio/" rel="noopener noreferrer" target="_blank">Minimus</a>, and&nbsp;<a href="https://www.linkedin.com/in/murugiah/" rel="noopener noreferrer" target="_blank">Murugiah Souppaya</a>, Former Computer Scientist at the&nbsp;<a href="https://www.nist.gov/" rel="noopener noreferrer" target="_blank">National Institute of Standards and Technology (NIST)</a>. Together, they focus on NIST Special Publication 800-190, exploring its role in providing best practices for securing containers, the recommendations outlined in the guide, and the approach required for effective container security.&nbsp;</p><p>The conversation also examines current best practices and the future of container security, emphasizing the importance of compliance and the integration of security throughout the development lifecycle.</p><h1>Why NIST SP 800-190 Still Matters</h1><p>NIST’s framework was designed for both government and industry, offering guidance on how to:</p><ul><li>Integrate security early in the application lifecycle.</li><li>Apply a holistic approach from hardware to workload.</li><li>Build with minimalistic and secure container images.</li><li>Maintain compliance with regulations and standards.</li><li>Continuously monitor and update security practices.</li><li>Understand the full container lifecycle from creation to retirement.</li></ul><br/><p>As Murugiah Souppaya explains:</p><p>“We want to make sure that people think of container security holistically, and also think about the full lifecycle management of the container itself. Like anything else in the enterprise, you want to look at this end-to-end and fill those gaps.”</p><h2>Insights on the Development of Container Security</h2><p>NIST SP 800-190 arrived at a time when containers were new to most organizations. Now, they have become the standard way to deploy applications at scale.</p><p>John Morello recalls:</p><p>“Around 2016 or so, containers were pretty new in the world. Containers and containerization in other forms had existed in the past, but it was really becoming a mainstream technology that was commonly used across many organizations.”</p><p>This fast-paced adoption forced organizations to rethink their security culture. Containers required not only new technical controls, but also a shift in mindset: security had to be built-in from the start.</p><h2>Takeaways</h2><ul><li>Container security became critical with the rise of cloud-native applications.</li><li>NIST aims to provide guidance for both government and industry.</li><li>The 800-190 guide offers a framework for securing containers.</li><li>Security must be integrated early in the application lifecycle.</li><li>Containers require a shift in security culture and practices.</li><li>Holistic security involves securing hardware to workload.</li><li>Best practices include using minimalistic and secure images.</li><li>Compliance with regulations is essential for container security.</li><li>Continuous monitoring and updating of security practices are necessary.</li><li>Understanding the full lifecycle of containers is crucial for security.</li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Container Security and NIST 800-190</p><p>02:58 The Importance of NIST in Container Security</p><p>05:52 Key Recommendations from the NIST Guide</p><p>08:44 Holistic Approach to Container Security</p><p>11:53 Current Best Practices in Container Security</p><p>14:47 Future of Container Security and Continuous Improvement</p><h2>About Minimus</h2><p>Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing them from existing. Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs. Founded by the team behind container security pioneer Twistlock, Minimus raised $51 million seed funding from YL Ventures and Mayfield. The company is headquartered in Baton Rouge with offices in New York, Tel Aviv, and Portland, OR. To learn more, visit&nbsp;<a href="http://minimus.io/" rel="noopener noreferrer" target="_blank">minimus.io</a>.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">bbf4bd4f-8a6e-4dd2-b0b5-15a8395a1b12</guid><itunes:image href="https://artwork.captivate.fm/e8491015-386d-4541-8f01-57e36d7c0c46/80-Containers-require-a-shift-in-security-culture-and-practices.jpg"/><pubDate>Thu, 25 Sep 2025 10:23:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/bbf4bd4f-8a6e-4dd2-b0b5-15a8395a1b12.mp3" length="55549225" type="audio/mpeg"/><itunes:duration>23:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode><podcast:season>1</podcast:season></item><item><title>AI and the New Age of Cyber Threats</title><itunes:title>AI and the New Age of Cyber Threats</itunes:title><description><![CDATA[<p>AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddled with spelling mistakes and clumsy language are now polished, persuasive, and tailored using data scraped from social media and other online sources. The result? Messages that look legitimate enough to trick even the most security-aware employees.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;sits down with Director of Threat Research at N-able,&nbsp;<a href="https://www.linkedin.com/in/kevinbytes/" rel="noopener noreferrer" target="_blank">Kevin O’Connor</a>&nbsp;to unpack how AI is reshaping phishing and what it means for businesses, especially small and medium-sized organizations that often lack the resources to keep up. Drawing on insights from the<a href="https://www.n-able.com/resources/threat-report-2025" rel="noopener noreferrer" target="_blank">&nbsp;N-able Threat Report</a>, O’Connor explains why traditional defenses and old-school user training aren’t enough to stop today’s AI-crafted scams.</p><p>O’Connor says:</p><p><em>“In the past, phishing emails were easy to spot, you’d see clumsy grammar mistakes, generic wording, they were just very obvious</em>.&nbsp;<em>But with the new wave of AI-enabled phishing emails, we’re seeing tailored attacks that pull from social media profiles and other sources. These messages are highly polished, they look convincing, and the worrying part is that attackers can now do this at scale. That means even IT professionals and security pros are at risk.”</em></p><p>Why Even Experts Are Falling for AI-Powered Phishing</p><p>Drawing on insights from the latest&nbsp;<a href="https://www.n-able.com/resources/threat-report-2025" rel="noopener noreferrer" target="_blank">N-able Threat Report</a>, this is why the shift is so dangerous:</p><ul><li>AI is changing the landscape of social engineering. Messages are tailored, credible, and increasingly difficult to block or filter.</li><li>Phishing emails are now more convincing than ever. Attackers can create unique, targeted scams instead of blasting out obvious mass emails.</li><li>Even experts are vulnerable. IT teams and security professionals are no longer immune.</li><li>User training must evolve. Old advice like “look for spelling mistakes” won’t cut it anymore. Employees need new skills to recognize modern threats.</li></ul><br/><p>The conversation also looks ahead at what enterprises can do now to strengthen defenses, updating training, and preparing for a future where AI will play a role on both sides of the cybersecurity battle.</p><h1>Takeaways</h1><ul><li>AI is changing the landscape of social engineering.</li><li>Phishing emails are now more convincing than ever.</li><li>Even tech-savvy employees can fall for scams.</li><li>SMBs are increasingly targeted due to their vulnerabilities.</li><li>User training must evolve to address modern threats.</li><li>Two-factor authentication is critical for financial transactions.</li><li>Organizations need to know their data exposure.</li><li>Incident response planning is essential for preparedness.</li></ul><br/><p>Automated responses can enhance security measures.</p><p>The threat of compromise is a matter of when, not if.</p><h1>Chapters</h1><p>00:00 Introduction to AI-Driven Threats</p><p>02:09 The Evolution of Phishing with AI</p><p>05:42 The Rise of Attacks on SMBs</p><p>08:56 Preventative Measures for Organizations</p><p>12:36 The Future of AI in Cybersecurity</p><h1>About Kevin O’Connor</h1><p><a href="https://www.linkedin.com/in/kevinbytes/" rel="noopener noreferrer" target="_blank">Kevin O’Connor</a>&nbsp;is the Director of Threat Research at&nbsp;<a href="https://www.linkedin.com/company/n-able/" rel="noopener noreferrer" target="_blank">N-Able</a>&nbsp;and brings over eight years of experience in U.S. Intelligence Community and Department of Defense cyber operations, gaining first-hand insight into how nation-state adversaries think and operate. He later applied that expertise in private industry threat research, translating intelligence into practical, enterprise-grade security solutions. O’Connor continues to focus on Threat Research, bringing those capabilities from a startup to a larger organization, increasing reach, insights, and cross-industry impact.</p><p>O’Connor’s strength lies in bridging technical depth with strategic insight. He can analyze advanced persistent threats and kernel-level exploits while advising business leaders on risk, investment, and operations. With expertise in offensive cyber operations, defensive engineering, and threat intelligence, he turns complex security challenges into actionable strategies that help enterprises stay resilient.</p>]]></description><content:encoded><![CDATA[<p>AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddled with spelling mistakes and clumsy language are now polished, persuasive, and tailored using data scraped from social media and other online sources. The result? Messages that look legitimate enough to trick even the most security-aware employees.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;sits down with Director of Threat Research at N-able,&nbsp;<a href="https://www.linkedin.com/in/kevinbytes/" rel="noopener noreferrer" target="_blank">Kevin O’Connor</a>&nbsp;to unpack how AI is reshaping phishing and what it means for businesses, especially small and medium-sized organizations that often lack the resources to keep up. Drawing on insights from the<a href="https://www.n-able.com/resources/threat-report-2025" rel="noopener noreferrer" target="_blank">&nbsp;N-able Threat Report</a>, O’Connor explains why traditional defenses and old-school user training aren’t enough to stop today’s AI-crafted scams.</p><p>O’Connor says:</p><p><em>“In the past, phishing emails were easy to spot, you’d see clumsy grammar mistakes, generic wording, they were just very obvious</em>.&nbsp;<em>But with the new wave of AI-enabled phishing emails, we’re seeing tailored attacks that pull from social media profiles and other sources. These messages are highly polished, they look convincing, and the worrying part is that attackers can now do this at scale. That means even IT professionals and security pros are at risk.”</em></p><p>Why Even Experts Are Falling for AI-Powered Phishing</p><p>Drawing on insights from the latest&nbsp;<a href="https://www.n-able.com/resources/threat-report-2025" rel="noopener noreferrer" target="_blank">N-able Threat Report</a>, this is why the shift is so dangerous:</p><ul><li>AI is changing the landscape of social engineering. Messages are tailored, credible, and increasingly difficult to block or filter.</li><li>Phishing emails are now more convincing than ever. Attackers can create unique, targeted scams instead of blasting out obvious mass emails.</li><li>Even experts are vulnerable. IT teams and security professionals are no longer immune.</li><li>User training must evolve. Old advice like “look for spelling mistakes” won’t cut it anymore. Employees need new skills to recognize modern threats.</li></ul><br/><p>The conversation also looks ahead at what enterprises can do now to strengthen defenses, updating training, and preparing for a future where AI will play a role on both sides of the cybersecurity battle.</p><h1>Takeaways</h1><ul><li>AI is changing the landscape of social engineering.</li><li>Phishing emails are now more convincing than ever.</li><li>Even tech-savvy employees can fall for scams.</li><li>SMBs are increasingly targeted due to their vulnerabilities.</li><li>User training must evolve to address modern threats.</li><li>Two-factor authentication is critical for financial transactions.</li><li>Organizations need to know their data exposure.</li><li>Incident response planning is essential for preparedness.</li></ul><br/><p>Automated responses can enhance security measures.</p><p>The threat of compromise is a matter of when, not if.</p><h1>Chapters</h1><p>00:00 Introduction to AI-Driven Threats</p><p>02:09 The Evolution of Phishing with AI</p><p>05:42 The Rise of Attacks on SMBs</p><p>08:56 Preventative Measures for Organizations</p><p>12:36 The Future of AI in Cybersecurity</p><h1>About Kevin O’Connor</h1><p><a href="https://www.linkedin.com/in/kevinbytes/" rel="noopener noreferrer" target="_blank">Kevin O’Connor</a>&nbsp;is the Director of Threat Research at&nbsp;<a href="https://www.linkedin.com/company/n-able/" rel="noopener noreferrer" target="_blank">N-Able</a>&nbsp;and brings over eight years of experience in U.S. Intelligence Community and Department of Defense cyber operations, gaining first-hand insight into how nation-state adversaries think and operate. He later applied that expertise in private industry threat research, translating intelligence into practical, enterprise-grade security solutions. O’Connor continues to focus on Threat Research, bringing those capabilities from a startup to a larger organization, increasing reach, insights, and cross-industry impact.</p><p>O’Connor’s strength lies in bridging technical depth with strategic insight. He can analyze advanced persistent threats and kernel-level exploits while advising business leaders on risk, investment, and operations. With expertise in offensive cyber operations, defensive engineering, and threat intelligence, he turns complex security challenges into actionable strategies that help enterprises stay resilient.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">2bcdf1ef-dda9-4a45-8924-dd9bdaad758b</guid><itunes:image href="https://artwork.captivate.fm/8af5cdfe-f954-462c-8335-d7217f7b855f/Untitled-design-2.png"/><pubDate>Tue, 23 Sep 2025 15:56:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/2bcdf1ef-dda9-4a45-8924-dd9bdaad758b.mp3" length="37379448" type="audio/mpeg"/><itunes:duration>15:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode><podcast:season>1</podcast:season></item><item><title>How to Build a Secure Development Workflow in an Era of AI?</title><itunes:title>How to Build a Secure Development Workflow in an Era of AI?</itunes:title><description><![CDATA[<p>"What we're seeing as a response to coding agents is one of the biggest risks in security vulnerabilities to date,” said Jaime Jorge, Founder and CEO of Codacy. “It's almost like a game to see how fast we can exploit vulnerabilities in some of these applications that are created so quickly."</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Jaime Jorge, the Founder and CEO of Codacy, about secure software development in the age of AI.&nbsp;</p><p>The speakers talk about how quickly coding is evolving due to AI tools, the rise of autonomous coding agents, and the major security issues that come from this faster development.&nbsp;</p><p>Jorge emphasised the importance of maintaining security practices and highlighted&nbsp;<a href="https://em360tech.com/solution-providers/codacy" rel="noopener noreferrer" target="_blank">Codacy's</a>&nbsp;role in providing thorough security analysis to ensure that AI-generated code is safe and reliable. The discussion also looks at the future of AI in software development and what IT leaders need to do to manage these changes.</p><h2><strong>Software Development in an Era of AI</strong></h2><p>The world of software development is changing dramatically, the Codacy founder conveyed on the podcast. With AI tools like GitHub Copilot and Cursor becoming mainstream, developers are writing code faster than ever. Host Stiennon refers to this new era as "<a href="https://em360tech.com/tech-articles/what-vibe-coding-understanding-new-era-ai-assisted-development" rel="noopener noreferrer" target="_blank">vibe coding</a>," meaning the ability to create code at an incredible speed.</p><p>However, this speed can bring serious and risky consequences. Data has shown that AI-generated code often has vulnerabilities. Some studies have found that these vulnerabilities can reach as high as 30-50 per cent. A&nbsp;<a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC11128619/#:~:text=This%20behavior%20was%20identified%20early,et%20al.%2C%202023)." rel="noopener noreferrer" target="_blank"><em>Front Big Data</em>&nbsp;study</a>&nbsp;reported that 40% of the code suggested by Copilot had vulnerabilities. “Yet research also shows that users trust AI-generated code more than their own.”</p><p>This trend is widening the gap between quick development and secure, enterprise-grade software.</p><h2>How to Keep up With Autonomous Coding Agents?</h2><p>“Without a doubt, one of the most significant trends that we're seeing is coding agents,” the CEO of Codacy told Stiennon. “Autonomous coding agents are becoming extremely skilled at taking a prompt and creating full-fledged products, getting even to the intentions that users have.”</p><p>However, the challenges of autonomous agents cannot be denied. Jorge believes this is more than just a technical issue. It reflects a basic misunderstanding of how to use these powerful new technologies.</p><p>He pointed out that it's dangerous to assume we can completely hand over decisions about the code generated by AI. Important software development practices, such as building security into the design and having human code reviews, shouldn't be overlooked.&nbsp;</p><p>The convenience of using AI to quickly generate code for a project means we have a greater responsibility to review the code ourselves, to evaluate it, or to ensure that other people approve it.</p><p>Jorge’s key message to CISOs, CTOs and IT decision-makers is that AI is here to stay and that their teams are already likely using it. This wave is hard to ,ride but “you have a choice in how to ride it.”</p><p>"AI-generated code can secure our tools, and our agents are empowered with security capabilities. You can move fast if you have the right guardrails."</p><p>The best practices Codacy developed over decades, such as CI/CD, code review, and security by design, are the tools that can help them use AI effectively.&nbsp;</p><h3><strong>Takeaways</strong></h3><ul><li>AI tools are accelerating software development significantly.</li><li>Autonomous coding agents are becoming increasingly capable.</li><li>The speed of development introduces new security vulnerabilities.</li><li>30-50% of AI-generated code contains vulnerabilities.</li><li>Security practices like code reviews are more important than ever.</li><li>Companies are still defining policies for AI use in coding.</li><li>Codacy provides end-to-end security analysis for code.</li><li>AI can enhance security if integrated properly into workflows.</li><li>IT leaders must adapt to the rapid changes in coding practices.</li><li>The future of coding will involve more collaboration between AI and human developers.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI in Software Development</li><li>02:54 The Rise of Autonomous Coding Agents</li><li>05:47 Security Challenges in Rapid Development</li><li>09:12 Codacy's Approach to Security</li><li>12:08 Future of AI in Software Development</li><li>15:09 Key Takeaways for IT Leaders</li></ul><br/><h2><strong>About Codacy</strong></h2><p><a href="https://www.codacy.com/" rel="noopener noreferrer" target="_blank"><strong>Codacy</strong></a><strong>&nbsp;is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, AppSec scanning, and AI governance tools.</strong></p><p><strong>Codacy integrates seamlessly into existing development workflows, empowering development teams to deliver secure, high-quality software faster.&nbsp;</strong></p><p><strong>Codacy is the only DevSecOps platform that delivers plug-and-play AppSec and Code Quality for AI-generated and human-written code. Future-proof your software – from source code to runtime – without extra servers or build steps. Deploy within minutes and stay ahead of emerging risks today.</strong></p>]]></description><content:encoded><![CDATA[<p>"What we're seeing as a response to coding agents is one of the biggest risks in security vulnerabilities to date,” said Jaime Jorge, Founder and CEO of Codacy. “It's almost like a game to see how fast we can exploit vulnerabilities in some of these applications that are created so quickly."</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Jaime Jorge, the Founder and CEO of Codacy, about secure software development in the age of AI.&nbsp;</p><p>The speakers talk about how quickly coding is evolving due to AI tools, the rise of autonomous coding agents, and the major security issues that come from this faster development.&nbsp;</p><p>Jorge emphasised the importance of maintaining security practices and highlighted&nbsp;<a href="https://em360tech.com/solution-providers/codacy" rel="noopener noreferrer" target="_blank">Codacy's</a>&nbsp;role in providing thorough security analysis to ensure that AI-generated code is safe and reliable. The discussion also looks at the future of AI in software development and what IT leaders need to do to manage these changes.</p><h2><strong>Software Development in an Era of AI</strong></h2><p>The world of software development is changing dramatically, the Codacy founder conveyed on the podcast. With AI tools like GitHub Copilot and Cursor becoming mainstream, developers are writing code faster than ever. Host Stiennon refers to this new era as "<a href="https://em360tech.com/tech-articles/what-vibe-coding-understanding-new-era-ai-assisted-development" rel="noopener noreferrer" target="_blank">vibe coding</a>," meaning the ability to create code at an incredible speed.</p><p>However, this speed can bring serious and risky consequences. Data has shown that AI-generated code often has vulnerabilities. Some studies have found that these vulnerabilities can reach as high as 30-50 per cent. A&nbsp;<a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC11128619/#:~:text=This%20behavior%20was%20identified%20early,et%20al.%2C%202023)." rel="noopener noreferrer" target="_blank"><em>Front Big Data</em>&nbsp;study</a>&nbsp;reported that 40% of the code suggested by Copilot had vulnerabilities. “Yet research also shows that users trust AI-generated code more than their own.”</p><p>This trend is widening the gap between quick development and secure, enterprise-grade software.</p><h2>How to Keep up With Autonomous Coding Agents?</h2><p>“Without a doubt, one of the most significant trends that we're seeing is coding agents,” the CEO of Codacy told Stiennon. “Autonomous coding agents are becoming extremely skilled at taking a prompt and creating full-fledged products, getting even to the intentions that users have.”</p><p>However, the challenges of autonomous agents cannot be denied. Jorge believes this is more than just a technical issue. It reflects a basic misunderstanding of how to use these powerful new technologies.</p><p>He pointed out that it's dangerous to assume we can completely hand over decisions about the code generated by AI. Important software development practices, such as building security into the design and having human code reviews, shouldn't be overlooked.&nbsp;</p><p>The convenience of using AI to quickly generate code for a project means we have a greater responsibility to review the code ourselves, to evaluate it, or to ensure that other people approve it.</p><p>Jorge’s key message to CISOs, CTOs and IT decision-makers is that AI is here to stay and that their teams are already likely using it. This wave is hard to ,ride but “you have a choice in how to ride it.”</p><p>"AI-generated code can secure our tools, and our agents are empowered with security capabilities. You can move fast if you have the right guardrails."</p><p>The best practices Codacy developed over decades, such as CI/CD, code review, and security by design, are the tools that can help them use AI effectively.&nbsp;</p><h3><strong>Takeaways</strong></h3><ul><li>AI tools are accelerating software development significantly.</li><li>Autonomous coding agents are becoming increasingly capable.</li><li>The speed of development introduces new security vulnerabilities.</li><li>30-50% of AI-generated code contains vulnerabilities.</li><li>Security practices like code reviews are more important than ever.</li><li>Companies are still defining policies for AI use in coding.</li><li>Codacy provides end-to-end security analysis for code.</li><li>AI can enhance security if integrated properly into workflows.</li><li>IT leaders must adapt to the rapid changes in coding practices.</li><li>The future of coding will involve more collaboration between AI and human developers.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to AI in Software Development</li><li>02:54 The Rise of Autonomous Coding Agents</li><li>05:47 Security Challenges in Rapid Development</li><li>09:12 Codacy's Approach to Security</li><li>12:08 Future of AI in Software Development</li><li>15:09 Key Takeaways for IT Leaders</li></ul><br/><h2><strong>About Codacy</strong></h2><p><a href="https://www.codacy.com/" rel="noopener noreferrer" target="_blank"><strong>Codacy</strong></a><strong>&nbsp;is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, AppSec scanning, and AI governance tools.</strong></p><p><strong>Codacy integrates seamlessly into existing development workflows, empowering development teams to deliver secure, high-quality software faster.&nbsp;</strong></p><p><strong>Codacy is the only DevSecOps platform that delivers plug-and-play AppSec and Code Quality for AI-generated and human-written code. Future-proof your software – from source code to runtime – without extra servers or build steps. Deploy within minutes and stay ahead of emerging risks today.</strong></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">5676a723-1b47-4e10-b408-6e84d6e3ae32</guid><itunes:image href="https://artwork.captivate.fm/ec6e86b0-8948-45b6-aeb7-7741db8b872c/78-Coding-agents-are-becoming-extremely-skilled-at-creating-pro.jpg"/><pubDate>Fri, 19 Sep 2025 14:37:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/5676a723-1b47-4e10-b408-6e84d6e3ae32.mp3" length="14522097" type="audio/mpeg"/><itunes:duration>15:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How to Build a Secure Development Workflow in an Era of AI?"><podcast:source uri="https://youtu.be/C4Kob3hu5W8"/></podcast:alternateEnclosure></item><item><title>How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</title><itunes:title>How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges</itunes:title><description><![CDATA[<p>"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,” stated Eva Abergel, the Senior Solution Expert at Radware.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Richard Stiennon, the Chief Research Analyst at IT-Harvest, an author and a trusted cybersecurity advisor, speaks with Abergel about how Hypertext Transfer Protocol Secure (HTTPS) encryption is creating new challenges for cybersecurity professionals.&nbsp;</p><p>They also talked about how&nbsp;<a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a>&nbsp;have changed to take advantage of new weaknesses that are hidden in plain sight within encrypted traffic. They discussed what organisations need to do to improve their defences.</p><h2>HTTPS Encryption Creating Challenges for Defenders</h2><p>Hypertext Transfer Protocol Secure (HTTPS) encryption is known to have made the internet safer, especially from DDoS attacks. However, it has also created new opportunities for attackers. Threat actors in the modern day are leveraging encrypted traffic to camouflage malicious activity. Unfortunately, traditional cybersecurity tools have been unsuccessful at spotting and blocking these hidden attacks. This is simply because they cannot decrypt the data of such modern-day cyber breaches.</p><p>Abergel says that unless an organisation can decrypt the traffic, it cannot see what's inside, allowing sophisticated DDoS attacks to go undetected. This presents a dilemma for IT decision-makers, as they are understandably reluctant to surrender the "keys to their castle" by allowing a third party to decrypt their protection walls.</p><p>Especially, with the rise of “tsunami attacks”, in other words, DDoS attacks, the network layer becomes more vulnerable. Attackers deliberately target the application layer of a protected network to overwhelm the application, not the entire network.&nbsp;</p><p>Essentially, hackers take advantage of a grey area in cybersecurity, explains Abergel. "WAFs are not equipped to deal with sophisticated web DDoS attacks. And network layer mechanisms and defences for DDoS attacks cannot recognise a DDoS attack on the application layer only by looking at the network layer."</p><p>This means attackers found a comfortable and effective spot to launch their campaigns, often without severe consequences.</p><p><a href="https://em360tech.com/podcasts/prompt-engineering-agentic-ai-new-frontier-cyber-threats" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</em></strong></a></p><h2>How to Protect Your Business Without Compromising Your Keys</h2><p>What is the solution when an organisation can't share their encryption keys? This is a major concern, especially for regulated industries that are legally prohibited from sharing this sensitive information to even the most trusted cybersecurity firms.&nbsp;</p><p>To learn more about the solution, and how Radware can help you defend against modern cybersecurity threats, watch the podcast on&nbsp;<a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360tech.com</a>. You can watch the video version on our YouTube channel,&nbsp;<a href="https://www.youtube.com/watch?v=C2mR_CRxt6k&amp;list=PLXoSlBGE35NooDaiZh9e1OtBCEpUfLfZ3" rel="noopener noreferrer" target="_blank">@EM360Tech</a>, or listen to the audio version on EM360Tech’s Spotify series,&nbsp;<a href="https://open.spotify.com/show/5gcaJBBVwuZZNhJ6fzmowU" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>DDoS attacks have evolved significantly since their inception.</li><li>HTTPS encryption, while beneficial, has created new vulnerabilities.</li><li>Modern DDoS attacks often mimic legitimate traffic, complicating detection.</li><li>AI is accelerating the sophistication of DDoS attacks.</li><li>Organisations must balance user experience with security measures.</li><li>The financial sector faces severe consequences from DDoS downtime.</li><li>Solutions exist that do not require sharing encryption keys.</li><li>CISOs should seek tailored solutions for their specific needs.</li><li>Understanding the threat landscape is crucial for effective defence.</li><li>Proactive measures are essential to stay ahead of evolving threats.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to DDoS Attacks and Their Evolution</li><li>02:52 The Impact of HTTPS on DDoS Attacks</li><li>06:08 Modern DDoS Attacks: Scale and Sophistication</li><li>08:46 AI's Role in DDoS Attacks</li><li>12:05 Challenges in Mitigating Application Layer DDoS Attacks</li><li>14:58 Finding Solutions Without Decryption Keys</li><li>17:02 Key Takeaways for IT Decision Makers</li></ul><br/>]]></description><content:encoded><![CDATA[<p>"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,” stated Eva Abergel, the Senior Solution Expert at Radware.</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist Podcast</strong></a>, Richard Stiennon, the Chief Research Analyst at IT-Harvest, an author and a trusted cybersecurity advisor, speaks with Abergel about how Hypertext Transfer Protocol Secure (HTTPS) encryption is creating new challenges for cybersecurity professionals.&nbsp;</p><p>They also talked about how&nbsp;<a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a>&nbsp;have changed to take advantage of new weaknesses that are hidden in plain sight within encrypted traffic. They discussed what organisations need to do to improve their defences.</p><h2>HTTPS Encryption Creating Challenges for Defenders</h2><p>Hypertext Transfer Protocol Secure (HTTPS) encryption is known to have made the internet safer, especially from DDoS attacks. However, it has also created new opportunities for attackers. Threat actors in the modern day are leveraging encrypted traffic to camouflage malicious activity. Unfortunately, traditional cybersecurity tools have been unsuccessful at spotting and blocking these hidden attacks. This is simply because they cannot decrypt the data of such modern-day cyber breaches.</p><p>Abergel says that unless an organisation can decrypt the traffic, it cannot see what's inside, allowing sophisticated DDoS attacks to go undetected. This presents a dilemma for IT decision-makers, as they are understandably reluctant to surrender the "keys to their castle" by allowing a third party to decrypt their protection walls.</p><p>Especially, with the rise of “tsunami attacks”, in other words, DDoS attacks, the network layer becomes more vulnerable. Attackers deliberately target the application layer of a protected network to overwhelm the application, not the entire network.&nbsp;</p><p>Essentially, hackers take advantage of a grey area in cybersecurity, explains Abergel. "WAFs are not equipped to deal with sophisticated web DDoS attacks. And network layer mechanisms and defences for DDoS attacks cannot recognise a DDoS attack on the application layer only by looking at the network layer."</p><p>This means attackers found a comfortable and effective spot to launch their campaigns, often without severe consequences.</p><p><a href="https://em360tech.com/podcasts/prompt-engineering-agentic-ai-new-frontier-cyber-threats" rel="noopener noreferrer" target="_blank"><strong><em>Also Watch: From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</em></strong></a></p><h2>How to Protect Your Business Without Compromising Your Keys</h2><p>What is the solution when an organisation can't share their encryption keys? This is a major concern, especially for regulated industries that are legally prohibited from sharing this sensitive information to even the most trusted cybersecurity firms.&nbsp;</p><p>To learn more about the solution, and how Radware can help you defend against modern cybersecurity threats, watch the podcast on&nbsp;<a href="http://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360tech.com</a>. You can watch the video version on our YouTube channel,&nbsp;<a href="https://www.youtube.com/watch?v=C2mR_CRxt6k&amp;list=PLXoSlBGE35NooDaiZh9e1OtBCEpUfLfZ3" rel="noopener noreferrer" target="_blank">@EM360Tech</a>, or listen to the audio version on EM360Tech’s Spotify series,&nbsp;<a href="https://open.spotify.com/show/5gcaJBBVwuZZNhJ6fzmowU" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>.</p><h3><strong>Takeaways</strong></h3><ul><li>DDoS attacks have evolved significantly since their inception.</li><li>HTTPS encryption, while beneficial, has created new vulnerabilities.</li><li>Modern DDoS attacks often mimic legitimate traffic, complicating detection.</li><li>AI is accelerating the sophistication of DDoS attacks.</li><li>Organisations must balance user experience with security measures.</li><li>The financial sector faces severe consequences from DDoS downtime.</li><li>Solutions exist that do not require sharing encryption keys.</li><li>CISOs should seek tailored solutions for their specific needs.</li><li>Understanding the threat landscape is crucial for effective defence.</li><li>Proactive measures are essential to stay ahead of evolving threats.</li></ul><br/><h3><strong>Chapters</strong></h3><ul><li>00:00 Introduction to DDoS Attacks and Their Evolution</li><li>02:52 The Impact of HTTPS on DDoS Attacks</li><li>06:08 Modern DDoS Attacks: Scale and Sophistication</li><li>08:46 AI's Role in DDoS Attacks</li><li>12:05 Challenges in Mitigating Application Layer DDoS Attacks</li><li>14:58 Finding Solutions Without Decryption Keys</li><li>17:02 Key Takeaways for IT Decision Makers</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">97b683f4-c4fd-489a-9b17-9f25fc2be3a3</guid><itunes:image href="https://artwork.captivate.fm/69047543-6968-48ad-9714-a57ce4b120ed/69-If-a-business-doesn-t-have-a-specific-security-layer-to-prot.jpg"/><pubDate>Wed, 10 Sep 2025 15:58:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/97b683f4-c4fd-489a-9b17-9f25fc2be3a3.mp3" length="17697136" type="audio/mpeg"/><itunes:duration>18:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges"><podcast:source uri="https://youtu.be/9jK8bsmGGw4"/></podcast:alternateEnclosure></item><item><title>Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary</title><itunes:title>Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary</itunes:title><description><![CDATA[<p>“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-founder of&nbsp;<a href="https://em360tech.com/solution-providers/acalvio-technologies" rel="noopener noreferrer" target="_blank">Acalvio</a>. “It’s like putting locks on doors. The problem is that more people are finding ways to cross those boundaries and enter your business at an alarming rate.”</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Chris Steffen, the Vice President of Security Research at Enterprise Management Associates (EMA), sits down with Varadarajan to talk about how deception is changing threat detection in compromised enterprise environments.&nbsp;</p><p>The CEO of&nbsp;<a href="https://www.acalvio.com/about-us/" rel="noopener noreferrer" target="_blank">Acalvio</a>, alluding to the main issue in modern cybersecurity, explains that the old security model, which aims to create an impenetrable perimeter, is no longer enough. Attackers, equipped with more advanced tools, are discovering new methods to bypass these defences. The old "fortress mentality" is outdated.</p><h2><strong>Assume Compromise!</strong></h2><p>Both Varadarajan and Steffen agree that modern-day cybersecurity is not a matter of if an attacker will get in, but it's about anticipating when the attacker will get in. This mindset, referred to as "assumed compromise," means that a determined attacker will eventually find a way inside your network, especially with AI in the picture.</p><p>Varadarajan explains, "The defender has to be right all the time in stopping the attacker at the door, whereas the attacker needs to be only right once to get past the perimeter and get inside the house."</p><p>This imbalance gives attackers a significant edge. The vast number of entry points—from on-premise systems to cloud services and remote access—makes it impossible to secure each one perfectly. Consequently, the focus should be on what happens after an attacker is inside.</p><p>So, how are businesses approaching such constantly looming threats?</p><h2><strong>Deception: A Preemptive Strike</strong></h2><p>This is where&nbsp;<a href="https://em360tech.com/top-10/top-10-deception-technology-software-options" rel="noopener noreferrer" target="_blank">deception technology</a>&nbsp;becomes an effective, proactive defense strategy. Instead of waiting for a breach to happen and then trying to fix the damage, deception actively engages and misleads the attacker.</p><p>"If you're assuming that the attacker is going to be inside, the question is how do you find these attackers and bad actors quickly and precisely so that you can conduct the enterprise's business?,” elucidates Varadarajan.</p><p><a href="https://em360tech.com/tech-articles/why-should-organisations-consider-deception-technology-bolster-their-cybersecurity" rel="noopener noreferrer" target="_blank">Deception technology</a>&nbsp;creates a web of fake assets, data, and credentials, forming a digital minefield for attackers. When an attacker tries to move laterally through the network or gain higher privileges, they interact with these decoys. This interaction provides an immediate, clear signal that a malicious actor is present, allowing defenders to stop them before they can reach their real target.</p><p>The old methods of securing a network are no longer enough, agree both Varadarajan and Steffen. The rise of sophisticated, AI-driven attacks requires a new, proactive approach.</p><p>"Preemptive defense based on deception is a very legitimate and well-understood way of solving this problem,” stated Varadarajan.</p><p>Enterprises are advised to switch strategy from defending the perimeter to actively deceiving and identifying within the network. This would help organisations to regain control. Deception technology offers a vital home-field advantage, making it an important part of any modern cybersecurity strategy.</p><h3>Takeaways</h3><ul><li>Deception technology is a natural and effective strategy in cybersecurity.</li><li>Traditional perimeter defenses are no longer sufficient against modern threats.</li><li>The 'assumed breach' mindset is essential for contemporary cybersecurity strategies.</li><li>Operationalizing deception technology can significantly enhance threat detection.</li><li>AI can streamline the creation and management of deception environments.</li><li>Preemptive defense is more effective than reactive strategies in cybersecurity.</li><li>Organizations must adapt to the increasing number of entry points into their networks.</li><li>Reducing dwell time for attackers is crucial for effective defense.</li><li>Cybersecurity strategies should account for both external and internal threats.</li><li>Deception technology can help identify both active attackers and dormant malware.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity Challenges</li><li>03:05 Understanding Deception Technology</li><li>06:14 Shortcomings of Conventional Cybersecurity</li><li>09:11 The Shift from Fortress Mentality</li><li>12:03 Assumed Breach: The New Normal</li><li>15:00 Operationalizing Deception Technology</li><li>18:01 The Role of AI in Cybersecurity</li><li>21:03 Velocity of Cyber Attacks</li><li>23:46 Preemptive Defense Strategies</li><li>26:59 Key Takeaways and Conclusion</li></ul><br/>]]></description><content:encoded><![CDATA[<p>“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-founder of&nbsp;<a href="https://em360tech.com/solution-providers/acalvio-technologies" rel="noopener noreferrer" target="_blank">Acalvio</a>. “It’s like putting locks on doors. The problem is that more people are finding ways to cross those boundaries and enter your business at an alarming rate.”</p><p>In the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Chris Steffen, the Vice President of Security Research at Enterprise Management Associates (EMA), sits down with Varadarajan to talk about how deception is changing threat detection in compromised enterprise environments.&nbsp;</p><p>The CEO of&nbsp;<a href="https://www.acalvio.com/about-us/" rel="noopener noreferrer" target="_blank">Acalvio</a>, alluding to the main issue in modern cybersecurity, explains that the old security model, which aims to create an impenetrable perimeter, is no longer enough. Attackers, equipped with more advanced tools, are discovering new methods to bypass these defences. The old "fortress mentality" is outdated.</p><h2><strong>Assume Compromise!</strong></h2><p>Both Varadarajan and Steffen agree that modern-day cybersecurity is not a matter of if an attacker will get in, but it's about anticipating when the attacker will get in. This mindset, referred to as "assumed compromise," means that a determined attacker will eventually find a way inside your network, especially with AI in the picture.</p><p>Varadarajan explains, "The defender has to be right all the time in stopping the attacker at the door, whereas the attacker needs to be only right once to get past the perimeter and get inside the house."</p><p>This imbalance gives attackers a significant edge. The vast number of entry points—from on-premise systems to cloud services and remote access—makes it impossible to secure each one perfectly. Consequently, the focus should be on what happens after an attacker is inside.</p><p>So, how are businesses approaching such constantly looming threats?</p><h2><strong>Deception: A Preemptive Strike</strong></h2><p>This is where&nbsp;<a href="https://em360tech.com/top-10/top-10-deception-technology-software-options" rel="noopener noreferrer" target="_blank">deception technology</a>&nbsp;becomes an effective, proactive defense strategy. Instead of waiting for a breach to happen and then trying to fix the damage, deception actively engages and misleads the attacker.</p><p>"If you're assuming that the attacker is going to be inside, the question is how do you find these attackers and bad actors quickly and precisely so that you can conduct the enterprise's business?,” elucidates Varadarajan.</p><p><a href="https://em360tech.com/tech-articles/why-should-organisations-consider-deception-technology-bolster-their-cybersecurity" rel="noopener noreferrer" target="_blank">Deception technology</a>&nbsp;creates a web of fake assets, data, and credentials, forming a digital minefield for attackers. When an attacker tries to move laterally through the network or gain higher privileges, they interact with these decoys. This interaction provides an immediate, clear signal that a malicious actor is present, allowing defenders to stop them before they can reach their real target.</p><p>The old methods of securing a network are no longer enough, agree both Varadarajan and Steffen. The rise of sophisticated, AI-driven attacks requires a new, proactive approach.</p><p>"Preemptive defense based on deception is a very legitimate and well-understood way of solving this problem,” stated Varadarajan.</p><p>Enterprises are advised to switch strategy from defending the perimeter to actively deceiving and identifying within the network. This would help organisations to regain control. Deception technology offers a vital home-field advantage, making it an important part of any modern cybersecurity strategy.</p><h3>Takeaways</h3><ul><li>Deception technology is a natural and effective strategy in cybersecurity.</li><li>Traditional perimeter defenses are no longer sufficient against modern threats.</li><li>The 'assumed breach' mindset is essential for contemporary cybersecurity strategies.</li><li>Operationalizing deception technology can significantly enhance threat detection.</li><li>AI can streamline the creation and management of deception environments.</li><li>Preemptive defense is more effective than reactive strategies in cybersecurity.</li><li>Organizations must adapt to the increasing number of entry points into their networks.</li><li>Reducing dwell time for attackers is crucial for effective defense.</li><li>Cybersecurity strategies should account for both external and internal threats.</li><li>Deception technology can help identify both active attackers and dormant malware.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity Challenges</li><li>03:05 Understanding Deception Technology</li><li>06:14 Shortcomings of Conventional Cybersecurity</li><li>09:11 The Shift from Fortress Mentality</li><li>12:03 Assumed Breach: The New Normal</li><li>15:00 Operationalizing Deception Technology</li><li>18:01 The Role of AI in Cybersecurity</li><li>21:03 Velocity of Cyber Attacks</li><li>23:46 Preemptive Defense Strategies</li><li>26:59 Key Takeaways and Conclusion</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d721a66c-ff37-4ce7-aa59-efc878312a89</guid><itunes:image href="https://artwork.captivate.fm/b7130841-ca48-4a67-bbef-28f81461d92a/64-Operationalising-deception-technology-has-been-the-Achilles-.jpg"/><pubDate>Tue, 09 Sep 2025 10:07:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/d721a66c-ff37-4ce7-aa59-efc878312a89.mp3" length="29293072" type="audio/mpeg"/><itunes:duration>30:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary"><podcast:source uri="https://youtu.be/sXPPZ-TXoes"/></podcast:alternateEnclosure></item><item><title>Phishing-Resistant Authentication: A Strategic Imperative for CISOs</title><itunes:title>Phishing-Resistant Authentication: A Strategic Imperative for CISOs</itunes:title><description><![CDATA[<p>Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show that attackers continue to bypass traditional protections. In this episode of&nbsp;<em>The Security Strategist</em>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/company/yubico/" rel="noopener noreferrer" target="_blank">Nic Sarginson</a>, senior solutions engineer at Yubico.</p><p>Together, they explore the vulnerabilities of passwords and conventional MFA, and why&nbsp;<a href="https://em360tech.com/tech-articles/are-your-password-practices-secure-you-think" rel="noopener noreferrer" target="_blank">phishing-resistant authentication</a>&nbsp;is no longer optional; it’s a strategic imperative for chief information security officers (CISOs).</p><p><em>"Passwords alone just don’t cut it,"</em>&nbsp;says Sarginson. Hackers can launch sophisticated attacks in minutes, and traditional MFA often isn’t enough to stop them. Organisations should turn to device-bound passkeys and physical security keys not just as tools, but as a way to rethink enterprise security, stay ahead of compliance pressures, and embrace a passwordless future.</p><p><em>"Attackers can now launch sophisticated campaigns quickly and cheaply using publicly available data. That’s why breaches today are far more dangerous, and why weak MFA or social engineering is often involved."</em>&nbsp;— Nic Sarginson, Yubico,</p><h2>Why This Matters for CISOs</h2><p>Cybersecurity leaders face growing pressure to defend against&nbsp;<a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">phishing attacks</a>, navigate evolving compliance demands, and deliver secure experiences for users. Sarginson shares practical strategies, expert insights, and real-world examples to help CISOs and IT leaders build a stronger, passwordless future.</p><h2>Takeaways</h2><ul><li>Passwords are fundamentally broken and pose a major vulnerability.</li><li>Recent breaches highlight the inadequacy of traditional MFA.</li><li>Device-bound passkeys offer stronger protection against phishing.</li><li>Integration of new security methods is a significant challenge for enterprises.</li><li>Real-world case studies show measurable improvements with security keys.</li><li>Regulatory frameworks are increasingly mandating strong MFA.</li><li>Phishing resistance must become the default in security strategies.</li><li>The technology for passwordless solutions is now prevalent.</li><li>Security leaders must advocate for proactive security measures.</li><li>User education is crucial for the adoption of new security technologies.</li><li><br></li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Authentication Challenges</p><p>02:15 The Impact of Recent Data Breaches</p><p>05:30 The Entrenchment of Passwords and MFA</p><p>08:22 Exploring Device Bound Passkeys</p><p>11:20 Integrating Physical Security Keys</p><p>14:34 Real-World Case Studies and Metrics</p><p>17:24 Regulatory Pressures and Future Trends</p><p>20:27 The Path to Passwordless Security</p><h2>About Nic Sarginson</h2><p><a href="https://www.infosecurity-magazine.com/opinions/misconceptions-mobile/" rel="noopener noreferrer" target="_blank">Nic Sarginson&nbsp;</a>is a senior solutions engineer for UKI and RSA at&nbsp;<a href="https://www.yubico.com/resource/phishing-resistant-mfa-deployment-best-practices-zero-trust/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=Zero-Trust_Download_Best-Practice-Phishing-Resistant-MFA-ToFu-GA_701Wy00000IlJHy_Search_EMEA&amp;gad_source=1&amp;gad_campaignid=22776845238&amp;gbraid=0AAAAApRlY92vM5l-kWOiUC0a2FZesjBM9&amp;gclid=Cj0KCQjw8eTFBhCXARIsAIkiuOxajORV8YNFGEvw2XwjPYvIKxe-AFMsdz_GrMDR3TslqgqiX4lmJs8aAli2EALw_wcB" rel="noopener noreferrer" target="_blank">Yubico</a>. An industry veteran, he has held a range of roles in cybersecurity and enterprise solutions, helping organisations adopt strong authentication methods and enhance their phishing resistance strategies.</p>]]></description><content:encoded><![CDATA[<p>Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show that attackers continue to bypass traditional protections. In this episode of&nbsp;<em>The Security Strategist</em>, host&nbsp;<a href="https://www.linkedin.com/in/trisha-pillay-5445531b/" rel="noopener noreferrer" target="_blank">Trisha Pillay</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/company/yubico/" rel="noopener noreferrer" target="_blank">Nic Sarginson</a>, senior solutions engineer at Yubico.</p><p>Together, they explore the vulnerabilities of passwords and conventional MFA, and why&nbsp;<a href="https://em360tech.com/tech-articles/are-your-password-practices-secure-you-think" rel="noopener noreferrer" target="_blank">phishing-resistant authentication</a>&nbsp;is no longer optional; it’s a strategic imperative for chief information security officers (CISOs).</p><p><em>"Passwords alone just don’t cut it,"</em>&nbsp;says Sarginson. Hackers can launch sophisticated attacks in minutes, and traditional MFA often isn’t enough to stop them. Organisations should turn to device-bound passkeys and physical security keys not just as tools, but as a way to rethink enterprise security, stay ahead of compliance pressures, and embrace a passwordless future.</p><p><em>"Attackers can now launch sophisticated campaigns quickly and cheaply using publicly available data. That’s why breaches today are far more dangerous, and why weak MFA or social engineering is often involved."</em>&nbsp;— Nic Sarginson, Yubico,</p><h2>Why This Matters for CISOs</h2><p>Cybersecurity leaders face growing pressure to defend against&nbsp;<a href="https://em360tech.com/tech-articles/7-risks-shadow-it-and-how-mitigate-them" rel="noopener noreferrer" target="_blank">phishing attacks</a>, navigate evolving compliance demands, and deliver secure experiences for users. Sarginson shares practical strategies, expert insights, and real-world examples to help CISOs and IT leaders build a stronger, passwordless future.</p><h2>Takeaways</h2><ul><li>Passwords are fundamentally broken and pose a major vulnerability.</li><li>Recent breaches highlight the inadequacy of traditional MFA.</li><li>Device-bound passkeys offer stronger protection against phishing.</li><li>Integration of new security methods is a significant challenge for enterprises.</li><li>Real-world case studies show measurable improvements with security keys.</li><li>Regulatory frameworks are increasingly mandating strong MFA.</li><li>Phishing resistance must become the default in security strategies.</li><li>The technology for passwordless solutions is now prevalent.</li><li>Security leaders must advocate for proactive security measures.</li><li>User education is crucial for the adoption of new security technologies.</li><li><br></li></ul><br/><h2>Chapters</h2><p>00:00 Introduction to Authentication Challenges</p><p>02:15 The Impact of Recent Data Breaches</p><p>05:30 The Entrenchment of Passwords and MFA</p><p>08:22 Exploring Device Bound Passkeys</p><p>11:20 Integrating Physical Security Keys</p><p>14:34 Real-World Case Studies and Metrics</p><p>17:24 Regulatory Pressures and Future Trends</p><p>20:27 The Path to Passwordless Security</p><h2>About Nic Sarginson</h2><p><a href="https://www.infosecurity-magazine.com/opinions/misconceptions-mobile/" rel="noopener noreferrer" target="_blank">Nic Sarginson&nbsp;</a>is a senior solutions engineer for UKI and RSA at&nbsp;<a href="https://www.yubico.com/resource/phishing-resistant-mfa-deployment-best-practices-zero-trust/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=Zero-Trust_Download_Best-Practice-Phishing-Resistant-MFA-ToFu-GA_701Wy00000IlJHy_Search_EMEA&amp;gad_source=1&amp;gad_campaignid=22776845238&amp;gbraid=0AAAAApRlY92vM5l-kWOiUC0a2FZesjBM9&amp;gclid=Cj0KCQjw8eTFBhCXARIsAIkiuOxajORV8YNFGEvw2XwjPYvIKxe-AFMsdz_GrMDR3TslqgqiX4lmJs8aAli2EALw_wcB" rel="noopener noreferrer" target="_blank">Yubico</a>. An industry veteran, he has held a range of roles in cybersecurity and enterprise solutions, helping organisations adopt strong authentication methods and enhance their phishing resistance strategies.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">435b8886-f846-47e5-b259-187e5790f8c0</guid><itunes:image href="https://artwork.captivate.fm/0dead8c7-1ac5-472a-a50b-68567e7dadad/Untitled-design-7.png"/><pubDate>Thu, 04 Sep 2025 14:46:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/435b8886-f846-47e5-b259-187e5790f8c0.mp3" length="24657700" type="audio/mpeg"/><itunes:duration>25:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is Your Workforce Ready for AI-Driven Cyber Threats?</title><itunes:title>Is Your Workforce Ready for AI-Driven Cyber Threats?</itunes:title><description><![CDATA[<p>"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack at a scale that's never been before humanly possible,” states Sage Wohns, CEO and Founder of Jericho Security.&nbsp;</p><p>In this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Wohns about modern-day&nbsp;<a href="https://em360tech.com/tech-articles/cybersecuritys-ai-problem-too-much-tech-not-enough-communication" rel="noopener noreferrer" target="_blank">cybersecurity threats driven by AI</a>. They discuss the need for a strong security culture, innovative training methods, and the importance of adapting to new attack vectors.&nbsp;</p><p>The founder of&nbsp;<a href="https://www.jerichosecurity.com/" rel="noopener noreferrer" target="_blank">Jericho Security</a>, an AI-powered human risk management platform, talks about the shift from traditional rule-based defences to probabilistic approaches. Additionally, Wohns spotlighted the necessity of using AI to counter AI in the fight against&nbsp;<a href="https://em360tech.com/tech-articles/jaguar-land-rover-hit-by-cyber-attack-amid-tata-motors-profit-slump" rel="noopener noreferrer" target="_blank">cyber threats</a>.&nbsp;</p><h2>Generative AI: A Cause for Concern in Cyber Security</h2><p>The speakers agree that every organisation today has one common and new challenge. It’s the rise of generative AI. This is because gen AI is a tool quickly and widely being used in cyber tech. “We have moved past simple, templated attacks to a new era,” iterated Wohns. Threats have now become more dynamic, personalised, targeted and scalable in ways the world has never witnessed before.</p><p>For years, cybersecurity training has depended on static, rule-based defences. Consider those generic&nbsp;<a href="https://em360tech.com/tech-articles/what-phishing-and-how-can-you-defend-yourself-against-it" rel="noopener noreferrer" target="_blank">phishing emails</a>&nbsp;from a "Nigerian Prince" or a fake Google logo. However, as Wohns points out, attackers no longer follow a script. They are using AI to create complex, multi-channel attacks that can take advantage of publicly available information and stolen data to target individuals.</p><p>This new reality shows that old "checkbox training" is outdated. An attack on a salesperson will differ significantly from an attack on an accountant, and both will be tailored to exploit specific weaknesses. These attacks go beyond emails; they include deepfake voice calls, fake videos, and coordinated messages that blur the line between what is real and what poses a threat.</p><h2>Takeaways</h2><ul><li>AI is rapidly changing the landscape of cyber threats.</li><li>A strong security culture is essential for organisations.</li><li>Traditional training methods are outdated and ineffective.</li><li>Probabilistic defences are needed to counter dynamic attacks.</li><li>Creating a positive security culture encourages reporting mistakes.</li><li>Multi-channel attacks are becoming more sophisticated.</li><li>Generative AI can be used to simulate realistic attacks.</li><li>Tailored training can enhance employee engagement and effectiveness.</li><li>Using real-world data makes training relevant and impactful.</li><li>AI solutions must evolve to keep pace with attackers.</li></ul><br/><h2>Chapters</h2><ul><li>00:00 Introduction to&nbsp;<a href="https://em360tech.com/top-10/top-10-most-notorious-cyber-attacks-history" rel="noopener noreferrer" target="_blank">Cybersecurity</a>&nbsp;and AI Threats</li><li>03:01 The Evolution of Cyber Threats</li><li>05:50 Innovative Approaches to Security Training</li><li>08:55 Probabilistic Defences vs. Rule-Based Systems</li><li>11:49 Creating a Positive Security Culture</li><li>15:02 Multi-Channel Attacks and Emerging Threats</li><li>18:13 Key Takeaways for IT Decision Makers</li></ul><br/><h2>About Jericho Security&nbsp;</h2><p>Jericho Security is transforming cybersecurity training with an AI-powered platform that defends against modern phishing threats. Its proprietary agentic AI delivers multi-channel simulations mimicking real-world attacks across email, voice, messaging, and video. Designed for highly scalable deployments, customizable training and performance tracking. Trusted by the U.S. Department of Defense and honoured with four Global InfoSec Awards at RSA Conference 2025, Jericho is at the forefront of human-centred, AI-driven cyber defence.</p>]]></description><content:encoded><![CDATA[<p>"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack at a scale that's never been before humanly possible,” states Sage Wohns, CEO and Founder of Jericho Security.&nbsp;</p><p>In this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Wohns about modern-day&nbsp;<a href="https://em360tech.com/tech-articles/cybersecuritys-ai-problem-too-much-tech-not-enough-communication" rel="noopener noreferrer" target="_blank">cybersecurity threats driven by AI</a>. They discuss the need for a strong security culture, innovative training methods, and the importance of adapting to new attack vectors.&nbsp;</p><p>The founder of&nbsp;<a href="https://www.jerichosecurity.com/" rel="noopener noreferrer" target="_blank">Jericho Security</a>, an AI-powered human risk management platform, talks about the shift from traditional rule-based defences to probabilistic approaches. Additionally, Wohns spotlighted the necessity of using AI to counter AI in the fight against&nbsp;<a href="https://em360tech.com/tech-articles/jaguar-land-rover-hit-by-cyber-attack-amid-tata-motors-profit-slump" rel="noopener noreferrer" target="_blank">cyber threats</a>.&nbsp;</p><h2>Generative AI: A Cause for Concern in Cyber Security</h2><p>The speakers agree that every organisation today has one common and new challenge. It’s the rise of generative AI. This is because gen AI is a tool quickly and widely being used in cyber tech. “We have moved past simple, templated attacks to a new era,” iterated Wohns. Threats have now become more dynamic, personalised, targeted and scalable in ways the world has never witnessed before.</p><p>For years, cybersecurity training has depended on static, rule-based defences. Consider those generic&nbsp;<a href="https://em360tech.com/tech-articles/what-phishing-and-how-can-you-defend-yourself-against-it" rel="noopener noreferrer" target="_blank">phishing emails</a>&nbsp;from a "Nigerian Prince" or a fake Google logo. However, as Wohns points out, attackers no longer follow a script. They are using AI to create complex, multi-channel attacks that can take advantage of publicly available information and stolen data to target individuals.</p><p>This new reality shows that old "checkbox training" is outdated. An attack on a salesperson will differ significantly from an attack on an accountant, and both will be tailored to exploit specific weaknesses. These attacks go beyond emails; they include deepfake voice calls, fake videos, and coordinated messages that blur the line between what is real and what poses a threat.</p><h2>Takeaways</h2><ul><li>AI is rapidly changing the landscape of cyber threats.</li><li>A strong security culture is essential for organisations.</li><li>Traditional training methods are outdated and ineffective.</li><li>Probabilistic defences are needed to counter dynamic attacks.</li><li>Creating a positive security culture encourages reporting mistakes.</li><li>Multi-channel attacks are becoming more sophisticated.</li><li>Generative AI can be used to simulate realistic attacks.</li><li>Tailored training can enhance employee engagement and effectiveness.</li><li>Using real-world data makes training relevant and impactful.</li><li>AI solutions must evolve to keep pace with attackers.</li></ul><br/><h2>Chapters</h2><ul><li>00:00 Introduction to&nbsp;<a href="https://em360tech.com/top-10/top-10-most-notorious-cyber-attacks-history" rel="noopener noreferrer" target="_blank">Cybersecurity</a>&nbsp;and AI Threats</li><li>03:01 The Evolution of Cyber Threats</li><li>05:50 Innovative Approaches to Security Training</li><li>08:55 Probabilistic Defences vs. Rule-Based Systems</li><li>11:49 Creating a Positive Security Culture</li><li>15:02 Multi-Channel Attacks and Emerging Threats</li><li>18:13 Key Takeaways for IT Decision Makers</li></ul><br/><h2>About Jericho Security&nbsp;</h2><p>Jericho Security is transforming cybersecurity training with an AI-powered platform that defends against modern phishing threats. Its proprietary agentic AI delivers multi-channel simulations mimicking real-world attacks across email, voice, messaging, and video. Designed for highly scalable deployments, customizable training and performance tracking. Trusted by the U.S. Department of Defense and honoured with four Global InfoSec Awards at RSA Conference 2025, Jericho is at the forefront of human-centred, AI-driven cyber defence.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">cd7e3f6e-b3c2-4ec3-8581-7f52af8204cd</guid><itunes:image href="https://artwork.captivate.fm/b9bf93b8-f2d0-4968-8bde-e0f6a3d0fc5d/jericho-security-richard-stiennon-podcast-em360tech.jpg"/><pubDate>Thu, 04 Sep 2025 12:17:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/cd7e3f6e-b3c2-4ec3-8581-7f52af8204cd.mp3" length="17085814" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is Your Workforce Ready for AI-Driven Cyber Threats?"><podcast:source uri="https://youtu.be/L674NQ8nVek"/></podcast:alternateEnclosure></item><item><title>What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?</title><itunes:title>What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?</itunes:title><description><![CDATA[<p>When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything.</p><p>"Think of Hardware Security Modules (HSMs) like a master vault in a bank for an entire organization's digital security," said David Close, Chief Solutions Architect at Futurex. More than just an analogy, this is the reality of how modern enterprises are secured.</p><p>Cybersecurity is full of complexities despite various advancements. Some aspects of it run constantly behind the scenes and occasionally go unnoticed until a breach strikes. Among these essential elements, Hardware Security Modules (HSMs) play a key role in maintaining digital trust.&nbsp;</p><p>In a recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Richard Stiennon explores with Close why HSMs have become the invisible guardians protecting our digital lives.</p><h2>What is a Hardware Security Module (HSM)?</h2><p>At its core, a&nbsp;<a href="https://em360tech.com/tech-articles/what-is-hardware-security-module" rel="noopener noreferrer" target="_blank">Hardware Security Module (HSM)</a>&nbsp;is specialized, tamper-proof hardware that protects cryptographic keys and performs cryptographic operations. Close alludes to an analogy to describe an HSM, stating it's "the vault where you store all the keys to everything. The vault keys, the safety deposit keys, even the digital keys to the security system itself."&nbsp;</p><p>Born in the early 1980s for the payment industry, HSMs have evolved into the root of trust for almost every sector. They verify authenticity and safeguard encryption for tasks like processing payments, signing code, issuing identities, and encrypting sensitive data.&nbsp;</p><p>"If someone gets into the master vault, they don't just have access to one thing. They have access to everything," says Close, illustrating the importance of HSMs for stronger security. This is why regulatory bodies like PCI mandate HSM usage for organizations handling sensitive payment data.</p><p>To make HSMs more accessible and user-friendly,&nbsp;<a href="https://em360tech.com/whitepapers/futurex-next-gen-cloud-payment-hsm" rel="noopener noreferrer" target="_blank">Futurex's main solution</a>&nbsp;is&nbsp;<strong>CryptoHub Cloud</strong>. It works as an HSM as a Service (HSMaaS).</p><p>Close describes HSMaaS as not just a cloud version of HSM but a "centralized cryptographic service provider." Unlike some solutions that operate in shared cloud infrastructure, Futurex's CryptoHub Cloud runs in purpose-built cryptographic environments that are fully isolated.&nbsp;</p><p>Such a unique approach gives customers full control, predictable performance, and independence from the cloud provider's native crypto stack. This is also an important factor for organizations in regulated industries.</p><h2>HSMs Enforce Policy</h2><p>"HSMs don't just solve crypto problems,” says Close, “they create predictability and enforce policy, also allow you to have a true security model that is effective at scale."</p><p>In a world that depends more on digital systems, it is essential to understand and use the power of HSMs. They act as invisible protectors, making sure our most sensitive digital assets remain secure and trustworthy.</p><h3>Takeaways</h3><ul><li>HSMs are essential for protecting cryptographic keys and sensitive data.</li><li>The evolution of HSMs has made them easier to use and integrate into cloud environments.</li><li>Crypto agility allows organizations to adapt to new cryptographic algorithms without replacing existing infrastructure.</li><li>HSMs enforce strict access controls and audit logs for all cryptographic operations.</li><li>Regulatory bodies mandate the use of HSMs for managing sensitive payment data.</li><li>HSMs provide a physical layer of security that software alone cannot offer.</li><li>Organizations can achieve significant performance improvements by offloading cryptographic operations to HSMs.</li><li>Futurex's CryptoHub Cloud offers a centralized cryptographic service for organizations.</li><li>HSMs help organizations meet compliance requirements while leveraging cloud benefits.</li><li>Real-world use cases demonstrate the operational efficiencies gained through HSM deployment.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity and Cryptography</li><li>02:19 Understanding Hardware Security Modules (HSMs)</li><li>08:00 FuturexX CryptoHub Cloud and Its Applications</li><li>11:04 The Importance of HSMs in Payment Security</li><li>13:02 True or False: HSM Myths and Facts</li><li>20:56 Real-World Use Cases of HSMs</li></ul><br/><h2>About Futurex</h2><p>For over 40 years,&nbsp;<a href="https://www.futurex.com/" rel="noopener noreferrer" target="_blank">Futurex</a>&nbsp;has been an award-winning leader and innovator in the encryption market, delivering uncompromising enterprise-grade data security solutions. Over 15,000 organizations worldwide trust Futurex to provide groundbreaking hardware security modules, key management servers, and cloud HSM solutions.</p><p>Futurex is headquartered outside of San Antonio, Texas, with regional offices worldwide and over a dozen data centers across five continents, and delivers unmatched support for its clients’ mission-critical data encryption and key management requirements.</p>]]></description><content:encoded><![CDATA[<p>When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything.</p><p>"Think of Hardware Security Modules (HSMs) like a master vault in a bank for an entire organization's digital security," said David Close, Chief Solutions Architect at Futurex. More than just an analogy, this is the reality of how modern enterprises are secured.</p><p>Cybersecurity is full of complexities despite various advancements. Some aspects of it run constantly behind the scenes and occasionally go unnoticed until a breach strikes. Among these essential elements, Hardware Security Modules (HSMs) play a key role in maintaining digital trust.&nbsp;</p><p>In a recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>, Richard Stiennon explores with Close why HSMs have become the invisible guardians protecting our digital lives.</p><h2>What is a Hardware Security Module (HSM)?</h2><p>At its core, a&nbsp;<a href="https://em360tech.com/tech-articles/what-is-hardware-security-module" rel="noopener noreferrer" target="_blank">Hardware Security Module (HSM)</a>&nbsp;is specialized, tamper-proof hardware that protects cryptographic keys and performs cryptographic operations. Close alludes to an analogy to describe an HSM, stating it's "the vault where you store all the keys to everything. The vault keys, the safety deposit keys, even the digital keys to the security system itself."&nbsp;</p><p>Born in the early 1980s for the payment industry, HSMs have evolved into the root of trust for almost every sector. They verify authenticity and safeguard encryption for tasks like processing payments, signing code, issuing identities, and encrypting sensitive data.&nbsp;</p><p>"If someone gets into the master vault, they don't just have access to one thing. They have access to everything," says Close, illustrating the importance of HSMs for stronger security. This is why regulatory bodies like PCI mandate HSM usage for organizations handling sensitive payment data.</p><p>To make HSMs more accessible and user-friendly,&nbsp;<a href="https://em360tech.com/whitepapers/futurex-next-gen-cloud-payment-hsm" rel="noopener noreferrer" target="_blank">Futurex's main solution</a>&nbsp;is&nbsp;<strong>CryptoHub Cloud</strong>. It works as an HSM as a Service (HSMaaS).</p><p>Close describes HSMaaS as not just a cloud version of HSM but a "centralized cryptographic service provider." Unlike some solutions that operate in shared cloud infrastructure, Futurex's CryptoHub Cloud runs in purpose-built cryptographic environments that are fully isolated.&nbsp;</p><p>Such a unique approach gives customers full control, predictable performance, and independence from the cloud provider's native crypto stack. This is also an important factor for organizations in regulated industries.</p><h2>HSMs Enforce Policy</h2><p>"HSMs don't just solve crypto problems,” says Close, “they create predictability and enforce policy, also allow you to have a true security model that is effective at scale."</p><p>In a world that depends more on digital systems, it is essential to understand and use the power of HSMs. They act as invisible protectors, making sure our most sensitive digital assets remain secure and trustworthy.</p><h3>Takeaways</h3><ul><li>HSMs are essential for protecting cryptographic keys and sensitive data.</li><li>The evolution of HSMs has made them easier to use and integrate into cloud environments.</li><li>Crypto agility allows organizations to adapt to new cryptographic algorithms without replacing existing infrastructure.</li><li>HSMs enforce strict access controls and audit logs for all cryptographic operations.</li><li>Regulatory bodies mandate the use of HSMs for managing sensitive payment data.</li><li>HSMs provide a physical layer of security that software alone cannot offer.</li><li>Organizations can achieve significant performance improvements by offloading cryptographic operations to HSMs.</li><li>Futurex's CryptoHub Cloud offers a centralized cryptographic service for organizations.</li><li>HSMs help organizations meet compliance requirements while leveraging cloud benefits.</li><li>Real-world use cases demonstrate the operational efficiencies gained through HSM deployment.</li></ul><br/><h3>Chapters</h3><ul><li>00:00 Introduction to Cybersecurity and Cryptography</li><li>02:19 Understanding Hardware Security Modules (HSMs)</li><li>08:00 FuturexX CryptoHub Cloud and Its Applications</li><li>11:04 The Importance of HSMs in Payment Security</li><li>13:02 True or False: HSM Myths and Facts</li><li>20:56 Real-World Use Cases of HSMs</li></ul><br/><h2>About Futurex</h2><p>For over 40 years,&nbsp;<a href="https://www.futurex.com/" rel="noopener noreferrer" target="_blank">Futurex</a>&nbsp;has been an award-winning leader and innovator in the encryption market, delivering uncompromising enterprise-grade data security solutions. Over 15,000 organizations worldwide trust Futurex to provide groundbreaking hardware security modules, key management servers, and cloud HSM solutions.</p><p>Futurex is headquartered outside of San Antonio, Texas, with regional offices worldwide and over a dozen data centers across five continents, and delivers unmatched support for its clients’ mission-critical data encryption and key management requirements.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">cc3741c5-63d2-4c25-81ae-918189043dd0</guid><itunes:image href="https://artwork.captivate.fm/0fa7d6e2-5f89-42ae-89b5-314ded2dd1c9/uBKu3p4iXYb_3lb9aUHZHHzE.jpg"/><pubDate>Fri, 01 Aug 2025 11:35:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/cc3741c5-63d2-4c25-81ae-918189043dd0.mp3" length="22751593" type="audio/mpeg"/><itunes:duration>23:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?"><podcast:source uri="https://youtu.be/C2mR_CRxt6k"/></podcast:alternateEnclosure></item><item><title>How Can Global Marketplaces Master Payment Security and Combat Fraud?</title><itunes:title>How Can Global Marketplaces Master Payment Security and Combat Fraud?</itunes:title><description><![CDATA[<p>"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is always a human being,”&nbsp;<a href="https://www.linkedin.com/in/bartosz-skwarczek-37183015/" rel="noopener noreferrer" target="_blank"><strong>Bartosz Skwarczek</strong></a>, Founder &amp; President at G2A Capital Group, reflectively said.&nbsp;</p><p>The quote sets the tone of the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>. In this episode,&nbsp;<a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank"><strong>Shubhangi Dua</strong></a>, Podcast Host and Producer, sits down with Skwarczek, an award-winning CEO&nbsp;<a href="https://councils.forbes.com/profile/Bartosz-Skwarczek-Founder-President-Supervisory-Board-G2A-Capital-Group/ddf1b9f9-ba5f-486d-a8f2-c15e6b572bc1" rel="noopener noreferrer" target="_blank"><strong>recognised by&nbsp;<em>Forbes</em></strong></a>. They talk about the evolution of online marketplaces, the importance of security, and the role of people in business.&nbsp;</p><p>They discuss the challenges of operating a global marketplace, the significance of diversity in teams, and the future of payment security technologies.&nbsp;</p><p>Bartosz emphasises the importance of a proactive approach to cybersecurity and the use of AI in business operations. He also highlights the essential role of human values and communication in creating a successful organisation.</p><h2><strong>Proactive and Multi-Layered Approach to Cybersecurity</strong></h2><p>Security is a top priority for G2A, Skwarczek articulated. He adds that it's a "constant improvement" and a "kind of battle that you have with the bad actors." To stay "one step ahead of attackers," G2A deploys a multi-layered defence strategy.</p><p>The multi-layered strategy starts with careful monitoring of threat intelligence channels to ensure organisations stay on top of the latest&nbsp;<a href="https://em360tech.com/top-10/types-of-cyber-attacks" rel="noopener noreferrer" target="_blank">threats, vulnerabilities, and methods</a>&nbsp;used by&nbsp;<a href="https://em360tech.com/top-10/best-hackers-in-the-world" rel="noopener noreferrer" target="_blank">malicious actors</a>.</p><p>A dedicated incident response team has clearly defined roles and responsibilities. They can respond immediately to any security incidents, especially those related to different types of fraud, such as friendly fraud (chargeback fraud) or traditional credit card fraud.&nbsp;</p><p>Skwarczek says that employee training is extremely important. G2A conducts mandatory training every month for its employees, assuring they know how to avoid common mistakes like phishing emails. Especially considering that over 3 million&nbsp;<a href="https://em360tech.com/tech-articles/what-phishing-and-how-can-you-defend-yourself-against-it" rel="noopener noreferrer" target="_blank">phishing emails&nbsp;</a>are sent every day.</p><p>Skwarczek also emphasises the importance of these ongoing audits. Alluding to the constantly changing market, He says cyber criminals constantly devise new tricks. This is why frequent evaluations are needed to ensure G2A is moving in the right direction.&nbsp;</p><h2><strong>AI, Blockchain, and the Future of Payment Security</strong></h2><p>Looking ahead, Skwarczek talked about the future of payment security. He recognised the complicated relationship between new technologies and strict regulations.</p><p>The payment industry is inherently "conservative because it's regulated," he added, with extensive regulatory frameworks that ensure the safety of people's money. This intentional pace, however, coexists with rapid technological advancements. Skwarczek specifically pointed to the growing influence of AI and blockchain.</p><p>While AI offers immense promise in enhancing security and streamlining operations, it's also a "double-edged sword," with "bad actors"&nbsp;<a href="https://em360tech.com/video-resources/what-does-ai-know-about-you" rel="noopener noreferrer" target="_blank">leveraging AI</a>&nbsp;to become "smarter with cheating." G2A's approach to AI is to be "AI native," focusing on educating every department on the basics of AI and guiding them to use specific AI tools relevant to their functions, from marketing to security. Regular evaluations ensure that these AI implementations are effective and continually improved.</p><h3>Takeaways</h3><ul><li>The core message is always about people.</li><li>Security is a top priority in online marketplaces.</li><li>Diversity presents both challenges and opportunities.</li><li>Building a strong team is essential for global operations.</li><li>AI can be both beneficial and a threat in cybersecurity.</li><li>Education and training are crucial for preventing phishing attacks.</li><li>Proactive cybersecurity measures are necessary to stay ahead of threats.</li><li>Communication within teams is vital for success.</li><li>Diversity enhances problem-solving and innovation.</li><li>The future of payment security is uncertain but full of potential.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to G2A and Bartosz Skwarczek</p><p>02:10 The Importance of People in Business</p><p>03:23 Understanding Cloud Marketplaces</p><p>05:08 Security Frameworks in Online Marketplaces</p><p>06:38 Challenges of Global Payment Diversity</p><p>11:15 Building a Strong Team for Global Operations</p><p>15:54 The Role of AI in Cybersecurity</p><p>20:03 Securing Transactions and Avoiding Fraud</p><p>24:40 Proactive Cybersecurity Measures</p><p>27:34 The Importance of Communication in Teams</p><p>29:52 Diversity as a Strength in Business</p><p>32:03 Future of Payment Security Technologies</p><p>36:37 Key Takeaways for Decision Makers</p><h2>About G2A</h2><p><a href="http://g2a.com/" rel="noopener noreferrer" target="_blank">G2A.COM</a>&nbsp;is the largest and most trusted marketplace for digital entertainment in the world. More than 30 million people in 180 countries have made over 100 million purchases on the platform.&nbsp;</p><p>Customers can explore a vast catalogue of over 75,000 digital products, including games, DLCs, in-game items, and non-gaming items like gift cards, subscriptions, software, and e-learning resources. These products are offered by sellers from around the globe.</p><p>G2A.COM is also known for its strong focus on online security. It has received the American CNP award, joining well-known companies like Microsoft, Barclay's Bank, and First Data.</p>]]></description><content:encoded><![CDATA[<p>"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is always a human being,”&nbsp;<a href="https://www.linkedin.com/in/bartosz-skwarczek-37183015/" rel="noopener noreferrer" target="_blank"><strong>Bartosz Skwarczek</strong></a>, Founder &amp; President at G2A Capital Group, reflectively said.&nbsp;</p><p>The quote sets the tone of the recent episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><strong>The Security Strategist podcast</strong></a>. In this episode,&nbsp;<a href="https://www.linkedin.com/in/shubhangi-dua-14a825154/" rel="noopener noreferrer" target="_blank"><strong>Shubhangi Dua</strong></a>, Podcast Host and Producer, sits down with Skwarczek, an award-winning CEO&nbsp;<a href="https://councils.forbes.com/profile/Bartosz-Skwarczek-Founder-President-Supervisory-Board-G2A-Capital-Group/ddf1b9f9-ba5f-486d-a8f2-c15e6b572bc1" rel="noopener noreferrer" target="_blank"><strong>recognised by&nbsp;<em>Forbes</em></strong></a>. They talk about the evolution of online marketplaces, the importance of security, and the role of people in business.&nbsp;</p><p>They discuss the challenges of operating a global marketplace, the significance of diversity in teams, and the future of payment security technologies.&nbsp;</p><p>Bartosz emphasises the importance of a proactive approach to cybersecurity and the use of AI in business operations. He also highlights the essential role of human values and communication in creating a successful organisation.</p><h2><strong>Proactive and Multi-Layered Approach to Cybersecurity</strong></h2><p>Security is a top priority for G2A, Skwarczek articulated. He adds that it's a "constant improvement" and a "kind of battle that you have with the bad actors." To stay "one step ahead of attackers," G2A deploys a multi-layered defence strategy.</p><p>The multi-layered strategy starts with careful monitoring of threat intelligence channels to ensure organisations stay on top of the latest&nbsp;<a href="https://em360tech.com/top-10/types-of-cyber-attacks" rel="noopener noreferrer" target="_blank">threats, vulnerabilities, and methods</a>&nbsp;used by&nbsp;<a href="https://em360tech.com/top-10/best-hackers-in-the-world" rel="noopener noreferrer" target="_blank">malicious actors</a>.</p><p>A dedicated incident response team has clearly defined roles and responsibilities. They can respond immediately to any security incidents, especially those related to different types of fraud, such as friendly fraud (chargeback fraud) or traditional credit card fraud.&nbsp;</p><p>Skwarczek says that employee training is extremely important. G2A conducts mandatory training every month for its employees, assuring they know how to avoid common mistakes like phishing emails. Especially considering that over 3 million&nbsp;<a href="https://em360tech.com/tech-articles/what-phishing-and-how-can-you-defend-yourself-against-it" rel="noopener noreferrer" target="_blank">phishing emails&nbsp;</a>are sent every day.</p><p>Skwarczek also emphasises the importance of these ongoing audits. Alluding to the constantly changing market, He says cyber criminals constantly devise new tricks. This is why frequent evaluations are needed to ensure G2A is moving in the right direction.&nbsp;</p><h2><strong>AI, Blockchain, and the Future of Payment Security</strong></h2><p>Looking ahead, Skwarczek talked about the future of payment security. He recognised the complicated relationship between new technologies and strict regulations.</p><p>The payment industry is inherently "conservative because it's regulated," he added, with extensive regulatory frameworks that ensure the safety of people's money. This intentional pace, however, coexists with rapid technological advancements. Skwarczek specifically pointed to the growing influence of AI and blockchain.</p><p>While AI offers immense promise in enhancing security and streamlining operations, it's also a "double-edged sword," with "bad actors"&nbsp;<a href="https://em360tech.com/video-resources/what-does-ai-know-about-you" rel="noopener noreferrer" target="_blank">leveraging AI</a>&nbsp;to become "smarter with cheating." G2A's approach to AI is to be "AI native," focusing on educating every department on the basics of AI and guiding them to use specific AI tools relevant to their functions, from marketing to security. Regular evaluations ensure that these AI implementations are effective and continually improved.</p><h3>Takeaways</h3><ul><li>The core message is always about people.</li><li>Security is a top priority in online marketplaces.</li><li>Diversity presents both challenges and opportunities.</li><li>Building a strong team is essential for global operations.</li><li>AI can be both beneficial and a threat in cybersecurity.</li><li>Education and training are crucial for preventing phishing attacks.</li><li>Proactive cybersecurity measures are necessary to stay ahead of threats.</li><li>Communication within teams is vital for success.</li><li>Diversity enhances problem-solving and innovation.</li><li>The future of payment security is uncertain but full of potential.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to G2A and Bartosz Skwarczek</p><p>02:10 The Importance of People in Business</p><p>03:23 Understanding Cloud Marketplaces</p><p>05:08 Security Frameworks in Online Marketplaces</p><p>06:38 Challenges of Global Payment Diversity</p><p>11:15 Building a Strong Team for Global Operations</p><p>15:54 The Role of AI in Cybersecurity</p><p>20:03 Securing Transactions and Avoiding Fraud</p><p>24:40 Proactive Cybersecurity Measures</p><p>27:34 The Importance of Communication in Teams</p><p>29:52 Diversity as a Strength in Business</p><p>32:03 Future of Payment Security Technologies</p><p>36:37 Key Takeaways for Decision Makers</p><h2>About G2A</h2><p><a href="http://g2a.com/" rel="noopener noreferrer" target="_blank">G2A.COM</a>&nbsp;is the largest and most trusted marketplace for digital entertainment in the world. More than 30 million people in 180 countries have made over 100 million purchases on the platform.&nbsp;</p><p>Customers can explore a vast catalogue of over 75,000 digital products, including games, DLCs, in-game items, and non-gaming items like gift cards, subscriptions, software, and e-learning resources. These products are offered by sellers from around the globe.</p><p>G2A.COM is also known for its strong focus on online security. It has received the American CNP award, joining well-known companies like Microsoft, Barclay's Bank, and First Data.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ac6ddf1f-7a34-41a3-8610-c4d336d22d99</guid><itunes:image href="https://artwork.captivate.fm/e98f782c-66dd-47db-9f15-5910a104dd07/QJXcRYZtNAPgHX-E4vUqt0nY.jpg"/><pubDate>Tue, 29 Jul 2025 16:07:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/ac6ddf1f-7a34-41a3-8610-c4d336d22d99.mp3" length="31439788" type="audio/mpeg"/><itunes:duration>32:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="How Can Global Marketplaces Master Payment Security and Combat Fraud?"><podcast:source uri="https://youtu.be/r-ld-HJ8koY"/></podcast:alternateEnclosure></item><item><title>From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</title><itunes:title>From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats</itunes:title><description><![CDATA[<p>Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats of AI integrations.</p><p>As&nbsp;<a href="https://www.linkedin.com/in/geenensp/" rel="noopener noreferrer" target="_blank">Pascal Geenens, Director of Threat Intelligence at Radware</a>, puts it, "It's AI, so everything is changing weekly. What I talked about two weeks ago has already changed again."&nbsp;</p><p>The constant change means that malicious actors are not just adopting AI, they're leveraging it to create new threats at a striking pace.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist Podcast</a>,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>,&nbsp;<em>an industry Analyst, Author</em>&nbsp;and Chief Research Analyst at IT-Harvest, speaks with Geenens.</p><p>They discuss how cybersecurity threats are enhanced by AI. This includes how attackers are using AI tools, the implications of new technologies like agentic AI, and the challenges posed by AI advancements.&nbsp;</p><p>The conversation also touches on the role of nation-states in utilising AI for cyber operations, the concept of vibe hacking, and the future of interconnected AI agents.</p><h2>AI-Driven Attacks Fuelled by Prompt Injection</h2><p>Malicious hackers evidently first used AI in 2023, specifically through prompt injection attacks on&nbsp;<a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a>&nbsp;such as ChatGPT.&nbsp;</p><p>Attackers would find "evasion techniques" to bypass ethical guardrails, asking questions indirectly to generate malicious scripts or gather information for attacks.&nbsp;</p><p>Geenens says, "If you would ask the direct question, how can I commit a murder and get away with it? He would say, no, no, no, that goes against my ethical principles. But there are ways around it."</p><p>The game changed with the emergence of offline models and specialised&nbsp;<a href="https://em360tech.com/tech-articles/meet-wormgpt-malicious-chatgpt-style-tool-hackers" rel="noopener noreferrer" target="_blank">services like WormGPT</a>&nbsp;and&nbsp;<a href="https://em360tech.com/tech-articles/fraudgpt-whats-next-dark-llms" rel="noopener noreferrer" target="_blank">FraudGPT</a>. These models, distilled from larger ones and enhanced with hacking-specific information from underground forums, lowered the barrier to entry for aspiring cyber criminals.&nbsp;</p><p>"They created their own model and sold it as a service underground. And that model was geared towards helping anyone with questions to interact with a prompt and to make their malware better, increase the effectiveness of their malware," explained Geenens.&nbsp;</p><p>This accessibility meant that "more actors would actually move from script kiddie level to a more sophisticated level." Teenagers, in particular, took advantage of these AI assistants. They provided a friendly, non-toxic environment to learn and develop hacking tools, unlike the often unwelcoming underground forums.</p><h2>The Rise of Agentic AI &amp; Automated Exploits</h2><p>In 2024, the focus shifted to&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">AI agents</a>, which provide attackers with automated workflows. Unlike LLMs, agents can interact with their environment, gather updated information, execute tools, and even spawn new agents that communicate with each other.&nbsp;</p><p>"You can have a manager agent that says, okay, I need to develop something. It’s a big problem here. I need to develop a tool. I have an agent that does the development. I have an agent that does the QA testing,” depicts Geenens. “And then I have another agent who's a problem solver who will help the other tools do their job. And they interact with each other.”</p><p>This agentic capability majorly hastens the exploitation of vulnerabilities. Research showed that AI agents can quickly rebuild proof-of-concept exploits for published CVEs.&nbsp;</p><p>Geenens stressed the dramatic reduction in time: "Earlier, when the CVE was published, it took 24 hours-48 hours and a security researcher who typically posted a proof of concept online in Python before the actual attacks in the wild would start.”&nbsp;</p><p>“But now with those agents and those workflows has been proven as much easier to get access and to get a proof of concept. That window might now reduce from 48 hours to a couple of minutes,” he added.&nbsp;</p><h3>Takeaways</h3><ul><li>AI is changing the landscape of cybersecurity threats.</li><li>Attackers are using AI to enhance their hacking capabilities.</li><li>Guardrails in AI are not foolproof against malicious intent.</li><li>Teenagers are increasingly entering the cybercrime space due to AI tools.</li><li>Agentic AI allows for automated workflows in attacks.</li><li>The sophistication of attacks has not drastically changed, but entry barriers have lowered.</li><li>Nation-states are using AI for disinformation and phishing.</li><li>Vibe hacking represents a new frontier in automated vulnerability discovery.</li><li>MCP and agent-to-agent protocols will shape the future of AI interactions.</li><li>AI will be necessary to combat AI-driven threats.</li></ul><br/><h3>Chapters</h3><p>00:00 AI in Cybersecurity: The New Frontier</p><p>06:51 The Evolution of Hacking: From Script Kiddies to AI-Enhanced Threats</p><p>12:48 Nation States and AI: The New Age of Cyber Warfare</p><p>15:12 Vibe Hacking: The Future of Coding and Security</p><p>19:14 The Internet of Agents: A New Era in Cybersecurity</p><p>25:11 Emerging Threats: Indirect Prompt Injection Attacks</p>]]></description><content:encoded><![CDATA[<p>Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats of AI integrations.</p><p>As&nbsp;<a href="https://www.linkedin.com/in/geenensp/" rel="noopener noreferrer" target="_blank">Pascal Geenens, Director of Threat Intelligence at Radware</a>, puts it, "It's AI, so everything is changing weekly. What I talked about two weeks ago has already changed again."&nbsp;</p><p>The constant change means that malicious actors are not just adopting AI, they're leveraging it to create new threats at a striking pace.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist Podcast</a>,&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>,&nbsp;<em>an industry Analyst, Author</em>&nbsp;and Chief Research Analyst at IT-Harvest, speaks with Geenens.</p><p>They discuss how cybersecurity threats are enhanced by AI. This includes how attackers are using AI tools, the implications of new technologies like agentic AI, and the challenges posed by AI advancements.&nbsp;</p><p>The conversation also touches on the role of nation-states in utilising AI for cyber operations, the concept of vibe hacking, and the future of interconnected AI agents.</p><h2>AI-Driven Attacks Fuelled by Prompt Injection</h2><p>Malicious hackers evidently first used AI in 2023, specifically through prompt injection attacks on&nbsp;<a href="https://em360tech.com/tech-articles/what-large-language-model-llm-definition-examples-use-cases" rel="noopener noreferrer" target="_blank">large language models (LLMs)</a>&nbsp;such as ChatGPT.&nbsp;</p><p>Attackers would find "evasion techniques" to bypass ethical guardrails, asking questions indirectly to generate malicious scripts or gather information for attacks.&nbsp;</p><p>Geenens says, "If you would ask the direct question, how can I commit a murder and get away with it? He would say, no, no, no, that goes against my ethical principles. But there are ways around it."</p><p>The game changed with the emergence of offline models and specialised&nbsp;<a href="https://em360tech.com/tech-articles/meet-wormgpt-malicious-chatgpt-style-tool-hackers" rel="noopener noreferrer" target="_blank">services like WormGPT</a>&nbsp;and&nbsp;<a href="https://em360tech.com/tech-articles/fraudgpt-whats-next-dark-llms" rel="noopener noreferrer" target="_blank">FraudGPT</a>. These models, distilled from larger ones and enhanced with hacking-specific information from underground forums, lowered the barrier to entry for aspiring cyber criminals.&nbsp;</p><p>"They created their own model and sold it as a service underground. And that model was geared towards helping anyone with questions to interact with a prompt and to make their malware better, increase the effectiveness of their malware," explained Geenens.&nbsp;</p><p>This accessibility meant that "more actors would actually move from script kiddie level to a more sophisticated level." Teenagers, in particular, took advantage of these AI assistants. They provided a friendly, non-toxic environment to learn and develop hacking tools, unlike the often unwelcoming underground forums.</p><h2>The Rise of Agentic AI &amp; Automated Exploits</h2><p>In 2024, the focus shifted to&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">AI agents</a>, which provide attackers with automated workflows. Unlike LLMs, agents can interact with their environment, gather updated information, execute tools, and even spawn new agents that communicate with each other.&nbsp;</p><p>"You can have a manager agent that says, okay, I need to develop something. It’s a big problem here. I need to develop a tool. I have an agent that does the development. I have an agent that does the QA testing,” depicts Geenens. “And then I have another agent who's a problem solver who will help the other tools do their job. And they interact with each other.”</p><p>This agentic capability majorly hastens the exploitation of vulnerabilities. Research showed that AI agents can quickly rebuild proof-of-concept exploits for published CVEs.&nbsp;</p><p>Geenens stressed the dramatic reduction in time: "Earlier, when the CVE was published, it took 24 hours-48 hours and a security researcher who typically posted a proof of concept online in Python before the actual attacks in the wild would start.”&nbsp;</p><p>“But now with those agents and those workflows has been proven as much easier to get access and to get a proof of concept. That window might now reduce from 48 hours to a couple of minutes,” he added.&nbsp;</p><h3>Takeaways</h3><ul><li>AI is changing the landscape of cybersecurity threats.</li><li>Attackers are using AI to enhance their hacking capabilities.</li><li>Guardrails in AI are not foolproof against malicious intent.</li><li>Teenagers are increasingly entering the cybercrime space due to AI tools.</li><li>Agentic AI allows for automated workflows in attacks.</li><li>The sophistication of attacks has not drastically changed, but entry barriers have lowered.</li><li>Nation-states are using AI for disinformation and phishing.</li><li>Vibe hacking represents a new frontier in automated vulnerability discovery.</li><li>MCP and agent-to-agent protocols will shape the future of AI interactions.</li><li>AI will be necessary to combat AI-driven threats.</li></ul><br/><h3>Chapters</h3><p>00:00 AI in Cybersecurity: The New Frontier</p><p>06:51 The Evolution of Hacking: From Script Kiddies to AI-Enhanced Threats</p><p>12:48 Nation States and AI: The New Age of Cyber Warfare</p><p>15:12 Vibe Hacking: The Future of Coding and Security</p><p>19:14 The Internet of Agents: A New Era in Cybersecurity</p><p>25:11 Emerging Threats: Indirect Prompt Injection Attacks</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d0d20cdf-37f3-4033-b8af-940e83b0d7e7</guid><itunes:image href="https://artwork.captivate.fm/0d3879ea-98aa-4222-811b-e361e887d01d/W7cmD-QIA8kWgpmLDTiU5eFp.jpg"/><pubDate>Mon, 07 Jul 2025 17:24:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/d0d20cdf-37f3-4033-b8af-940e83b0d7e7.mp3" length="27301480" type="audio/mpeg"/><itunes:duration>28:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats"><podcast:source uri="https://youtu.be/iR8mc9cujvw"/></podcast:alternateEnclosure></item><item><title>Why Fraud Prevention Silos Are Holding Your Business Back</title><itunes:title>Why Fraud Prevention Silos Are Holding Your Business Back</itunes:title><description><![CDATA[<p>"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.”</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, Jonathan Care discusses fraud prevention with Ronchetti and Paolo Carmassi, Head of Sales at XTN. They explore the connection between fraud, cybersecurity, and artificial intelligence (AI), emphasising the need for a holistic approach to tackle modern fraud challenges.&nbsp;</p><p>The conversation further spotlights how to take advantage of local identity and&nbsp;<a href="https://www.em360tech.com/tech-articles/what-is-gdpr" rel="noopener noreferrer" target="_blank">data privacy</a>&nbsp;as competitive advantages, particularly in Europe. The speakers discuss emerging threats such as shell game malware.&nbsp;</p><p>The relation between fraud, cybersecurity, and AI is apparent in scenarios like authorised push payment fraud. It often involves an initial&nbsp;<a href="https://em360tech.com/top-10/biggest-data-breaches" rel="noopener noreferrer" target="_blank">data breach</a>, followed by social engineering, and culminating in financial fraud.&nbsp;</p><h2>Future of Fraud Prevention&nbsp;</h2><p>To effectively fight such threats, a detailed picture of the entire "kill chain" is critical. It should include expertise from cybersecurity and&nbsp;<a href="https://em360tech.com/top-10/business-leaders-AML" rel="noopener noreferrer" target="_blank">anti-money laundering (AML)</a>.</p><p>Expanding on “kill chain,” Carmassi says that "fraud is no longer a case of just the banking industry or the financial services at large. It's something that is starting to spill out into other industries as well."&nbsp;</p><p>The head of sales points to examples in gambling, with issues like account takeover and bonus abuse, and even the automotive sector, where app vulnerabilities could lead to physical security threats.&nbsp;</p><p>The emergence of sophisticated bots further complicates this space. That makes it a unified defence strategy pressing across all sectors.</p><p>Alluding to an example, Ronchetti explained, "Last year we were dealing with one of the top 10 European banks. The reason for that was GDPR." The bank had to replace a well-established American vendor after over a year of a Proof of Concept (POC). This was because the vendor's data-sharing practices, particularly with clients outside the European Union, clashed with GDPR requirements.&nbsp;</p><p>This incident stresses the importance of a provider's ability to tackle the complex European regulations. The upcoming&nbsp;<a href="https://em360tech.com/tech-articles/what-eu-ai-act-look-europes-first-ai-law" rel="noopener noreferrer" target="_blank">AI Act</a>&nbsp;further accentuates this divide, with European and US approaches to AI regulation diverging significantly.</p><p>The episode concludes with insights on the future of fraud prevention, focusing on trust and the integration of behavioural biometrics.</p><h3>Takeaways</h3><ul><li>Fraud prevention must integrate with cybersecurity and AI.</li><li>The traditional view of fraud as a silo is outdated.</li><li>Emerging technologies blur the lines between industries.</li><li>GDPR sets a global standard for data privacy.</li><li>Cultural and geographical factors influence fraud solutions.</li><li>New threats like shell game malware are evolving.</li><li>Younger demographics are becoming targets for fraud.</li><li>Trust is essential for competitive advantage in fraud prevention.</li><li>Behavioural biometrics can enhance identity validation.</li><li>A holistic view of fraud prevention is necessary.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Cognitive Security</p><p>04:01 Rethinking Fraud Prevention</p><p>08:12 Leveraging Local Identity and Data Privacy</p><p>11:53 European-Centric Fraud Solutions</p><p>16:07 Behavioural Biometrics in Fraud Prevention</p><p>20:11 Emerging Threats in Fraud</p><p>23:59 Future Paradigms in Fraud Prevention</p><h2>About XTN Cognitive Security&nbsp;</h2><p>XTN is a European vendor of online fraud prevention solutions, empowering organisations to trust their digital users. Our AI-powered platform delivers top-level protection against fraud and cyber threats across multiple sectors and channels. Since 2024, XTN has been part of the CY4GATE Group, strengthening its international leadership in the cybersecurity sector.</p>]]></description><content:encoded><![CDATA[<p>"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.”</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, Jonathan Care discusses fraud prevention with Ronchetti and Paolo Carmassi, Head of Sales at XTN. They explore the connection between fraud, cybersecurity, and artificial intelligence (AI), emphasising the need for a holistic approach to tackle modern fraud challenges.&nbsp;</p><p>The conversation further spotlights how to take advantage of local identity and&nbsp;<a href="https://www.em360tech.com/tech-articles/what-is-gdpr" rel="noopener noreferrer" target="_blank">data privacy</a>&nbsp;as competitive advantages, particularly in Europe. The speakers discuss emerging threats such as shell game malware.&nbsp;</p><p>The relation between fraud, cybersecurity, and AI is apparent in scenarios like authorised push payment fraud. It often involves an initial&nbsp;<a href="https://em360tech.com/top-10/biggest-data-breaches" rel="noopener noreferrer" target="_blank">data breach</a>, followed by social engineering, and culminating in financial fraud.&nbsp;</p><h2>Future of Fraud Prevention&nbsp;</h2><p>To effectively fight such threats, a detailed picture of the entire "kill chain" is critical. It should include expertise from cybersecurity and&nbsp;<a href="https://em360tech.com/top-10/business-leaders-AML" rel="noopener noreferrer" target="_blank">anti-money laundering (AML)</a>.</p><p>Expanding on “kill chain,” Carmassi says that "fraud is no longer a case of just the banking industry or the financial services at large. It's something that is starting to spill out into other industries as well."&nbsp;</p><p>The head of sales points to examples in gambling, with issues like account takeover and bonus abuse, and even the automotive sector, where app vulnerabilities could lead to physical security threats.&nbsp;</p><p>The emergence of sophisticated bots further complicates this space. That makes it a unified defence strategy pressing across all sectors.</p><p>Alluding to an example, Ronchetti explained, "Last year we were dealing with one of the top 10 European banks. The reason for that was GDPR." The bank had to replace a well-established American vendor after over a year of a Proof of Concept (POC). This was because the vendor's data-sharing practices, particularly with clients outside the European Union, clashed with GDPR requirements.&nbsp;</p><p>This incident stresses the importance of a provider's ability to tackle the complex European regulations. The upcoming&nbsp;<a href="https://em360tech.com/tech-articles/what-eu-ai-act-look-europes-first-ai-law" rel="noopener noreferrer" target="_blank">AI Act</a>&nbsp;further accentuates this divide, with European and US approaches to AI regulation diverging significantly.</p><p>The episode concludes with insights on the future of fraud prevention, focusing on trust and the integration of behavioural biometrics.</p><h3>Takeaways</h3><ul><li>Fraud prevention must integrate with cybersecurity and AI.</li><li>The traditional view of fraud as a silo is outdated.</li><li>Emerging technologies blur the lines between industries.</li><li>GDPR sets a global standard for data privacy.</li><li>Cultural and geographical factors influence fraud solutions.</li><li>New threats like shell game malware are evolving.</li><li>Younger demographics are becoming targets for fraud.</li><li>Trust is essential for competitive advantage in fraud prevention.</li><li>Behavioural biometrics can enhance identity validation.</li><li>A holistic view of fraud prevention is necessary.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Cognitive Security</p><p>04:01 Rethinking Fraud Prevention</p><p>08:12 Leveraging Local Identity and Data Privacy</p><p>11:53 European-Centric Fraud Solutions</p><p>16:07 Behavioural Biometrics in Fraud Prevention</p><p>20:11 Emerging Threats in Fraud</p><p>23:59 Future Paradigms in Fraud Prevention</p><h2>About XTN Cognitive Security&nbsp;</h2><p>XTN is a European vendor of online fraud prevention solutions, empowering organisations to trust their digital users. Our AI-powered platform delivers top-level protection against fraud and cyber threats across multiple sectors and channels. Since 2024, XTN has been part of the CY4GATE Group, strengthening its international leadership in the cybersecurity sector.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9736f4a7-0b40-42a6-81f1-2d50768e03d6</guid><itunes:image href="https://artwork.captivate.fm/1c369278-6519-45da-98fc-573fa0cd7aca/lBXJcxQTRBxIhsmQc6p7yLuJ.jpg"/><pubDate>Thu, 26 Jun 2025 09:30:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/9736f4a7-0b40-42a6-81f1-2d50768e03d6.mp3" length="21920095" type="audio/mpeg"/><itunes:duration>22:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Why Fraud Prevention Silos Are Holding Your Business Back"><podcast:source uri="https://youtu.be/bfRj8G1btKU"/></podcast:alternateEnclosure></item><item><title>Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?</title><itunes:title>Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?</itunes:title><description><![CDATA[<p>"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, Richard Stiennon speaks with Converse, VP at GuidePoint Security. They discuss identity management, focusing on identity convergence, the impact of&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">agentic AI</a>, and the complexities of non-human identities.&nbsp;</p><p>The conversation also taps into ethical dilemmas surrounding AI decision-making and future predictions for digital identity in a rapidly changing technological environment.</p><h2>AI’s Impact on Identity and Access Management (IAM)&nbsp;</h2><p><a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">Identity and Access Management (IAM)</a>&nbsp;takes centre stage in this episode. The speakers spotlight two major relevant trends – identity convergence and the influence of agentic AI on digital identity.</p><p>Converse explains that traditionally,&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank">IAM</a>&nbsp;was built on "three pillars—the IGA stack, the privilege access management, and the access manager." However, a change in fashion is taking place where "a lot of the vendors that were traditionally one of those pillars are kind of expanding into other pillars."</p><p>This change is a result of cybersecurity challenges that require businesses to adopt comprehensive solutions and tap into new markets. Converse further notes, "Some of it for the capabilities so they can expand on what they're doing, but it's also to hit some customers and verticals that we didn't usually do in identity."&nbsp;</p><p>This means moving from a multi-tool approach to a more unified platform, aiming to provide a "one-stop shop" for identity needs.&nbsp;</p><p>"There's a lot of focus on unified platforms for identity, particularly," Converse says, "that's a big investment piece right now." He also points out, "vulnerability management tools right now are getting in there too. You name it, they're coming into identity. Identity is the hot space at the moment."</p><p>This offers cost-saving potential, but Converse urges caution. "The question is, from an overall risk perspective, is that enough for your company?" He stresses the importance of evaluating whether integrated solutions deliver the same "functionality and the same security posture" as specialised tools.&nbsp;</p><p>The VP also reminds us that "the tools are all pretty capable, but it's just a matter of understanding exactly what you're trying to accomplish and what you're willing to accept as a risk."</p><h3><strong>Takeaways</strong></h3><ul><li>Identity convergence is reshaping the identity management landscape.</li><li>Agentic AI requires a mature identity framework for effective implementation.</li><li>Non-human identities present unique challenges in cybersecurity.</li><li>Ethical considerations are crucial when allowing AI to make decisions.</li><li>Organisations must balance speed and security in adopting new technologies.</li><li>Real-time visibility and control are essential for managing non-human identities.</li><li>AI can automate low-level tasks but requires careful oversight.</li><li>The convergence of identity pillars can lead to cost savings but may compromise functionality.</li><li>Future technologies like quantum computing could disrupt current encryption methods.</li><li>Continuous adaptation is necessary to keep pace with evolving cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Identity and Access Management</p><p>02:57 Understanding Identity Convergence</p><p>06:02 The Role of Agentic AI in Identity Management</p><p>08:59 Navigating Non-Human Identities</p><p>11:47 Ethical Dilemmas in AI Decision-Making</p><p>14:46 Future Predictions for Digital Identity</p><h2>About GuidePoint</h2><p>GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organisations make better decisions that minimise risk. Their experts act as your trusted advisors, helping you understand your business and challenges. They evaluate your cybersecurity posture and ecosystem to identify risks, optimise resources, and implement best-fit solutions.&nbsp;</p><p>GuidePoint’s unmatched expertise has enabled Fortune 500 companies and U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at&nbsp;<a href="http://www.guidepointsecurity.com/" rel="noopener noreferrer" target="_blank">www.guidepointsecurity.com</a>.</p>]]></description><content:encoded><![CDATA[<p>"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security.&nbsp;</p><p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, Richard Stiennon speaks with Converse, VP at GuidePoint Security. They discuss identity management, focusing on identity convergence, the impact of&nbsp;<a href="https://em360tech.com/tech-articles/what-ai-agent-future-machine-learning-explained" rel="noopener noreferrer" target="_blank">agentic AI</a>, and the complexities of non-human identities.&nbsp;</p><p>The conversation also taps into ethical dilemmas surrounding AI decision-making and future predictions for digital identity in a rapidly changing technological environment.</p><h2>AI’s Impact on Identity and Access Management (IAM)&nbsp;</h2><p><a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">Identity and Access Management (IAM)</a>&nbsp;takes centre stage in this episode. The speakers spotlight two major relevant trends – identity convergence and the influence of agentic AI on digital identity.</p><p>Converse explains that traditionally,&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank">IAM</a>&nbsp;was built on "three pillars—the IGA stack, the privilege access management, and the access manager." However, a change in fashion is taking place where "a lot of the vendors that were traditionally one of those pillars are kind of expanding into other pillars."</p><p>This change is a result of cybersecurity challenges that require businesses to adopt comprehensive solutions and tap into new markets. Converse further notes, "Some of it for the capabilities so they can expand on what they're doing, but it's also to hit some customers and verticals that we didn't usually do in identity."&nbsp;</p><p>This means moving from a multi-tool approach to a more unified platform, aiming to provide a "one-stop shop" for identity needs.&nbsp;</p><p>"There's a lot of focus on unified platforms for identity, particularly," Converse says, "that's a big investment piece right now." He also points out, "vulnerability management tools right now are getting in there too. You name it, they're coming into identity. Identity is the hot space at the moment."</p><p>This offers cost-saving potential, but Converse urges caution. "The question is, from an overall risk perspective, is that enough for your company?" He stresses the importance of evaluating whether integrated solutions deliver the same "functionality and the same security posture" as specialised tools.&nbsp;</p><p>The VP also reminds us that "the tools are all pretty capable, but it's just a matter of understanding exactly what you're trying to accomplish and what you're willing to accept as a risk."</p><h3><strong>Takeaways</strong></h3><ul><li>Identity convergence is reshaping the identity management landscape.</li><li>Agentic AI requires a mature identity framework for effective implementation.</li><li>Non-human identities present unique challenges in cybersecurity.</li><li>Ethical considerations are crucial when allowing AI to make decisions.</li><li>Organisations must balance speed and security in adopting new technologies.</li><li>Real-time visibility and control are essential for managing non-human identities.</li><li>AI can automate low-level tasks but requires careful oversight.</li><li>The convergence of identity pillars can lead to cost savings but may compromise functionality.</li><li>Future technologies like quantum computing could disrupt current encryption methods.</li><li>Continuous adaptation is necessary to keep pace with evolving cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Identity and Access Management</p><p>02:57 Understanding Identity Convergence</p><p>06:02 The Role of Agentic AI in Identity Management</p><p>08:59 Navigating Non-Human Identities</p><p>11:47 Ethical Dilemmas in AI Decision-Making</p><p>14:46 Future Predictions for Digital Identity</p><h2>About GuidePoint</h2><p>GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organisations make better decisions that minimise risk. Their experts act as your trusted advisors, helping you understand your business and challenges. They evaluate your cybersecurity posture and ecosystem to identify risks, optimise resources, and implement best-fit solutions.&nbsp;</p><p>GuidePoint’s unmatched expertise has enabled Fortune 500 companies and U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at&nbsp;<a href="http://www.guidepointsecurity.com/" rel="noopener noreferrer" target="_blank">www.guidepointsecurity.com</a>.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f26b270d-c0ca-4038-849d-2650669a38ce</guid><itunes:image href="https://artwork.captivate.fm/0d4b0769-6119-49cc-80c2-2f210213aa91/Mi_hdGhlTeB8wOjYTMnsb_X_.jpg"/><pubDate>Mon, 23 Jun 2025 16:04:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/f26b270d-c0ca-4038-849d-2650669a38ce.mp3" length="15120492" type="audio/mpeg"/><itunes:duration>15:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?"><podcast:source uri="https://youtu.be/d6952KQfJxs"/></podcast:alternateEnclosure></item><item><title>Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges</title><itunes:title>Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges</itunes:title><description><![CDATA[<p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a>&nbsp;podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM).</p><p>The conversation peels back the layers of hidden vulnerabilities and misconfigurations that plague today’s digital world. The speakers offer expert advice into how businesses can better understand, prioritise, and manage their expanding&nbsp;<a href="https://em360tech.com/podcasts/rapid7-how-swiftly-respond-modern-cyber-threats" rel="noopener noreferrer" target="_blank">attack surfaces</a>.</p><p>"It's all about the kind of different steps an attacker takes. The attack surface simply means when an attacker can exploit to get to my goal and align to my mission," says Craig Roberts, Principal Software Engineer at&nbsp;<a href="https://em360tech.com/solution-providers/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>.</p><h2>Attack Surface Goes Beyond External Scans</h2><p>Also the Co-founder of Noetic (acquired by Rapid7), Roberts’ journey into attack surface management began from a practical observation. He found that many cybersecurity incidents came from overlooked assets. Such incidents could be unmonitored servers or lack of Endpoint Detection and Response (EDR).&nbsp;</p><p>"We set out to raise that hygiene bar through preventative controls," he explains. The typical view of an attack surface is often limited to external website scans. "That's only a small piece of it these days. It's often where an attacker will start. It’s an initial foothold. Everything past that point is also still an attack surface."&nbsp;</p><p>Emphasising the diverse nature of attack vectors, Roberts adds, "We don't have a homogenous way. Attackers both initially gain access and then start moving towards their target." This means that a single misstep or vulnerability across any of these areas can allow an attacker to achieve their objective.</p><h2><strong>Holistic Exposure Management&nbsp;</strong></h2><p>Looking ahead, Roberts recommends CISOs to focus on having all enterprise data and understanding their environment across all assets. These assets are – cloud, users, and traditional infrastructure.&nbsp;</p><p>Then, layer on an understanding of "exposures" rather than just Common Vulnerabilities and Exposures (CVEs). This includes cloud misconfigurations, identity-related issues like MFA misconfigurations, and, zero-days.</p><p>"Treat those in a similar way because at the end of the day, we need to prioritise those exposures because the attacker isn't going to care about the weapon they use," Roberts concludes. This holistic approach, built on foundational trust in shared data across various security vendors and tools.&nbsp;</p><p>Such a strategy is crucial for gaining a central view of risk and efficiently mitigating the diverse threats facing modern enterprises.</p><p>A key takeaway from the discussion is the importance of understanding an organisations’ assets and how critical each is. Roberts argues that, while organisations may spend significant effort on re-scoring and building "vulnerability intelligence pipelines," it’s not often known&nbsp;<em>which&nbsp;</em>critical assets those vulnerabilities reside on.</p><p>"The asset is a really important thing. How important that is to your business, and what data and mitigations it has in it hugely affects the risk of that vulnerability," he stresses.</p><h3><strong>Takeaways</strong></h3><ul><li>Understanding the attack surface is crucial for effective cybersecurity.</li><li>Attackers exploit various vulnerabilities to achieve their goals.</li><li>Prioritization of vulnerabilities is essential due to the overwhelming number of CVEs.</li><li>Zero-day vulnerabilities pose significant risks that require immediate attention.</li><li>IoT devices present unique challenges in vulnerability management.</li><li>Effective management of attack surfaces can deter opportunistic attackers.</li><li>Visibility into assets and their configurations is key to risk management.</li><li>Collaboration between security vendors enhances data sharing and threat response.</li><li>Organisations must treat all exposures equally, regardless of their nature.</li><li>A proactive approach to security can reduce the likelihood of successful attacks.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Attack Surface Management</p><p>03:02 Understanding the Evolving Attack Surface</p><p>05:55 Types of Attackers and Their Motivations</p><p>08:52 Prioritizing Vulnerabilities and Exposures</p><p>12:09 Zero-Day Vulnerabilities and IoT Challenges</p><p>15:04 Management Strategies for Attack Surfaces</p><p>17:56 The Importance of Asset Visibility</p><p>20:57 Key Takeaways for CISOs</p><h2>About Rapid7</h2><p>Rapid7, Inc. (NASDAQ: RPD) is on a mission to create a safer digital world by making cybersecurity simpler and more accessible. We empower security professionals to manage a modern attack surface through our best-in-class technology, leading-edge research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help more than 11,000 global customers unite cloud risk management and threat detection to reduce attack surfaces and eliminate threats with speed and precision. For more information, visit our&nbsp;<a href="https://www.rapid7.com/" rel="noopener noreferrer" target="_blank">website</a>, check out our&nbsp;<a href="https://www.rapid7.com/blog/" rel="noopener noreferrer" target="_blank">blog</a>, or follow us on&nbsp;<a href="https://www.linkedin.com/company/rapid7" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;or&nbsp;<a href="https://twitter.com/rapid7/" rel="noopener noreferrer" target="_blank">X</a>.</p>]]></description><content:encoded><![CDATA[<p>In this episode of&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a>&nbsp;podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM).</p><p>The conversation peels back the layers of hidden vulnerabilities and misconfigurations that plague today’s digital world. The speakers offer expert advice into how businesses can better understand, prioritise, and manage their expanding&nbsp;<a href="https://em360tech.com/podcasts/rapid7-how-swiftly-respond-modern-cyber-threats" rel="noopener noreferrer" target="_blank">attack surfaces</a>.</p><p>"It's all about the kind of different steps an attacker takes. The attack surface simply means when an attacker can exploit to get to my goal and align to my mission," says Craig Roberts, Principal Software Engineer at&nbsp;<a href="https://em360tech.com/solution-providers/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>.</p><h2>Attack Surface Goes Beyond External Scans</h2><p>Also the Co-founder of Noetic (acquired by Rapid7), Roberts’ journey into attack surface management began from a practical observation. He found that many cybersecurity incidents came from overlooked assets. Such incidents could be unmonitored servers or lack of Endpoint Detection and Response (EDR).&nbsp;</p><p>"We set out to raise that hygiene bar through preventative controls," he explains. The typical view of an attack surface is often limited to external website scans. "That's only a small piece of it these days. It's often where an attacker will start. It’s an initial foothold. Everything past that point is also still an attack surface."&nbsp;</p><p>Emphasising the diverse nature of attack vectors, Roberts adds, "We don't have a homogenous way. Attackers both initially gain access and then start moving towards their target." This means that a single misstep or vulnerability across any of these areas can allow an attacker to achieve their objective.</p><h2><strong>Holistic Exposure Management&nbsp;</strong></h2><p>Looking ahead, Roberts recommends CISOs to focus on having all enterprise data and understanding their environment across all assets. These assets are – cloud, users, and traditional infrastructure.&nbsp;</p><p>Then, layer on an understanding of "exposures" rather than just Common Vulnerabilities and Exposures (CVEs). This includes cloud misconfigurations, identity-related issues like MFA misconfigurations, and, zero-days.</p><p>"Treat those in a similar way because at the end of the day, we need to prioritise those exposures because the attacker isn't going to care about the weapon they use," Roberts concludes. This holistic approach, built on foundational trust in shared data across various security vendors and tools.&nbsp;</p><p>Such a strategy is crucial for gaining a central view of risk and efficiently mitigating the diverse threats facing modern enterprises.</p><p>A key takeaway from the discussion is the importance of understanding an organisations’ assets and how critical each is. Roberts argues that, while organisations may spend significant effort on re-scoring and building "vulnerability intelligence pipelines," it’s not often known&nbsp;<em>which&nbsp;</em>critical assets those vulnerabilities reside on.</p><p>"The asset is a really important thing. How important that is to your business, and what data and mitigations it has in it hugely affects the risk of that vulnerability," he stresses.</p><h3><strong>Takeaways</strong></h3><ul><li>Understanding the attack surface is crucial for effective cybersecurity.</li><li>Attackers exploit various vulnerabilities to achieve their goals.</li><li>Prioritization of vulnerabilities is essential due to the overwhelming number of CVEs.</li><li>Zero-day vulnerabilities pose significant risks that require immediate attention.</li><li>IoT devices present unique challenges in vulnerability management.</li><li>Effective management of attack surfaces can deter opportunistic attackers.</li><li>Visibility into assets and their configurations is key to risk management.</li><li>Collaboration between security vendors enhances data sharing and threat response.</li><li>Organisations must treat all exposures equally, regardless of their nature.</li><li>A proactive approach to security can reduce the likelihood of successful attacks.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Attack Surface Management</p><p>03:02 Understanding the Evolving Attack Surface</p><p>05:55 Types of Attackers and Their Motivations</p><p>08:52 Prioritizing Vulnerabilities and Exposures</p><p>12:09 Zero-Day Vulnerabilities and IoT Challenges</p><p>15:04 Management Strategies for Attack Surfaces</p><p>17:56 The Importance of Asset Visibility</p><p>20:57 Key Takeaways for CISOs</p><h2>About Rapid7</h2><p>Rapid7, Inc. (NASDAQ: RPD) is on a mission to create a safer digital world by making cybersecurity simpler and more accessible. We empower security professionals to manage a modern attack surface through our best-in-class technology, leading-edge research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help more than 11,000 global customers unite cloud risk management and threat detection to reduce attack surfaces and eliminate threats with speed and precision. For more information, visit our&nbsp;<a href="https://www.rapid7.com/" rel="noopener noreferrer" target="_blank">website</a>, check out our&nbsp;<a href="https://www.rapid7.com/blog/" rel="noopener noreferrer" target="_blank">blog</a>, or follow us on&nbsp;<a href="https://www.linkedin.com/company/rapid7" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;or&nbsp;<a href="https://twitter.com/rapid7/" rel="noopener noreferrer" target="_blank">X</a>.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">adab13c9-0261-4885-bdaf-2e3b0bf46b85</guid><itunes:image href="https://artwork.captivate.fm/4587e57e-cd77-4e56-941a-26408ae70077/raKfS-6zZbx_Vmz6pL6TWXnx.jpg"/><pubDate>Thu, 29 May 2025 10:39:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/adab13c9-0261-4885-bdaf-2e3b0bf46b85.mp3" length="22176550" type="audio/mpeg"/><itunes:duration>23:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode><podcast:season>1</podcast:season></item><item><title>Quantum Computing, AI, &amp; Ransomware: Inside Infosecurity Europe 2025 Key Themes</title><itunes:title>Quantum Computing, AI, &amp; Ransomware: Inside Infosecurity Europe 2025 Key Themes</itunes:title><description><![CDATA[<p><a href="https://em360tech.com/tech-articles/our-takeaways-infosecurity-europe-2024" rel="noopener noreferrer" target="_blank">Infosecurity Europe</a>, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions.</p><p>In this episode of the Security Strategist podcast, host Shubhangi Dua speaks with Saima Poorghobad,&nbsp;Portfolio director RX Global, the organiser of Infosecurity Europe about the upcoming Infosecurity Europe conference.&nbsp;</p><p>They discuss the significance of the event, which celebrates its 30th anniversary, and explore key topics such as&nbsp;<a href="https://em360tech.com/tech-articles/what-willow-quantum-computing-chip-google" rel="noopener noreferrer" target="_blank">quantum computing</a>, AI, and&nbsp;<a href="https://em360tech.com/tech-articles/what-raas-ransomware-service-explained" rel="noopener noreferrer" target="_blank">ransomware</a>&nbsp;that will be highlighted this year. Saima shares insights into new features and innovations at the conference, emphasizing the importance of networking and preparation for attendees.</p><p>"What we're really passionate about at Infosecurity Europe is building a safer cyber world for everyone," says Poorghobad. "We support this mission by giving the community somewhere that they can combine innovation with insights, with relationships."&nbsp;</p><p>Over the past three decades, Infosecurity Europe has served as a crucial cornerstone for the cybersecurity community, evolving alongside the rapidly changing threat scenarios, from the early internet to the rise of cloud and AI.</p><h2><strong>Setting Agenda With Quantum Computing&nbsp;</strong></h2><p>One emerging theme at&nbsp;<a href="https://www.infosecurityeurope.com/en-gb.html" rel="noopener noreferrer" target="_blank">Infosecurity Europe 2025</a>&nbsp;is expected to be quantum computing. Once a distant prospect but now quantum computing is a near-term horizon. The conference will kick off with a headline keynote from Professor Brian Cox, exploring how black holes and&nbsp;<a href="https://em360tech.com/tech-articles/what-quantum-computing-future-computing-explained" rel="noopener noreferrer" target="_blank">quantum mechanics</a>&nbsp;hold the answer to the future of computing and cybersecurity.&nbsp;</p><p>This will be followed by a panel discussion moderated by&nbsp;<em>BBC</em>&nbsp;cyber correspondent Joe Tidy, focusing on immediate actions organisations should take.&nbsp;</p><p>Poorghobad emphasising the practical applications of this says, "teaming up that session with Professor Brian Cox followed by that panel kind of gives you that overarching theory and view of the overarching threat to see how we can actually implement and what should we be doing today and make it really practical?"</p><p>Geopolitics is another major driver of cyber. For this, Rory Stewart, former diplomat, politician, and host of "The Rest Is Politics," will speak at the event on global power dynamics. He plans to particularly discuss how shifting alliances, emerging threats, and potential global trade wars could impact access to essential hardware and software for cybersecurity.&nbsp;</p><p>AI and Generative AI continue to be a key theme. Despite their initial hype, they remain at the forefront of cyber concerns. Cited as the most pressing threat in Infosecurity Europe's annual Trends Report, AI lowers the barrier to entry for bad actors and enhances capabilities for skilled attackers. A keynote session titled "Calling BS on AI" will bring together AI experts to provide insights on defending against AI threats, particularly deepfakes and AI-powered social engineering campaigns.</p><p>For more details on the event and some surprises planned, watch the full podcast.</p><h3>Takeaways</h3><ul><li>Infosecurity Europe is a leading gathering of cybersecurity professionals.</li><li>The conference has evolved significantly over the past 30 years.</li><li>Quantum computing poses a near-term threat to existing encryption protocols.</li><li>AI is a pressing concern for cybersecurity professionals.</li><li>Ransomware continues to be a major threat in the cyber landscape.</li><li>New exhibitors and innovative formats are introduced each year.</li><li>Networking opportunities are crucial for building relationships in the industry.</li><li>Preparation is essential for maximizing the conference experience.</li><li>Attendees can expect hands-on master classes and exclusive sessions.</li><li>The 30th anniversary celebration will include special events and recognitions.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Infosecurity Europe</p><p>02:45 The Evolution of Cybersecurity Over 30 Years</p><p>06:04 Key Topics for Infosecurity Europe 2025</p><p>09:12 Emerging Threats: Quantum Computing and Geopolitics</p><p>11:56 AI and Ransomware: Current Challenges</p><p>15:11 New Features and Innovations at Infosecurity Europe</p><p>22:03 Leveraging Opportunities at the Conference</p>]]></description><content:encoded><![CDATA[<p><a href="https://em360tech.com/tech-articles/our-takeaways-infosecurity-europe-2024" rel="noopener noreferrer" target="_blank">Infosecurity Europe</a>, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions.</p><p>In this episode of the Security Strategist podcast, host Shubhangi Dua speaks with Saima Poorghobad,&nbsp;Portfolio director RX Global, the organiser of Infosecurity Europe about the upcoming Infosecurity Europe conference.&nbsp;</p><p>They discuss the significance of the event, which celebrates its 30th anniversary, and explore key topics such as&nbsp;<a href="https://em360tech.com/tech-articles/what-willow-quantum-computing-chip-google" rel="noopener noreferrer" target="_blank">quantum computing</a>, AI, and&nbsp;<a href="https://em360tech.com/tech-articles/what-raas-ransomware-service-explained" rel="noopener noreferrer" target="_blank">ransomware</a>&nbsp;that will be highlighted this year. Saima shares insights into new features and innovations at the conference, emphasizing the importance of networking and preparation for attendees.</p><p>"What we're really passionate about at Infosecurity Europe is building a safer cyber world for everyone," says Poorghobad. "We support this mission by giving the community somewhere that they can combine innovation with insights, with relationships."&nbsp;</p><p>Over the past three decades, Infosecurity Europe has served as a crucial cornerstone for the cybersecurity community, evolving alongside the rapidly changing threat scenarios, from the early internet to the rise of cloud and AI.</p><h2><strong>Setting Agenda With Quantum Computing&nbsp;</strong></h2><p>One emerging theme at&nbsp;<a href="https://www.infosecurityeurope.com/en-gb.html" rel="noopener noreferrer" target="_blank">Infosecurity Europe 2025</a>&nbsp;is expected to be quantum computing. Once a distant prospect but now quantum computing is a near-term horizon. The conference will kick off with a headline keynote from Professor Brian Cox, exploring how black holes and&nbsp;<a href="https://em360tech.com/tech-articles/what-quantum-computing-future-computing-explained" rel="noopener noreferrer" target="_blank">quantum mechanics</a>&nbsp;hold the answer to the future of computing and cybersecurity.&nbsp;</p><p>This will be followed by a panel discussion moderated by&nbsp;<em>BBC</em>&nbsp;cyber correspondent Joe Tidy, focusing on immediate actions organisations should take.&nbsp;</p><p>Poorghobad emphasising the practical applications of this says, "teaming up that session with Professor Brian Cox followed by that panel kind of gives you that overarching theory and view of the overarching threat to see how we can actually implement and what should we be doing today and make it really practical?"</p><p>Geopolitics is another major driver of cyber. For this, Rory Stewart, former diplomat, politician, and host of "The Rest Is Politics," will speak at the event on global power dynamics. He plans to particularly discuss how shifting alliances, emerging threats, and potential global trade wars could impact access to essential hardware and software for cybersecurity.&nbsp;</p><p>AI and Generative AI continue to be a key theme. Despite their initial hype, they remain at the forefront of cyber concerns. Cited as the most pressing threat in Infosecurity Europe's annual Trends Report, AI lowers the barrier to entry for bad actors and enhances capabilities for skilled attackers. A keynote session titled "Calling BS on AI" will bring together AI experts to provide insights on defending against AI threats, particularly deepfakes and AI-powered social engineering campaigns.</p><p>For more details on the event and some surprises planned, watch the full podcast.</p><h3>Takeaways</h3><ul><li>Infosecurity Europe is a leading gathering of cybersecurity professionals.</li><li>The conference has evolved significantly over the past 30 years.</li><li>Quantum computing poses a near-term threat to existing encryption protocols.</li><li>AI is a pressing concern for cybersecurity professionals.</li><li>Ransomware continues to be a major threat in the cyber landscape.</li><li>New exhibitors and innovative formats are introduced each year.</li><li>Networking opportunities are crucial for building relationships in the industry.</li><li>Preparation is essential for maximizing the conference experience.</li><li>Attendees can expect hands-on master classes and exclusive sessions.</li><li>The 30th anniversary celebration will include special events and recognitions.</li></ul><br/><h3>Chapters</h3><p>00:00 Introduction to Infosecurity Europe</p><p>02:45 The Evolution of Cybersecurity Over 30 Years</p><p>06:04 Key Topics for Infosecurity Europe 2025</p><p>09:12 Emerging Threats: Quantum Computing and Geopolitics</p><p>11:56 AI and Ransomware: Current Challenges</p><p>15:11 New Features and Innovations at Infosecurity Europe</p><p>22:03 Leveraging Opportunities at the Conference</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f94233ec-c674-4fc0-b6b0-b8b60a1f2268</guid><itunes:image href="https://artwork.captivate.fm/c7643eec-7558-46cd-9703-b7af309e8401/W3AWt8lu2RRKLy73uFKDvrqj.jpg"/><pubDate>Wed, 28 May 2025 15:02:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/f94233ec-c674-4fc0-b6b0-b8b60a1f2268.mp3" length="25011733" type="audio/mpeg"/><itunes:duration>26:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?</title><itunes:title>Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?</itunes:title><description><![CDATA[<p>“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks.</p><p>This observation from Ley sets the stage for a crucial discussion on&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a>&nbsp;podcast. Shubhangi Dua, podcast producer and Tech journalist at&nbsp;<em>EM360Tech</em>&nbsp;sits down to talk about the critical need for a strong and unified approach to safeguarding digital assets against threats like&nbsp;<a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a>.</p><p>Expanding on the pervasive nature of these&nbsp;<a href="https://em360tech.com/top-10/types-of-cyber-attacks" rel="noopener noreferrer" target="_blank">threats</a>, Ley emphatically agrees that no organisation can afford to be complacent. Whether a large or small organisation and no matter where you are in the world, “everybody with IT data, employee data, application data, intellectual property of your product” faces potential risks.</p><p>Alluding to a common pitfall in security strategies, Ley points out that "a lot of people believe it's a technology only problem”. However, he explains that it’s actually a “people processing technology issue”.&nbsp;</p><p>He stresses that effective cybersecurity isn't solely about the tools deployed, but also about clear roles and responsibilities, questioning "who owns the accountability within the company?” Is it everyone or is it one person or team in particular?</p><p>This leads him to advocate for the vital role of strong CISOs within organisations.</p><h3><strong>Takeaways</strong></h3><ul><li>DDoS attacks are increasingly sophisticated and varied.</li><li>A unified security platform enhances visibility and control.</li><li>Granular detection is essential to differentiate between good and bad traffic.</li><li>Organisations often underestimate their exposure to cyber attacks.</li><li>AI is becoming a crucial tool in fighting cyber threats.</li><li>Human expertise is vital in deploying and managing security technologies.</li><li>Continuous penetration testing helps identify vulnerabilities.</li><li>Cybersecurity is a shared responsibility across all levels of an organisation.</li><li>Smaller organisations need to leverage external expertise for security.</li><li>Proactive measures are essential to prevent potential cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><p><strong>00:00 Introduction to Cybersecurity Challenges</strong></p><p><strong>03:06 Understanding DDoS Attacks</strong></p><p><strong>05:45 The Importance of Unified Security Platforms</strong></p><p><strong>09:05 Granular Detection in Cybersecurity</strong></p><p><strong>12:09 Real-World DDoS Mitigation Examples</strong></p><p><strong>15:07 AI in Cybersecurity: The New Frontier</strong></p><p><strong>17:59 The Human Element in Cyber Defense</strong></p><p><strong>20:12 Common Misconceptions About DDoS</strong></p><p><strong>23:56 Proactive Cybersecurity Measures</strong></p><p><strong>26:51 Future Cyber Threats and Nightmares</strong></p><h2>About A10 Networks</h2><p><a href="https://em360tech.com/solution-providers/a10-networks" rel="noopener noreferrer" target="_blank">A10 Networks</a>&nbsp;provides security and infrastructure solutions for on-premises, hybrid cloud, and edge-cloud environments. Their offerings help over 7000 customers, including global large enterprises and communications, cloud, and web service providers, ensure that business-critical applications and networks are secure, available, and efficient.</p><p>A10 Networks was founded in 2004 by Lee Chen and is based in San Jose, California. Lee Chen served as CEO until late 2019. The current CEO and President of A10 Networks is Dhrupad Trivedi, who assumed the role in December 2019.</p>]]></description><content:encoded><![CDATA[<p>“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks.</p><p>This observation from Ley sets the stage for a crucial discussion on&nbsp;<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist</a>&nbsp;podcast. Shubhangi Dua, podcast producer and Tech journalist at&nbsp;<em>EM360Tech</em>&nbsp;sits down to talk about the critical need for a strong and unified approach to safeguarding digital assets against threats like&nbsp;<a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a>.</p><p>Expanding on the pervasive nature of these&nbsp;<a href="https://em360tech.com/top-10/types-of-cyber-attacks" rel="noopener noreferrer" target="_blank">threats</a>, Ley emphatically agrees that no organisation can afford to be complacent. Whether a large or small organisation and no matter where you are in the world, “everybody with IT data, employee data, application data, intellectual property of your product” faces potential risks.</p><p>Alluding to a common pitfall in security strategies, Ley points out that "a lot of people believe it's a technology only problem”. However, he explains that it’s actually a “people processing technology issue”.&nbsp;</p><p>He stresses that effective cybersecurity isn't solely about the tools deployed, but also about clear roles and responsibilities, questioning "who owns the accountability within the company?” Is it everyone or is it one person or team in particular?</p><p>This leads him to advocate for the vital role of strong CISOs within organisations.</p><h3><strong>Takeaways</strong></h3><ul><li>DDoS attacks are increasingly sophisticated and varied.</li><li>A unified security platform enhances visibility and control.</li><li>Granular detection is essential to differentiate between good and bad traffic.</li><li>Organisations often underestimate their exposure to cyber attacks.</li><li>AI is becoming a crucial tool in fighting cyber threats.</li><li>Human expertise is vital in deploying and managing security technologies.</li><li>Continuous penetration testing helps identify vulnerabilities.</li><li>Cybersecurity is a shared responsibility across all levels of an organisation.</li><li>Smaller organisations need to leverage external expertise for security.</li><li>Proactive measures are essential to prevent potential cyber threats.</li></ul><br/><h3><strong>Chapters</strong></h3><p><strong>00:00 Introduction to Cybersecurity Challenges</strong></p><p><strong>03:06 Understanding DDoS Attacks</strong></p><p><strong>05:45 The Importance of Unified Security Platforms</strong></p><p><strong>09:05 Granular Detection in Cybersecurity</strong></p><p><strong>12:09 Real-World DDoS Mitigation Examples</strong></p><p><strong>15:07 AI in Cybersecurity: The New Frontier</strong></p><p><strong>17:59 The Human Element in Cyber Defense</strong></p><p><strong>20:12 Common Misconceptions About DDoS</strong></p><p><strong>23:56 Proactive Cybersecurity Measures</strong></p><p><strong>26:51 Future Cyber Threats and Nightmares</strong></p><h2>About A10 Networks</h2><p><a href="https://em360tech.com/solution-providers/a10-networks" rel="noopener noreferrer" target="_blank">A10 Networks</a>&nbsp;provides security and infrastructure solutions for on-premises, hybrid cloud, and edge-cloud environments. Their offerings help over 7000 customers, including global large enterprises and communications, cloud, and web service providers, ensure that business-critical applications and networks are secure, available, and efficient.</p><p>A10 Networks was founded in 2004 by Lee Chen and is based in San Jose, California. Lee Chen served as CEO until late 2019. The current CEO and President of A10 Networks is Dhrupad Trivedi, who assumed the role in December 2019.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c5a3f5a3-6925-476b-b27e-a8637181843c</guid><itunes:image href="https://artwork.captivate.fm/3b6fc528-82e3-43d8-b299-d4b285c685fb/mVz7n7ai95Dwc_4QNsA2g3mh.jpg"/><pubDate>Wed, 21 May 2025 10:20:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/c5a3f5a3-6925-476b-b27e-a8637181843c.mp3" length="29561620" type="audio/mpeg"/><itunes:duration>30:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?"><podcast:source uri="https://youtu.be/fQtk2ncny_o"/></podcast:alternateEnclosure></item><item><title>The Never-Ending Chess Game in Personnel Security</title><itunes:title>The Never-Ending Chess Game in Personnel Security</itunes:title><description><![CDATA[<h3>Takeaways</h3><ul><li>#Personnelsecurity is crucial for organisations and individuals.</li><li>There is a significant talent shortage in the #cybersecurityindustry.</li><li>#AI can enhance security measures but cannot replace human instinct.</li><li>Outsourcing security functions can be beneficial for smaller organisations.</li><li>The pressure on cybersecurity roles is immense and can lead to high turnover.</li><li>AI will play a larger role in automating security responses in the future.</li><li>Understanding the risks of outsourcing versus insourcing is vital for businesses.</li></ul><br/><p>On this episode of #<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">TheSecurityStrategist</a>, host Keyari Page welcomes Tony King, Senior Vice President of International Sales at NETSCOUT. They discuss what personnel security is and why it's important for individuals and organisations to prioritise it.&nbsp;</p><p>To explain this, King introduces the concept of “knowledgeable instinct.” This means using both what people know and what AI can do to find and deal with cyber threats.&nbsp;</p><p>He emphasises that AI’s role is to be an extra “12th” player on your “football team,” making the defense that much stronger.&nbsp;</p><p>Listeners will gain a deeper perspective on the dynamic nature of the threat landscape, including the ways in which malicious actors leverage AI, and the continuous necessity for proactive threat prediction and prevention measures.&nbsp;</p><p>Tune in to understand the need for ongoing education and continuous skill development in a “never-ending chess game” of personnel security. </p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a></p>]]></description><content:encoded><![CDATA[<h3>Takeaways</h3><ul><li>#Personnelsecurity is crucial for organisations and individuals.</li><li>There is a significant talent shortage in the #cybersecurityindustry.</li><li>#AI can enhance security measures but cannot replace human instinct.</li><li>Outsourcing security functions can be beneficial for smaller organisations.</li><li>The pressure on cybersecurity roles is immense and can lead to high turnover.</li><li>AI will play a larger role in automating security responses in the future.</li><li>Understanding the risks of outsourcing versus insourcing is vital for businesses.</li></ul><br/><p>On this episode of #<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">TheSecurityStrategist</a>, host Keyari Page welcomes Tony King, Senior Vice President of International Sales at NETSCOUT. They discuss what personnel security is and why it's important for individuals and organisations to prioritise it.&nbsp;</p><p>To explain this, King introduces the concept of “knowledgeable instinct.” This means using both what people know and what AI can do to find and deal with cyber threats.&nbsp;</p><p>He emphasises that AI’s role is to be an extra “12th” player on your “football team,” making the defense that much stronger.&nbsp;</p><p>Listeners will gain a deeper perspective on the dynamic nature of the threat landscape, including the ways in which malicious actors leverage AI, and the continuous necessity for proactive threat prediction and prevention measures.&nbsp;</p><p>Tune in to understand the need for ongoing education and continuous skill development in a “never-ending chess game” of personnel security. </p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com</a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">bf421b28-ebe4-493a-8eea-6c439acb1896</guid><itunes:image href="https://artwork.captivate.fm/e8d5fbd8-dec5-40aa-b025-b3cfa99cde31/1hQwt3rC43-4cKfti15beH7_.jpg"/><pubDate>Fri, 16 May 2025 14:36:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/bf421b28-ebe4-493a-8eea-6c439acb1896.mp3" length="26731023" type="audio/mpeg"/><itunes:duration>27:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode><podcast:season>1</podcast:season></item><item><title>Beyond The App Store: Cloud Marketplace Security</title><itunes:title>Beyond The App Store: Cloud Marketplace Security</itunes:title><description><![CDATA[<h3>Takeaways</h3><ul><li>#Cloudmarketplaces function like a digital mall for various services.</li><li>Continuous monitoring and detection of threats are essential.</li><li>Legislation like NIST 2 and Dora impacts cloud security practices.</li><li>Zero trust methodology is advised in securing cloud connections.</li><li>Regular penetration testing and vulnerability management are necessary.</li><li>Data strategy is key when implementing #AI in cloud services.</li><li>Centralising identity management can limit security risks.</li></ul><br/><h3>Summary</h3><p>On the #<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">SecurityStrategistpodcast</a>, host Keyari Page delves into the dynamic world of cloud marketplace ecosystems with Mostyn Thomas, Senior Director of Security at Pax8.&nbsp;</p><p>Listeners can gain a comprehensive understanding of these digital hubs where IT professionals and <a href="https://em360tech.com/top-10/top-10-managed-service-providers" rel="noopener noreferrer" target="_blank">managed service providers (MSPs)</a> can select from a diverse range of services.</p><p>Imagine a digital "mall," that's essentially a cloud marketplace. Within it, organisations can find "stores" that offer everything from <a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">identity and access management</a> and cutting-edge <a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">API security</a>.</p><p>The conversation also explores the crucial challenge of establishing secure cloud connections, where Thomas emphasises the importance of a "zero trust" security model.&nbsp;</p><p>This approach requires a diligent verification process for every connection and user within the cloud environment, regardless of location or perceived trustworthiness.</p><p>Tune in to learn its potential and evolving security challenges that must be addressed to ensure a safe and reliable experience for all stakeholders.</p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com </a></p>]]></description><content:encoded><![CDATA[<h3>Takeaways</h3><ul><li>#Cloudmarketplaces function like a digital mall for various services.</li><li>Continuous monitoring and detection of threats are essential.</li><li>Legislation like NIST 2 and Dora impacts cloud security practices.</li><li>Zero trust methodology is advised in securing cloud connections.</li><li>Regular penetration testing and vulnerability management are necessary.</li><li>Data strategy is key when implementing #AI in cloud services.</li><li>Centralising identity management can limit security risks.</li></ul><br/><h3>Summary</h3><p>On the #<a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">SecurityStrategistpodcast</a>, host Keyari Page delves into the dynamic world of cloud marketplace ecosystems with Mostyn Thomas, Senior Director of Security at Pax8.&nbsp;</p><p>Listeners can gain a comprehensive understanding of these digital hubs where IT professionals and <a href="https://em360tech.com/top-10/top-10-managed-service-providers" rel="noopener noreferrer" target="_blank">managed service providers (MSPs)</a> can select from a diverse range of services.</p><p>Imagine a digital "mall," that's essentially a cloud marketplace. Within it, organisations can find "stores" that offer everything from <a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">identity and access management</a> and cutting-edge <a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">API security</a>.</p><p>The conversation also explores the crucial challenge of establishing secure cloud connections, where Thomas emphasises the importance of a "zero trust" security model.&nbsp;</p><p>This approach requires a diligent verification process for every connection and user within the cloud environment, regardless of location or perceived trustworthiness.</p><p>Tune in to learn its potential and evolving security challenges that must be addressed to ensure a safe and reliable experience for all stakeholders.</p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">em360tech.com </a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">51942df7-6f2b-4d01-92c5-c40523ece195</guid><itunes:image href="https://artwork.captivate.fm/6b96f8a7-90dd-42dc-b02d-78bec5545247/nmtGHs2Encg22FXajSigSsfb.jpg"/><pubDate>Fri, 16 May 2025 14:16:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/51942df7-6f2b-4d01-92c5-c40523ece195.mp3" length="26280247" type="audio/mpeg"/><itunes:duration>27:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode><podcast:season>1</podcast:season></item><item><title>Data Backups: The Digital Safety Deposit Box</title><itunes:title>Data Backups: The Digital Safety Deposit Box</itunes:title><description><![CDATA[<h3>Takeaways</h3><ul><li>#Databackups are essential for business continuity.</li><li>The 3-2-1 backup #strategy is crucial for data protection.</li><li>Testing backup systems is necessary to ensure data recovery.</li><li>Businesses should back up all critical data sets.</li><li>#AI can assist in data classification for backups.</li><li>Avoid keeping backups in the same location as primary data.</li><li>Understanding when data became corrupted is vital for recovery.</li></ul><br/><h3>Summary</h3><p>Join host Keyari Page as she welcomes Jon Fielding, Managing Director of Apricorn to discuss data backups.&nbsp;</p><p>They break down the basics of what data backups are and explain why they are so critical for businesses, especially in today's world of frequent ransomware attacks.</p><p>This episode offers practical guidance on setting up a good backup system. You'll discover how to identify your key data, prioritise its protection and avoid errors that could compromise your information.</p><p>Fielding also shares the valuable <a href="https://em360tech.com/tech-articles/backup-strategies-post-breach-recovery" rel="noopener noreferrer" target="_blank">3-2-1 backup strategy</a> – a simple but powerful rule to minimise risk.&nbsp;</p><p>The discussion even touches on the potential role of AI in data backups, exploring both its benefits and the importance of maintaining human oversight.&nbsp;&nbsp;</p><p>This podcast provides actionable insights and expert guidance to help you protect your valuable data and ensure business continuity.&nbsp;</p><p>Tune in to gain the knowledge and confidence you need to navigate the complexities of data security!</p><p>For the latest tech insights visit: em360tech.com</p>]]></description><content:encoded><![CDATA[<h3>Takeaways</h3><ul><li>#Databackups are essential for business continuity.</li><li>The 3-2-1 backup #strategy is crucial for data protection.</li><li>Testing backup systems is necessary to ensure data recovery.</li><li>Businesses should back up all critical data sets.</li><li>#AI can assist in data classification for backups.</li><li>Avoid keeping backups in the same location as primary data.</li><li>Understanding when data became corrupted is vital for recovery.</li></ul><br/><h3>Summary</h3><p>Join host Keyari Page as she welcomes Jon Fielding, Managing Director of Apricorn to discuss data backups.&nbsp;</p><p>They break down the basics of what data backups are and explain why they are so critical for businesses, especially in today's world of frequent ransomware attacks.</p><p>This episode offers practical guidance on setting up a good backup system. You'll discover how to identify your key data, prioritise its protection and avoid errors that could compromise your information.</p><p>Fielding also shares the valuable <a href="https://em360tech.com/tech-articles/backup-strategies-post-breach-recovery" rel="noopener noreferrer" target="_blank">3-2-1 backup strategy</a> – a simple but powerful rule to minimise risk.&nbsp;</p><p>The discussion even touches on the potential role of AI in data backups, exploring both its benefits and the importance of maintaining human oversight.&nbsp;&nbsp;</p><p>This podcast provides actionable insights and expert guidance to help you protect your valuable data and ensure business continuity.&nbsp;</p><p>Tune in to gain the knowledge and confidence you need to navigate the complexities of data security!</p><p>For the latest tech insights visit: em360tech.com</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">14250f73-235a-4abc-9833-7002c20672eb</guid><itunes:image href="https://artwork.captivate.fm/e13c6640-3ddb-48aa-84d5-7bbe20fc7a00/GQGTS5a16mEFdU2kplJ63S3r.jpg"/><pubDate>Thu, 15 May 2025 16:38:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/14250f73-235a-4abc-9833-7002c20672eb.mp3" length="19221271" type="audio/mpeg"/><itunes:duration>20:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode><podcast:season>1</podcast:season></item><item><title>DDoS Demystified: Understanding the Threat</title><itunes:title>DDoS Demystified: Understanding the Threat</itunes:title><description><![CDATA[<h3>Takeaways</h3><ul><li>#DDoS can mimic legitimate traffic, making detection difficult.</li><li>#Botnets are often created from compromised IoT devices.</li><li>Motivations for DDoS attacks range from hacktivism to personal grievances.</li><li>Residential IP proxy networks complicate DDoS defense.</li><li>#AI is increasingly being used in both attacks and defenses.</li><li>The future of cybersecurity will require AI-assisted solutions.</li><li>Organisations must understand their traffic to defend effectively.</li></ul><br/><h3>Summary</h3><p>In this episode of <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.</p><p><a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a> are “one of the oldest cybersecurity attacks”. It’s an attempt to incapacitate a network, server, or website by overwhelming it with huge amounts of traffic.</p><p>However, despite their long history, DDoS attacks remain a significant problem. This is due to the fact that they “look like really popular, busy websites” which can lead to legitimate traffic being generated.</p><p>Warburton explains that they could be employed for a number of reasons, such as hacktivism, gaming-related conflicts, and geopolitical manipulation. A key example is of a Russian operation which used a digital attack to mimic a <a href="https://www.lemonde.fr/en/pixels/article/2023/03/27/france-s-assemblee-nationale-website-temporarily-blocked-by-a-group-of-pro-russian-hackers_6020872_13.html" rel="noopener noreferrer" target="_blank">French protest against pension reform</a>. This spread disinformation and created real world tension.</p><p>Tune into the latest episode to hear Warburton’s advice to businesses on tackling DDoS attacks.</p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech.com</a></p>]]></description><content:encoded><![CDATA[<h3>Takeaways</h3><ul><li>#DDoS can mimic legitimate traffic, making detection difficult.</li><li>#Botnets are often created from compromised IoT devices.</li><li>Motivations for DDoS attacks range from hacktivism to personal grievances.</li><li>Residential IP proxy networks complicate DDoS defense.</li><li>#AI is increasingly being used in both attacks and defenses.</li><li>The future of cybersecurity will require AI-assisted solutions.</li><li>Organisations must understand their traffic to defend effectively.</li></ul><br/><h3>Summary</h3><p>In this episode of <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">The Security Strategist podcast</a>, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.</p><p><a href="https://em360tech.com/tech-articles/what-ddos-attack-guide-distributed-denial-service-attacks" rel="noopener noreferrer" target="_blank">DDoS attacks</a> are “one of the oldest cybersecurity attacks”. It’s an attempt to incapacitate a network, server, or website by overwhelming it with huge amounts of traffic.</p><p>However, despite their long history, DDoS attacks remain a significant problem. This is due to the fact that they “look like really popular, busy websites” which can lead to legitimate traffic being generated.</p><p>Warburton explains that they could be employed for a number of reasons, such as hacktivism, gaming-related conflicts, and geopolitical manipulation. A key example is of a Russian operation which used a digital attack to mimic a <a href="https://www.lemonde.fr/en/pixels/article/2023/03/27/france-s-assemblee-nationale-website-temporarily-blocked-by-a-group-of-pro-russian-hackers_6020872_13.html" rel="noopener noreferrer" target="_blank">French protest against pension reform</a>. This spread disinformation and created real world tension.</p><p>Tune into the latest episode to hear Warburton’s advice to businesses on tackling DDoS attacks.</p><p>For the latest tech insights visit: <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech.com</a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">89c2d6b6-5ce4-44c2-845a-45fe6d6751ba</guid><itunes:image href="https://artwork.captivate.fm/c72a32cb-e954-450e-a9ca-fec22505a474/nf6UhXgiQt-N30t-gphHK1Cd.jpg"/><pubDate>Thu, 15 May 2025 12:04:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/89c2d6b6-5ce4-44c2-845a-45fe6d6751ba.mp3" length="23597269" type="audio/mpeg"/><itunes:duration>24:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is Traditional Client-Based Access Obsolete? Rethinking Internal Security</title><itunes:title>Is Traditional Client-Based Access Obsolete? Rethinking Internal Security</itunes:title><description><![CDATA[<p>"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/pomerium-one-pager" rel="noopener noreferrer" target="_blank">Pomerium</a>.</p><p>In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at KuppingerCole Analysts AG speaks with DeSimone about the shifting focus in security to internal access solutions, particularly in&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank"><strong>identity and access management [IAM]</strong></a>.</p><p>DeSimone emphasises the importance of simplifying typically complex internal access management <a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">IAM solutions</a>. He suggests directing focus on the foundational need for secure and user-friendly access among other recommendations.</p><p>Additionally, he shares insights from his journey in the privileged access management space, discussing the limitations of traditional perimeter-based security and the need for a more comprehensive approach to identity and access.</p><p>The conversation also explores the challenges posed by client-based access solutions, the importance of context-driven access, and how Pomerium's clientless approach to device health is reforming internal access management IAM.</p><p>As threats become more sophisticated and workforces more distributed, the once impenetrable "castle and moat" approach leaves organisations vulnerable in terms of identity and access. As such, this podcast addresses the limitations of conventional access management IAM solutions and explores a modern, context-driven approach to securing internal assets.</p><p>DeSimone argues that the numerous acronyms like SASE, CASB, and PAM, while representing different facets of privileged access, ultimately fall under the umbrella of "just actually one big market under it, which is the internal identity and access market". The core challenge lies in moving beyond login-based authorization to a more granular, context-driven access model.</p><p>Watch the podcast to learn more about how to overcome traditional complexities and approach a more modern and relevant internal access management IAM solution.</p><h3><strong>Takeaways</strong></h3><ul><li>Bobby's journey in security began with privileged access management.</li><li>Traditional perimeter-based security has significant limitations.</li><li>Organisations struggle with internal access despite strong outer defenses.</li><li>Client-based access solutions introduce administrative burdens and vulnerabilities.</li><li>Context-driven access is essential for modern security solutions.</li><li>Pomerium supports clientless device identity for easier access management.</li><li>The security landscape is evolving towards a more integrated internal access market.</li><li>Real-world applications of Pomerium show its effectiveness across industries.</li><li>CISOs should prioritize securing internal assets without traditional complexities.</li><li>Pomerium offers a flexible approach to access control on organisational terms.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Security Strategies Podcast</p><p>01:02 Bobby's Journey in Security and PAM</p><p>03:01 Challenges of Traditional Client-Based Access Solutions</p><p>05:53 Market Segmentation and Context-Driven Access</p><p>09:02 Pomerium's Approach to Device Health and Clientless Access</p><p>12:03 Beyond the Perimeter: Real-World Applications of Pomerium</p><p>16:51 Key Takeaways for CISOs</p><h2><strong>About Pomerium</strong></h2><p><a href="https://em360tech.com/solution-providers/pomerium" rel="noopener noreferrer" target="_blank">Pomerium</a>&nbsp;is a zero-trust reverse proxy that helps enterprises manage secure application access. Authenticate, authorise, monitor, and secure user access to any application without a VPN. Access is driven by identity and context.</p><p>Pomerium allows you to use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application. It enables you to add access control to any app, providing a standardised interface to do so whether an application itself has authorisation or authentication baked-in. This allows developers to focus on their apps, rather than reinventing access control mechanisms.</p>]]></description><content:encoded><![CDATA[<p>"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/pomerium-one-pager" rel="noopener noreferrer" target="_blank">Pomerium</a>.</p><p>In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at KuppingerCole Analysts AG speaks with DeSimone about the shifting focus in security to internal access solutions, particularly in&nbsp;<a href="https://em360tech.com/top-10/top-10-identity-and-access-management-iam-tools-updated" rel="noopener noreferrer" target="_blank"><strong>identity and access management [IAM]</strong></a>.</p><p>DeSimone emphasises the importance of simplifying typically complex internal access management <a href="https://em360tech.com/tech-articles/importance-identity-and-access-management-todays-digital-world" rel="noopener noreferrer" target="_blank">IAM solutions</a>. He suggests directing focus on the foundational need for secure and user-friendly access among other recommendations.</p><p>Additionally, he shares insights from his journey in the privileged access management space, discussing the limitations of traditional perimeter-based security and the need for a more comprehensive approach to identity and access.</p><p>The conversation also explores the challenges posed by client-based access solutions, the importance of context-driven access, and how Pomerium's clientless approach to device health is reforming internal access management IAM.</p><p>As threats become more sophisticated and workforces more distributed, the once impenetrable "castle and moat" approach leaves organisations vulnerable in terms of identity and access. As such, this podcast addresses the limitations of conventional access management IAM solutions and explores a modern, context-driven approach to securing internal assets.</p><p>DeSimone argues that the numerous acronyms like SASE, CASB, and PAM, while representing different facets of privileged access, ultimately fall under the umbrella of "just actually one big market under it, which is the internal identity and access market". The core challenge lies in moving beyond login-based authorization to a more granular, context-driven access model.</p><p>Watch the podcast to learn more about how to overcome traditional complexities and approach a more modern and relevant internal access management IAM solution.</p><h3><strong>Takeaways</strong></h3><ul><li>Bobby's journey in security began with privileged access management.</li><li>Traditional perimeter-based security has significant limitations.</li><li>Organisations struggle with internal access despite strong outer defenses.</li><li>Client-based access solutions introduce administrative burdens and vulnerabilities.</li><li>Context-driven access is essential for modern security solutions.</li><li>Pomerium supports clientless device identity for easier access management.</li><li>The security landscape is evolving towards a more integrated internal access market.</li><li>Real-world applications of Pomerium show its effectiveness across industries.</li><li>CISOs should prioritize securing internal assets without traditional complexities.</li><li>Pomerium offers a flexible approach to access control on organisational terms.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Security Strategies Podcast</p><p>01:02 Bobby's Journey in Security and PAM</p><p>03:01 Challenges of Traditional Client-Based Access Solutions</p><p>05:53 Market Segmentation and Context-Driven Access</p><p>09:02 Pomerium's Approach to Device Health and Clientless Access</p><p>12:03 Beyond the Perimeter: Real-World Applications of Pomerium</p><p>16:51 Key Takeaways for CISOs</p><h2><strong>About Pomerium</strong></h2><p><a href="https://em360tech.com/solution-providers/pomerium" rel="noopener noreferrer" target="_blank">Pomerium</a>&nbsp;is a zero-trust reverse proxy that helps enterprises manage secure application access. Authenticate, authorise, monitor, and secure user access to any application without a VPN. Access is driven by identity and context.</p><p>Pomerium allows you to use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application. It enables you to add access control to any app, providing a standardised interface to do so whether an application itself has authorisation or authentication baked-in. This allows developers to focus on their apps, rather than reinventing access control mechanisms.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b418858b-d099-4bda-a5db-695ecdbba118</guid><itunes:image href="https://artwork.captivate.fm/93ad62dd-3573-4e83-9bdf-026107ee52f9/kU0xxiCASXQwPo0c4C-AV5O2.jpg"/><pubDate>Thu, 01 May 2025 14:06:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/b418858b-d099-4bda-a5db-695ecdbba118.mp3" length="27899041" type="audio/mpeg"/><itunes:duration>29:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode><podcast:season>1</podcast:season></item><item><title>Can You Afford to Ignore Exploitability?</title><itunes:title>Can You Afford to Ignore Exploitability?</itunes:title><description><![CDATA[<p><strong>Takeaways</strong></p><ul><li>#ExposureManagement involves assessing multiple factors, not just single scans.</li><li>Organisations must optimise their remediation capacity due to limited resources.</li><li>Visibility is crucial, but finding the most important exposure is essential.</li><li>#TraditionalVulnerability management programs are becoming ineffective.</li><li>Exploitability is the key criterion for prioritising remediation efforts.</li><li>Automated scanning can provide rapid insights into vulnerabilities.</li><li>Time taken to remediate is critical for effective security management. </li></ul><br/><p><strong>Summary</strong></p><p>In this episode of the <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>, Richard Stiennon, Chief Research Analyst at IT Harvest and industry leader, speaks with Marc Gaffan, the CEO of IONIX. </p><p>They explore the core challenges facing #cybersecurity professionals — particularly in a rapidly evolving digital landscape — and discuss innovative approaches to attack surface management.</p><p>Gaffan explains exposure management isn't just about looking at one scan, vulnerability, or way an organisation could be exploited. Instead, it takes a holistic approach to understand what "exposure" means for organisations.</p><p>Listen to the full conversation on how to adapt your security strategy to today's potential threats. Gaffan's expertise provides valuable guidance for any security professional looking to stay ahead of the curve.</p><p>For more tech insights visit <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech.com</a></p>]]></description><content:encoded><![CDATA[<p><strong>Takeaways</strong></p><ul><li>#ExposureManagement involves assessing multiple factors, not just single scans.</li><li>Organisations must optimise their remediation capacity due to limited resources.</li><li>Visibility is crucial, but finding the most important exposure is essential.</li><li>#TraditionalVulnerability management programs are becoming ineffective.</li><li>Exploitability is the key criterion for prioritising remediation efforts.</li><li>Automated scanning can provide rapid insights into vulnerabilities.</li><li>Time taken to remediate is critical for effective security management. </li></ul><br/><p><strong>Summary</strong></p><p>In this episode of the <a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank">Security Strategist</a>, Richard Stiennon, Chief Research Analyst at IT Harvest and industry leader, speaks with Marc Gaffan, the CEO of IONIX. </p><p>They explore the core challenges facing #cybersecurity professionals — particularly in a rapidly evolving digital landscape — and discuss innovative approaches to attack surface management.</p><p>Gaffan explains exposure management isn't just about looking at one scan, vulnerability, or way an organisation could be exploited. Instead, it takes a holistic approach to understand what "exposure" means for organisations.</p><p>Listen to the full conversation on how to adapt your security strategy to today's potential threats. Gaffan's expertise provides valuable guidance for any security professional looking to stay ahead of the curve.</p><p>For more tech insights visit <a href="https://em360tech.com/" rel="noopener noreferrer" target="_blank">EM360Tech.com</a></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">2d957e6d-d54a-48d5-a627-ba9add3ebbc6</guid><itunes:image href="https://artwork.captivate.fm/4bfd3fdf-a860-45d8-9764-ccabeacb2e0d/4rpG54q0fElcG3BOTtXB86K2.jpg"/><pubDate>Wed, 30 Apr 2025 16:15:00 +0100</pubDate><enclosure url="https://episodes.captivate.fm/episode/2d957e6d-d54a-48d5-a627-ba9add3ebbc6.mp3" length="18532804" type="audio/mpeg"/><itunes:duration>19:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode><podcast:season>1</podcast:season></item><item><title>From Peacetime to Wartime: Is Your Cloud Secure?</title><itunes:title>From Peacetime to Wartime: Is Your Cloud Secure?</itunes:title><description><![CDATA[<p><strong>Takeaways</strong></p><ul><li>#Peacetimesecurity is no longer sufficient in modern cloud environments.</li><li>AI and automation are essential for effective security management.</li><li>Real-time security platforms can prevent breaches before they occur.</li><li>Integrating security into the development process is crucial for success.</li><li>Key metrics include mean time to detect and remediate vulnerabilities.</li><li>A unified #dataarchitecture is vital for effective security operations.</li><li>Automation can significantly reduce analyst workload and alert fatigue.</li><li>Organisations should evaluate vendors based on their ability to adapt to evolving threats.</li></ul><br/><p><strong>Summary</strong></p><p>Is your organisation still relying on outdated “peacetime” security solution strategies in the face of rapidly evolving #cloudthreats? Host Brad LaPorte explores answering this question with guest Ory Segal, Technical Evangelist of Cortex Cloud, Palo Alto Networks. They&nbsp; discuss how the dynamic nature of modern cloud environments and increasing adoption of AI are compelling organisations to move beyond traditional "peacetime" network security measures.</p><p>In this episode of the<em> </em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, Segal explains the difference between securing traditional monolithic applications and modern cloud-native applications. “Modern cloud native applications, beyond the fact that it's deployed to the cloud, entails something completely different,” Segal states, stressing the complexity of various technological layers in cloud services.</p><p>Join the conversation as we discuss the shift from static security models to dynamic, real-time protection, and leveraging #AI to mitigate cloud security threats and strengthen network protection. Learn what this means for your organisation and how to adapt your cloud security solutions.</p><p>For the latest tech insights visit: EM360Tech.com</p>]]></description><content:encoded><![CDATA[<p><strong>Takeaways</strong></p><ul><li>#Peacetimesecurity is no longer sufficient in modern cloud environments.</li><li>AI and automation are essential for effective security management.</li><li>Real-time security platforms can prevent breaches before they occur.</li><li>Integrating security into the development process is crucial for success.</li><li>Key metrics include mean time to detect and remediate vulnerabilities.</li><li>A unified #dataarchitecture is vital for effective security operations.</li><li>Automation can significantly reduce analyst workload and alert fatigue.</li><li>Organisations should evaluate vendors based on their ability to adapt to evolving threats.</li></ul><br/><p><strong>Summary</strong></p><p>Is your organisation still relying on outdated “peacetime” security solution strategies in the face of rapidly evolving #cloudthreats? Host Brad LaPorte explores answering this question with guest Ory Segal, Technical Evangelist of Cortex Cloud, Palo Alto Networks. They&nbsp; discuss how the dynamic nature of modern cloud environments and increasing adoption of AI are compelling organisations to move beyond traditional "peacetime" network security measures.</p><p>In this episode of the<em> </em><a href="https://em360tech.com/podcasts/the-security-strategist" rel="noopener noreferrer" target="_blank"><em>Security Strategist</em></a>, Segal explains the difference between securing traditional monolithic applications and modern cloud-native applications. “Modern cloud native applications, beyond the fact that it's deployed to the cloud, entails something completely different,” Segal states, stressing the complexity of various technological layers in cloud services.</p><p>Join the conversation as we discuss the shift from static security models to dynamic, real-time protection, and leveraging #AI to mitigate cloud security threats and strengthen network protection. Learn what this means for your organisation and how to adapt your cloud security solutions.</p><p>For the latest tech insights visit: EM360Tech.com</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a8135907-e005-40c0-a342-fec4b0853b28</guid><itunes:image href="https://artwork.captivate.fm/bcc79b74-6469-450c-84a2-d511966e6a01/I8f7sMyZ5vFUUN_QxQGQSIK-.jpg"/><pubDate>Mon, 28 Apr 2025 09:55:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/245214db-a0a3-4752-ae78-285938ea9954/THE-SECURITY-STRATEGIST-Palo-Alto-Networks-MASTER-v1-converted.mp3" length="31487743" type="audio/mpeg"/><itunes:duration>32:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode><podcast:season>1</podcast:season></item><item><title>How to Streamline IT Operations and Enhance Security with RMM and Automation</title><itunes:title>How to Streamline IT Operations and Enhance Security with RMM and Automation</itunes:title><description><![CDATA[<p>Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated&nbsp;<a href="https://www.linkedin.com/in/mouraelias/" rel="noopener noreferrer" target="_blank">Elias Moura</a>, the Head of Product Marketing at&nbsp;<a href="https://em360tech.com/solution-providers-pulseway" rel="noopener noreferrer" target="_blank">Pulseway</a>.&nbsp;</p><p>“You have automation to enable auto-remediation, built-in remote control, automated patching, mobile device management, and other features that make&nbsp;<a href="https://em360tech.com/whitepapers/pulseway-rmm-datasheet" rel="noopener noreferrer" target="_blank">RMM</a>&nbsp;an effective tool,” he added. “The RMM is usually the central piece to make sure that IT management is consistent and tackling different issues that your end user could face.”&nbsp;</p><p>In this episode of the&nbsp;<em>Security Strategist</em>&nbsp;podcast, host Shubhangi Dua, B2B Tech Journalist and Podcast Producer from EM360Tech speaks to Moura and Edgar Zacharjev, SVP of Product and Strategy at&nbsp;<a href="https://em360tech.com/whitepapers/pulseway-mobile-device-management" rel="noopener noreferrer" target="_blank">Pulseway</a>.&nbsp;</p><p>They discuss contemporary cybersecurity threats, the importance of compliance and protocols, and the role RMM, automation, and AI in IT management. The conversation spotlights the significance of patch management, automation, and the integration of AI in cybersecurity strategies.&nbsp;</p><p>Real-life examples illustrate how organisations can effectively tackle security challenges, emphasising the need for a proactive approach and continuous awareness training.</p><p>Watch the podcast to learn why diligent patch management forms your initial and crucial line of defense against exploitation. Explore the power of automation in streamlining security operations, improving response times, and enhancing overall efficiency.&nbsp;</p><h3><strong>Takeaways</strong></h3><ul><li>The cybersecurity landscape is constantly evolving, requiring adaptive strategies.</li><li>Compliance and protocols, while sometimes seen as hindrances, are essential for security.</li><li>Remote Monitoring and Management (RMM) is crucial for effective IT management.</li><li>Patching systems regularly is vital to prevent vulnerabilities.</li><li>Automation can significantly enhance IT efficiency and reduce manual workload.</li><li>AI is becoming integral in IT and business management, cybersecurity, but organizations must use it wisely.</li><li>Anomaly detection and user awareness training are critical components of a security strategy.</li><li>Building a unified IT stack simplifies management and enhances security.</li><li>Real-life examples demonstrate the effectiveness of proactive cybersecurity measures.</li><li>CISOs must advocate for cybersecurity investment within their organisations.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Cybersecurity Challenges</p><p>03:10 Evolving Cybersecurity Strategies</p><p>05:58 The Importance of Compliance and Protocols</p><p>08:53 Understanding Remote Monitoring and Management (RMM)</p><p>11:50 The Role of Patching in Cybersecurity</p><p>14:58 Advancements in Automation and IT Management</p><p>17:59 AI in Cybersecurity: Opportunities and Risks</p><p>20:59 Anomaly Detection and IT Awareness Training</p><p>24:02 Real-Life Examples of Cybersecurity Solutions</p><p>27:00 Benefits of RMM for Proactive IT Management</p><p>29:51 Building a Unified IT Stack</p><p>32:51 Internal Security Practices and Protocols</p><p>36:10 Key Takeaways for CISOs</p>]]></description><content:encoded><![CDATA[<p>Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated&nbsp;<a href="https://www.linkedin.com/in/mouraelias/" rel="noopener noreferrer" target="_blank">Elias Moura</a>, the Head of Product Marketing at&nbsp;<a href="https://em360tech.com/solution-providers-pulseway" rel="noopener noreferrer" target="_blank">Pulseway</a>.&nbsp;</p><p>“You have automation to enable auto-remediation, built-in remote control, automated patching, mobile device management, and other features that make&nbsp;<a href="https://em360tech.com/whitepapers/pulseway-rmm-datasheet" rel="noopener noreferrer" target="_blank">RMM</a>&nbsp;an effective tool,” he added. “The RMM is usually the central piece to make sure that IT management is consistent and tackling different issues that your end user could face.”&nbsp;</p><p>In this episode of the&nbsp;<em>Security Strategist</em>&nbsp;podcast, host Shubhangi Dua, B2B Tech Journalist and Podcast Producer from EM360Tech speaks to Moura and Edgar Zacharjev, SVP of Product and Strategy at&nbsp;<a href="https://em360tech.com/whitepapers/pulseway-mobile-device-management" rel="noopener noreferrer" target="_blank">Pulseway</a>.&nbsp;</p><p>They discuss contemporary cybersecurity threats, the importance of compliance and protocols, and the role RMM, automation, and AI in IT management. The conversation spotlights the significance of patch management, automation, and the integration of AI in cybersecurity strategies.&nbsp;</p><p>Real-life examples illustrate how organisations can effectively tackle security challenges, emphasising the need for a proactive approach and continuous awareness training.</p><p>Watch the podcast to learn why diligent patch management forms your initial and crucial line of defense against exploitation. Explore the power of automation in streamlining security operations, improving response times, and enhancing overall efficiency.&nbsp;</p><h3><strong>Takeaways</strong></h3><ul><li>The cybersecurity landscape is constantly evolving, requiring adaptive strategies.</li><li>Compliance and protocols, while sometimes seen as hindrances, are essential for security.</li><li>Remote Monitoring and Management (RMM) is crucial for effective IT management.</li><li>Patching systems regularly is vital to prevent vulnerabilities.</li><li>Automation can significantly enhance IT efficiency and reduce manual workload.</li><li>AI is becoming integral in IT and business management, cybersecurity, but organizations must use it wisely.</li><li>Anomaly detection and user awareness training are critical components of a security strategy.</li><li>Building a unified IT stack simplifies management and enhances security.</li><li>Real-life examples demonstrate the effectiveness of proactive cybersecurity measures.</li><li>CISOs must advocate for cybersecurity investment within their organisations.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to Cybersecurity Challenges</p><p>03:10 Evolving Cybersecurity Strategies</p><p>05:58 The Importance of Compliance and Protocols</p><p>08:53 Understanding Remote Monitoring and Management (RMM)</p><p>11:50 The Role of Patching in Cybersecurity</p><p>14:58 Advancements in Automation and IT Management</p><p>17:59 AI in Cybersecurity: Opportunities and Risks</p><p>20:59 Anomaly Detection and IT Awareness Training</p><p>24:02 Real-Life Examples of Cybersecurity Solutions</p><p>27:00 Benefits of RMM for Proactive IT Management</p><p>29:51 Building a Unified IT Stack</p><p>32:51 Internal Security Practices and Protocols</p><p>36:10 Key Takeaways for CISOs</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">908c2b9d-70de-40b2-92c4-6e7e9c72320b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 24 Apr 2025 10:07:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5fb3def1-831a-4d55-b14a-505a316edd7b/THE-SECURITY-STRATEGIST-Pulseway-MASTER-v1-converted.mp3" length="35857486" type="audio/mpeg"/><itunes:duration>37:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode><podcast:season>1</podcast:season></item><item><title>Can You Stop an API Business Logic Attack?</title><itunes:title>Can You Stop an API Business Logic Attack?</itunes:title><description><![CDATA[<p><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">Application Programming Interface (API)</a>&nbsp;is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors.</p><p>“When it comes to API-based attacks or&nbsp;<a href="https://em360tech.com/tech-articles/apis-hidden-cause-data-breaches" rel="noopener noreferrer" target="_blank">API attacks</a>, just within 2024, if we compare the second half of the year to the first half, there was a 188 percent surge in those types of attacks,” articulated&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657/" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, the Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>.&nbsp;</p><p>To ultimately enhance a business’s ability to detect and respond to cyber threats, securing APIs is key. These APIs are also essential in controlling access to sensitive business logic and data – acting as a key attack vector.&nbsp;</p><p>In this episode of the Security Strategist podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, VP of Research at EMA is joined by Dorot. They discuss the biggest challenges facing API security particularly pertaining to business logic attacks.&nbsp;</p><p>The speakers address the question –&nbsp;<em>Can organisations truly mitigate targeted attacks against their APIs and application business logic?</em>&nbsp;Dorot breaks down the steps and provides practical security strategies to protect enterprises from not only falling into traps but also using business logic for effective protection against increasingly sophisticated threats.</p><h3><strong>Takeaways</strong></h3><ul><li>Business logic attacks exploit legitimate API calls in illegitimate ways.</li><li>Visibility into API environments is crucial for effective security.</li><li>Organizations often lack documentation for their APIs, increasing risk.</li><li>AI tools can help discover and map API endpoints and business logic.</li><li>Business logic is complex and constantly evolving, requiring ongoing attention.</li><li>Attackers use AI to enhance their reconnaissance and exploit strategies.</li><li>Contextual understanding is key to identifying unusual access patterns.</li><li>Security solutions must adapt to the dynamic nature of applications.</li><li>Real-time/runtime mitigation is necessary to respond to evolving threats.</li><li>HTTP DDoS attacks on API-based applications require specialized behavioral-based protection.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to API Security Challenges</p><p>02:32 Understanding Business Logic Attacks</p><p>06:11 The Importance of API Visibility</p><p>12:26 AI's Role in API Security</p><p>17:52 Trends in API Security with Generative AI</p><p>21:43 Context and Granularity in Protection</p><p>28:58 Key Takeaways for Security Practitioners</p><h2><strong>About Radware</strong></h2><p><a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>&nbsp;is a leading cyber security solutions and application delivery solutions company globally. They provide award-winning security and availability for infrastructure, applications, and enterprise IT across physical, cloud, and software-defined data centers.&nbsp;</p><p>Trusted by over 12,500 enterprises and carriers worldwide to enhance digital experience, ensure business continuity, and maximise productivity with cost-effective solutions.</p>]]></description><content:encoded><![CDATA[<p><a href="https://em360tech.com/tech-articles/what-is-api" rel="noopener noreferrer" target="_blank">Application Programming Interface (API)</a>&nbsp;is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors.</p><p>“When it comes to API-based attacks or&nbsp;<a href="https://em360tech.com/tech-articles/apis-hidden-cause-data-breaches" rel="noopener noreferrer" target="_blank">API attacks</a>, just within 2024, if we compare the second half of the year to the first half, there was a 188 percent surge in those types of attacks,” articulated&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657/" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, the Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>.&nbsp;</p><p>To ultimately enhance a business’s ability to detect and respond to cyber threats, securing APIs is key. These APIs are also essential in controlling access to sensitive business logic and data – acting as a key attack vector.&nbsp;</p><p>In this episode of the Security Strategist podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, VP of Research at EMA is joined by Dorot. They discuss the biggest challenges facing API security particularly pertaining to business logic attacks.&nbsp;</p><p>The speakers address the question –&nbsp;<em>Can organisations truly mitigate targeted attacks against their APIs and application business logic?</em>&nbsp;Dorot breaks down the steps and provides practical security strategies to protect enterprises from not only falling into traps but also using business logic for effective protection against increasingly sophisticated threats.</p><h3><strong>Takeaways</strong></h3><ul><li>Business logic attacks exploit legitimate API calls in illegitimate ways.</li><li>Visibility into API environments is crucial for effective security.</li><li>Organizations often lack documentation for their APIs, increasing risk.</li><li>AI tools can help discover and map API endpoints and business logic.</li><li>Business logic is complex and constantly evolving, requiring ongoing attention.</li><li>Attackers use AI to enhance their reconnaissance and exploit strategies.</li><li>Contextual understanding is key to identifying unusual access patterns.</li><li>Security solutions must adapt to the dynamic nature of applications.</li><li>Real-time/runtime mitigation is necessary to respond to evolving threats.</li><li>HTTP DDoS attacks on API-based applications require specialized behavioral-based protection.</li></ul><br/><h3><strong>Chapters</strong></h3><p>00:00 Introduction to API Security Challenges</p><p>02:32 Understanding Business Logic Attacks</p><p>06:11 The Importance of API Visibility</p><p>12:26 AI's Role in API Security</p><p>17:52 Trends in API Security with Generative AI</p><p>21:43 Context and Granularity in Protection</p><p>28:58 Key Takeaways for Security Practitioners</p><h2><strong>About Radware</strong></h2><p><a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>&nbsp;is a leading cyber security solutions and application delivery solutions company globally. They provide award-winning security and availability for infrastructure, applications, and enterprise IT across physical, cloud, and software-defined data centers.&nbsp;</p><p>Trusted by over 12,500 enterprises and carriers worldwide to enhance digital experience, ensure business continuity, and maximise productivity with cost-effective solutions.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c56f4a01-7975-4ef0-9f40-c86c6481b956</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 17 Apr 2025 15:34:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/9afa4b5f-6443-4498-b051-cc9dc843a4f8/RADWARE-URI-AUDIO.mp3" length="40520197" type="audio/mpeg"/><itunes:duration>28:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Critical Role of MDM in Safeguarding Dedicated Devices</title><itunes:title>The Critical Role of MDM in Safeguarding Dedicated Devices</itunes:title><description><![CDATA[<p>In this episode of the<a href="https://em360tech.com/security-feed" rel="noopener noreferrer" target="_blank"> Security Strategist podcast</a>, Chris Steffen speaks with Sudhir Reddy, the CTO of <a href="https://www.esper.io/remote-device-management?utm_id=21024191941&amp;utm_term=remote%20device%20management%20software&amp;utm_campaign=Esper+Search+-+UK+AU+NZ+Nordic&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_content=690893132537&amp;hsa_acc=7879584746&amp;hsa_cam=21024191941&amp;hsa_grp=160330098913&amp;hsa_ad=690893132537&amp;hsa_src=g&amp;hsa_tgt=kwd-1212216005895&amp;hsa_kw=remote%20device%20management%20software&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQjwqIm_BhDnARIsAKBYcmsazdg11FaE8FsLJ5RfIaTneY1-hmIGPG-9B_hUJxXPHcBXexf9cqMaAmJ9EALw_wcB" rel="noopener noreferrer" target="_blank">Esper</a>, about the imperative balance between security and user experience in dedicated devices.&nbsp;</p><p>They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterprises can take to optimise their device fleets. The conversation not only spotlights the importance of proactive security measures but also the need for organisations to address vulnerabilities in their dedicated devices.</p><p>From kiosks and point-of-sale machines to medical devices and airport check-in counters, these ubiquitous tools present idiosyncratic security vulnerabilities that demand proactive strategies.&nbsp;</p><p>MDM is the first line of defense. Sudhir says, “This is your interface to secure everything that's happening on the device, whether it's bits and bytes that get on the device.”&nbsp;</p><p>“Whether it's what peripherals are allowed on the device, what device serial numbers of peripherals are allowed to talk to the device,” he added. “All of these are things that managers of large fleets have to think about."</p><p>Tune into the podcast to hear more about dedicated device security as a critical component of a detailed security strategy and adopting a proactive, data-driven approach to help organisations mitigate risks and ensure harmonious operation of their edge device fleets.</p><p><strong>Takeaways</strong></p><ul><li>Dedicated devices present unique security challenges compared to traditional devices.</li><li>The presence of humans is a key factor in security compliance issues.</li><li><a href="https://em360tech.com/top-10/top-10-enterprise-mobility-management-solutions" rel="noopener noreferrer" target="_blank">MDM</a> can enhance both security and user experience.</li><li>Compliance is crucial for devices handling sensitive data.</li><li>Patching and updating devices can be challenging due to downtime.</li><li>Proactive measures can minimise vulnerabilities before exploitation.</li><li>Organisations should start with smaller, manageable security issues.</li><li>Gradual rollout of updates can prevent widespread issues.</li><li>Device management should not be an afterthought.</li><li>There are tools available to help secure dedicated devices.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Dedicated Devices and Security Challenges</p><p>03:01 The Unique Landscape of Dedicated Devices</p><p>05:48 The Role of MDM in Security and User Experience</p><p>08:57 Compliance and Data Security in Dedicated Devices</p><p>12:05 Patching and Updating Challenges</p><p>15:02 Proactive Security Measures for Device Management</p><p>18:53 Practical Steps for Improving Security Posture</p><p>25:06 Final Thoughts and Key Takeaways</p>]]></description><content:encoded><![CDATA[<p>In this episode of the<a href="https://em360tech.com/security-feed" rel="noopener noreferrer" target="_blank"> Security Strategist podcast</a>, Chris Steffen speaks with Sudhir Reddy, the CTO of <a href="https://www.esper.io/remote-device-management?utm_id=21024191941&amp;utm_term=remote%20device%20management%20software&amp;utm_campaign=Esper+Search+-+UK+AU+NZ+Nordic&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_content=690893132537&amp;hsa_acc=7879584746&amp;hsa_cam=21024191941&amp;hsa_grp=160330098913&amp;hsa_ad=690893132537&amp;hsa_src=g&amp;hsa_tgt=kwd-1212216005895&amp;hsa_kw=remote%20device%20management%20software&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQjwqIm_BhDnARIsAKBYcmsazdg11FaE8FsLJ5RfIaTneY1-hmIGPG-9B_hUJxXPHcBXexf9cqMaAmJ9EALw_wcB" rel="noopener noreferrer" target="_blank">Esper</a>, about the imperative balance between security and user experience in dedicated devices.&nbsp;</p><p>They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterprises can take to optimise their device fleets. The conversation not only spotlights the importance of proactive security measures but also the need for organisations to address vulnerabilities in their dedicated devices.</p><p>From kiosks and point-of-sale machines to medical devices and airport check-in counters, these ubiquitous tools present idiosyncratic security vulnerabilities that demand proactive strategies.&nbsp;</p><p>MDM is the first line of defense. Sudhir says, “This is your interface to secure everything that's happening on the device, whether it's bits and bytes that get on the device.”&nbsp;</p><p>“Whether it's what peripherals are allowed on the device, what device serial numbers of peripherals are allowed to talk to the device,” he added. “All of these are things that managers of large fleets have to think about."</p><p>Tune into the podcast to hear more about dedicated device security as a critical component of a detailed security strategy and adopting a proactive, data-driven approach to help organisations mitigate risks and ensure harmonious operation of their edge device fleets.</p><p><strong>Takeaways</strong></p><ul><li>Dedicated devices present unique security challenges compared to traditional devices.</li><li>The presence of humans is a key factor in security compliance issues.</li><li><a href="https://em360tech.com/top-10/top-10-enterprise-mobility-management-solutions" rel="noopener noreferrer" target="_blank">MDM</a> can enhance both security and user experience.</li><li>Compliance is crucial for devices handling sensitive data.</li><li>Patching and updating devices can be challenging due to downtime.</li><li>Proactive measures can minimise vulnerabilities before exploitation.</li><li>Organisations should start with smaller, manageable security issues.</li><li>Gradual rollout of updates can prevent widespread issues.</li><li>Device management should not be an afterthought.</li><li>There are tools available to help secure dedicated devices.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Dedicated Devices and Security Challenges</p><p>03:01 The Unique Landscape of Dedicated Devices</p><p>05:48 The Role of MDM in Security and User Experience</p><p>08:57 Compliance and Data Security in Dedicated Devices</p><p>12:05 Patching and Updating Challenges</p><p>15:02 Proactive Security Measures for Device Management</p><p>18:53 Practical Steps for Improving Security Posture</p><p>25:06 Final Thoughts and Key Takeaways</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">473bee16-b745-4551-99d0-253cbcfcc006</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 25 Mar 2025 16:32:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/dfdc270d-5728-48dc-a23f-b278934f0770/THE-SECURITY-STRATEGIST-Sudhir-MASTER-1-converted.mp3" length="27080053" type="audio/mpeg"/><itunes:duration>28:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode><podcast:season>1</podcast:season></item><item><title>Meeting of the Minds: State of Cybersecurity in 2025 Part II</title><itunes:title>Meeting of the Minds: State of Cybersecurity in 2025 Part II</itunes:title><description><![CDATA[<p>Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. They explored the complexities and challenges that organisations face in today's digital age, setting the stage for a deeper exploration of what the future holds.</p><p>This episode, Steffen, Stiennon, and LaPorte were joined by moderator Alejandro Leal, a senior analyst specialising in cybersecurity, digital identity, and AI at KuppingerCole. Throwing out the script, they took the conversation to the next level, venturing into uncharted territory and pushing the boundaries of cybersecurity.</p><p>Prepare for a no-holds-barred discussion as the analysts speculated on the disruptive forces that will shape the future of cybersecurity, dissecting everything from the intricate challenges of&nbsp;<a href="https://em360tech.com/podcasts/supply-chain-survival-how-dodge-disasters-and-stay-ahead-curve-0" rel="noopener noreferrer" target="_blank">DOGE</a>&nbsp;and&nbsp;<a href="https://em360tech.com/podcasts/ai-shift-transforming-roles-and-securing-it-systems" rel="noopener noreferrer" target="_blank">securing AI</a>&nbsp;to the potential paradigm shifts brought about by&nbsp;<a href="https://em360tech.com/tech-articles/what-quantum-computing-future-computing-explained" rel="noopener noreferrer" target="_blank">quantum computing</a>.</p><p>The cybersecurity experts did not shy away from controversial topics, but instead provided their unfiltered opinions on the impact of government initiatives like DOGE and the&nbsp;<a href="https://em360tech.com/tech-articles/apple-threatens-kill-messaging-uk-over-encryption-row" rel="noopener noreferrer" target="_blank">UK's Investigatory Powers Act</a>.</p><p>They also talked about the ethical dilemmas surrounding data privacy and security, and debated the potential consequences of a "quantum day" – the moment when&nbsp;<a href="https://em360tech.com/tech-articles/nvidia-backed-quantum-computing-firm-seeqc-bags-30m-funding" rel="noopener noreferrer" target="_blank">quantum computing breaks</a>&nbsp;current encryption standards. Brace yourself for some surprising hot takes and thought-provoking insights that will challenge your understanding of the cybersecurity landscape.</p><p>Watch the first episode of&nbsp;<a href="https://em360tech.com/podcasts/meeting-minds-state-cybersecurity-2025" rel="noopener noreferrer" target="_blank">Meeting of the Minds State of Cybersecurity in 2025</a>&nbsp;podcast.</p><p><strong>Takeaways</strong></p><ul><li>The chaotic approach to government efficiency can hinder cybersecurity efforts.</li><li><strong>Bureaucracy</strong>&nbsp;can provide stability but also opens doors for corruption.</li><li>The balance between efficiency and oversight is crucial in cybersecurity.</li><li>Recent&nbsp;<strong>government actions</strong>&nbsp;raise concerns about privacy and security.</li><li>Reckless adoption of new technologies poses significant risks.</li><li>The cybersecurity landscape is influenced by&nbsp;<strong>political decisions.</strong></li><li>The historical tension between&nbsp;<strong>privacy and state surveillance</strong>&nbsp;continues.</li><li>Court orders should be the standard for accessing private information. Lawful Intercept has led to&nbsp;<strong>vulnerabilities in telecom systems</strong>.</li><li>Businesses must use secure communication methods, even with trusted devices.</li><li><strong>Sensitive data</strong>&nbsp;should not be stored on mobile devices.</li><li>Organisations should avoid using apps like&nbsp;<strong>WhatsApp for sensitive communications</strong>.</li><li>Most organisations&nbsp;<strong>lack basic encryption</strong>&nbsp;for their data.</li><li>Organisations must understand their data infrastructure before preparing for&nbsp;<strong>quantum</strong>.</li><li>The future of cybersecurity will require adaptability and innovative thinking.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity in 2025</p><p>01:30 Impact of Government Efficiency on Cybersecurity</p><p>11:09 Bureaucracy vs. Efficiency in Cybersecurity</p><p>16:56 UK Government's Demand for Encrypted Data Access</p><p>24:08 The Risks of Backdoors in Technology</p><p>27:21 Preparing for Quantum Computing</p><p>39:01 Current State of Quantum Authentication</p><p>47:07 The Future of Cybersecurity and Quantum Technology</p>]]></description><content:encoded><![CDATA[<p>Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. They explored the complexities and challenges that organisations face in today's digital age, setting the stage for a deeper exploration of what the future holds.</p><p>This episode, Steffen, Stiennon, and LaPorte were joined by moderator Alejandro Leal, a senior analyst specialising in cybersecurity, digital identity, and AI at KuppingerCole. Throwing out the script, they took the conversation to the next level, venturing into uncharted territory and pushing the boundaries of cybersecurity.</p><p>Prepare for a no-holds-barred discussion as the analysts speculated on the disruptive forces that will shape the future of cybersecurity, dissecting everything from the intricate challenges of&nbsp;<a href="https://em360tech.com/podcasts/supply-chain-survival-how-dodge-disasters-and-stay-ahead-curve-0" rel="noopener noreferrer" target="_blank">DOGE</a>&nbsp;and&nbsp;<a href="https://em360tech.com/podcasts/ai-shift-transforming-roles-and-securing-it-systems" rel="noopener noreferrer" target="_blank">securing AI</a>&nbsp;to the potential paradigm shifts brought about by&nbsp;<a href="https://em360tech.com/tech-articles/what-quantum-computing-future-computing-explained" rel="noopener noreferrer" target="_blank">quantum computing</a>.</p><p>The cybersecurity experts did not shy away from controversial topics, but instead provided their unfiltered opinions on the impact of government initiatives like DOGE and the&nbsp;<a href="https://em360tech.com/tech-articles/apple-threatens-kill-messaging-uk-over-encryption-row" rel="noopener noreferrer" target="_blank">UK's Investigatory Powers Act</a>.</p><p>They also talked about the ethical dilemmas surrounding data privacy and security, and debated the potential consequences of a "quantum day" – the moment when&nbsp;<a href="https://em360tech.com/tech-articles/nvidia-backed-quantum-computing-firm-seeqc-bags-30m-funding" rel="noopener noreferrer" target="_blank">quantum computing breaks</a>&nbsp;current encryption standards. Brace yourself for some surprising hot takes and thought-provoking insights that will challenge your understanding of the cybersecurity landscape.</p><p>Watch the first episode of&nbsp;<a href="https://em360tech.com/podcasts/meeting-minds-state-cybersecurity-2025" rel="noopener noreferrer" target="_blank">Meeting of the Minds State of Cybersecurity in 2025</a>&nbsp;podcast.</p><p><strong>Takeaways</strong></p><ul><li>The chaotic approach to government efficiency can hinder cybersecurity efforts.</li><li><strong>Bureaucracy</strong>&nbsp;can provide stability but also opens doors for corruption.</li><li>The balance between efficiency and oversight is crucial in cybersecurity.</li><li>Recent&nbsp;<strong>government actions</strong>&nbsp;raise concerns about privacy and security.</li><li>Reckless adoption of new technologies poses significant risks.</li><li>The cybersecurity landscape is influenced by&nbsp;<strong>political decisions.</strong></li><li>The historical tension between&nbsp;<strong>privacy and state surveillance</strong>&nbsp;continues.</li><li>Court orders should be the standard for accessing private information. Lawful Intercept has led to&nbsp;<strong>vulnerabilities in telecom systems</strong>.</li><li>Businesses must use secure communication methods, even with trusted devices.</li><li><strong>Sensitive data</strong>&nbsp;should not be stored on mobile devices.</li><li>Organisations should avoid using apps like&nbsp;<strong>WhatsApp for sensitive communications</strong>.</li><li>Most organisations&nbsp;<strong>lack basic encryption</strong>&nbsp;for their data.</li><li>Organisations must understand their data infrastructure before preparing for&nbsp;<strong>quantum</strong>.</li><li>The future of cybersecurity will require adaptability and innovative thinking.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity in 2025</p><p>01:30 Impact of Government Efficiency on Cybersecurity</p><p>11:09 Bureaucracy vs. Efficiency in Cybersecurity</p><p>16:56 UK Government's Demand for Encrypted Data Access</p><p>24:08 The Risks of Backdoors in Technology</p><p>27:21 Preparing for Quantum Computing</p><p>39:01 Current State of Quantum Authentication</p><p>47:07 The Future of Cybersecurity and Quantum Technology</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9fadff96-882b-45b8-9cb2-8b4c2ef4c772</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 25 Mar 2025 11:50:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/7d0ed8c7-f508-498c-9cbd-10c78d3d8bde/THE-SECURITY-STRATEGIST-MOTM-Cybersecurity-Part-II-MASTER-conve.mp3" length="43378498" type="audio/mpeg"/><itunes:duration>45:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><podcast:season>1</podcast:season></item><item><title>Why Cyber Needs to Rebrand from a Boys Club</title><itunes:title>Why Cyber Needs to Rebrand from a Boys Club</itunes:title><description><![CDATA[<p>Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance of diversity and mentorship in fostering innovation and problem-solving within cybersecurity teams. Andrea advocates for a more inclusive approach to recruitment and highlights the need for creative thinking in addressing cybersecurity challenges. The discussion also touches on the significance of leadership in creating a welcoming environment for diverse talent.</p><p><strong>Key takeaways</strong></p><ul><li>Cybersecurity has been male-dominated for decades.</li><li>Cultural stereotypes contribute to gender imbalance in tech.</li><li>Diversity enhances problem-solving and innovation.</li><li>Mentorship is crucial for underrepresented groups.</li><li>Leadership should model openness to mistakes.</li><li>Cybersecurity requires both technical and creative skills.</li><li>Recruitment should focus on potential, not just certificates.</li><li>Real-world experiences can change perceptions of cybersecurity.</li><li>Diverse teams lead to better solutions and outcomes.</li><li>Everyone has something to contribute to cybersecurity.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance of diversity and mentorship in fostering innovation and problem-solving within cybersecurity teams. Andrea advocates for a more inclusive approach to recruitment and highlights the need for creative thinking in addressing cybersecurity challenges. The discussion also touches on the significance of leadership in creating a welcoming environment for diverse talent.</p><p><strong>Key takeaways</strong></p><ul><li>Cybersecurity has been male-dominated for decades.</li><li>Cultural stereotypes contribute to gender imbalance in tech.</li><li>Diversity enhances problem-solving and innovation.</li><li>Mentorship is crucial for underrepresented groups.</li><li>Leadership should model openness to mistakes.</li><li>Cybersecurity requires both technical and creative skills.</li><li>Recruitment should focus on potential, not just certificates.</li><li>Real-world experiences can change perceptions of cybersecurity.</li><li>Diverse teams lead to better solutions and outcomes.</li><li>Everyone has something to contribute to cybersecurity.</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f2b7bceb-cd52-4a4e-8414-9256378ae18a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 20 Mar 2025 11:23:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4f86b5b-fa54-422c-9404-cdea915db6d1/THE-SECURITY-STRATEGIST-Andrea-Cullen-MASTER-converted.mp3" length="19828006" type="audio/mpeg"/><itunes:duration>20:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><podcast:season>1</podcast:season></item><item><title>Reducing Risk with Effective Exposure Management in Enterprise Tech</title><itunes:title>Reducing Risk with Effective Exposure Management in Enterprise Tech</itunes:title><description><![CDATA[<p>“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of <a href="https://www.sevcosecurity.com/" rel="noopener noreferrer" target="_blank">Sevco Security</a>.</p><p>In this episode of The Security Strategist podcast, Richard Stiennon, Founder and Chief Analyst at IT-Harvest speaks with Guy about the evolution of vulnerability management into Continuous Threat Exposure Management (CTEM).&nbsp;</p><p>Guy stresses that traditional vulnerability management falls short in modern environments, which is why there's a critical shift towards CTEM. This isn't just a rebranding, it's a fundamental change in approach. As attack surfaces expand, so do the types of exposures organisations need to address. A fragmented approach to vulnerabilities leaves organisations overwhelmed.</p><p>"We've all told all auditors we've got it under control and we've all pointed to the CMDB as the tool to accommodate that control. But at the same time, we've known that the CMDB is wildly inaccurate," Guy voiced, spotlighting the need for a better system.</p><p>CTEM programs offer a structured framework, integrating the interconnectedness between vulnerabilities and devices, users, threats in the wild, and the business impact of a breach to drive more effective prioritisation, mitigation, and remediation of vulnerabilities in increasingly complex environments. As Guy says, welcome to Vulnerability Management Programs 2.0.</p><p>This is just a taste of what was discussed on the podcast. Watch the podcast for deeper insights and unconventional notions for businesses to succeed in today’s rapidly involving cybersecurity sphere.</p><p><strong>Takeaways</strong></p><ul><li>Continuous Threat Exposure Management (CTEM) is the evolution of vulnerability management.</li><li>CTEM is seen as vulnerability management 2.0, adapting to the changing landscape of cybersecurity.</li><li>A strong asset inventory is foundational for effective CTEM.</li><li>Organisations often face challenges in managing multiple vulnerability assessment tools.</li><li>The importance of real-time, live operational views of assets cannot be overstated.</li><li><a href="https://em360tech.com/tech-articles/what-threat-intelligence-components-importance-challenges" rel="noopener noreferrer" target="_blank">Threat intelligence</a> plays a critical role in prioritizing vulnerabilities.</li><li><a href="https://em360tech.com/top-10/data-aggregators" rel="noopener noreferrer" target="_blank">Data aggregation</a> from multiple sources is essential for a complete inventory.</li><li>The industry needs to move away from compliance-oriented activities to operational ones.</li><li>Emerging trends indicate a consolidation of tools and deeper integrations in cybersecurity.</li><li>Better data leads to better decisions and outcomes for organisations.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Continuous Threat Exposure Management</p><p>02:52 The Evolution of Vulnerability Management</p><p>05:52 The Importance of Asset Inventory</p><p>08:54 Challenges in Vulnerability Management</p><p>11:50 Characteristics of a Strong Security Inventory</p><p>15:01 Emerging Trends in Exposure Management</p><p>17:57 Key Takeaways for CISOs</p>]]></description><content:encoded><![CDATA[<p>“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of <a href="https://www.sevcosecurity.com/" rel="noopener noreferrer" target="_blank">Sevco Security</a>.</p><p>In this episode of The Security Strategist podcast, Richard Stiennon, Founder and Chief Analyst at IT-Harvest speaks with Guy about the evolution of vulnerability management into Continuous Threat Exposure Management (CTEM).&nbsp;</p><p>Guy stresses that traditional vulnerability management falls short in modern environments, which is why there's a critical shift towards CTEM. This isn't just a rebranding, it's a fundamental change in approach. As attack surfaces expand, so do the types of exposures organisations need to address. A fragmented approach to vulnerabilities leaves organisations overwhelmed.</p><p>"We've all told all auditors we've got it under control and we've all pointed to the CMDB as the tool to accommodate that control. But at the same time, we've known that the CMDB is wildly inaccurate," Guy voiced, spotlighting the need for a better system.</p><p>CTEM programs offer a structured framework, integrating the interconnectedness between vulnerabilities and devices, users, threats in the wild, and the business impact of a breach to drive more effective prioritisation, mitigation, and remediation of vulnerabilities in increasingly complex environments. As Guy says, welcome to Vulnerability Management Programs 2.0.</p><p>This is just a taste of what was discussed on the podcast. Watch the podcast for deeper insights and unconventional notions for businesses to succeed in today’s rapidly involving cybersecurity sphere.</p><p><strong>Takeaways</strong></p><ul><li>Continuous Threat Exposure Management (CTEM) is the evolution of vulnerability management.</li><li>CTEM is seen as vulnerability management 2.0, adapting to the changing landscape of cybersecurity.</li><li>A strong asset inventory is foundational for effective CTEM.</li><li>Organisations often face challenges in managing multiple vulnerability assessment tools.</li><li>The importance of real-time, live operational views of assets cannot be overstated.</li><li><a href="https://em360tech.com/tech-articles/what-threat-intelligence-components-importance-challenges" rel="noopener noreferrer" target="_blank">Threat intelligence</a> plays a critical role in prioritizing vulnerabilities.</li><li><a href="https://em360tech.com/top-10/data-aggregators" rel="noopener noreferrer" target="_blank">Data aggregation</a> from multiple sources is essential for a complete inventory.</li><li>The industry needs to move away from compliance-oriented activities to operational ones.</li><li>Emerging trends indicate a consolidation of tools and deeper integrations in cybersecurity.</li><li>Better data leads to better decisions and outcomes for organisations.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Continuous Threat Exposure Management</p><p>02:52 The Evolution of Vulnerability Management</p><p>05:52 The Importance of Asset Inventory</p><p>08:54 Challenges in Vulnerability Management</p><p>11:50 Characteristics of a Strong Security Inventory</p><p>15:01 Emerging Trends in Exposure Management</p><p>17:57 Key Takeaways for CISOs</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">07ecad1d-07fc-4976-a65c-573adee80f7a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 19 Mar 2025 12:14:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c9053118-c8c1-4c86-826b-c92b1fa4d669/THE-SECURITY-STRATEGIST-Sevco-MASTER-1-converted.mp3" length="17476960" type="audio/mpeg"/><itunes:duration>18:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Evolving Cyber Threat Space: A Geopolitical Perspective</title><itunes:title>The Evolving Cyber Threat Space: A Geopolitical Perspective</itunes:title><description><![CDATA[<p>In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-shifting threat space and examining how international regulations and geopolitical tensions impact organisations' cybersecurity posture.&nbsp;</p><p>The episode also discusses the double-edged sword of artificial intelligence in cybersecurity, acknowledging its potential to enhance defenses while also requiring skilled personnel to effectively leverage its capabilities.&nbsp;</p><p>It further spotlights that achieving zero risk in cybersecurity is an unrealistic goal, and enterprises must focus on building strong risk management frameworks and selecting the right security controls to mitigate potential damage.</p><p>The podcast provides valuable takeaways for businesses of all sizes, stressing the importance of continuous improvement and adaptation in the face of ever-evolving cyber threats.</p><p>Tune in for a deep dive into the intersection of geopolitics and cybersecurity. Gain valuable insights on how to navigate the complex regulatory environment, leverage the power of AI, and develop effective risk management strategies to protect your organisation in today's interconnected world.</p><p>In this episode of the <em>EM360Tech’s</em> <strong>The Security Strategist</strong> podcast, host Shubhangi Dua speaks with Bryan Marlatt, Chief Regional Officer at CyXcel, about the complex relationship between geopolitics and cybersecurity.&nbsp;</p><p><strong>Takeaways</strong></p><ul><li>The global regulatory landscape for cybersecurity is complex and fragmented.</li><li>Privacy regulations are critical for enterprises to monitor and comply with.</li><li>AI can enhance cybersecurity processes but requires skilled personnel to leverage effectively.</li><li>Zero risk in cybersecurity is unrealistic; organisations must manage acceptable risk.</li><li>GDPR has significantly influenced how organisations approach data protection.</li><li>Phishing attacks remain a prevalent threat across all sectors.</li><li>Operational technologies are increasingly vulnerable to cyber threats.</li><li>Organisations need to adopt a proactive approach to cybersecurity.</li><li>Choosing the right security controls is essential for effective risk management.</li><li>Continuous improvement and adaptation are necessary in the cybersecurity landscape.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Geopolitics and Cybersecurity</p><p>02:29 Navigating the Complex Regulatory Landscape</p><p>05:15 The Role of AI in Cybersecurity</p><p>12:15 Understanding Acceptable Risk in Cybersecurity</p><p>18:24 Global Perspectives on Cybersecurity Regulations</p><p>23:04 Emerging Cyber Threats and Mitigation Strategies</p>]]></description><content:encoded><![CDATA[<p>In today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-shifting threat space and examining how international regulations and geopolitical tensions impact organisations' cybersecurity posture.&nbsp;</p><p>The episode also discusses the double-edged sword of artificial intelligence in cybersecurity, acknowledging its potential to enhance defenses while also requiring skilled personnel to effectively leverage its capabilities.&nbsp;</p><p>It further spotlights that achieving zero risk in cybersecurity is an unrealistic goal, and enterprises must focus on building strong risk management frameworks and selecting the right security controls to mitigate potential damage.</p><p>The podcast provides valuable takeaways for businesses of all sizes, stressing the importance of continuous improvement and adaptation in the face of ever-evolving cyber threats.</p><p>Tune in for a deep dive into the intersection of geopolitics and cybersecurity. Gain valuable insights on how to navigate the complex regulatory environment, leverage the power of AI, and develop effective risk management strategies to protect your organisation in today's interconnected world.</p><p>In this episode of the <em>EM360Tech’s</em> <strong>The Security Strategist</strong> podcast, host Shubhangi Dua speaks with Bryan Marlatt, Chief Regional Officer at CyXcel, about the complex relationship between geopolitics and cybersecurity.&nbsp;</p><p><strong>Takeaways</strong></p><ul><li>The global regulatory landscape for cybersecurity is complex and fragmented.</li><li>Privacy regulations are critical for enterprises to monitor and comply with.</li><li>AI can enhance cybersecurity processes but requires skilled personnel to leverage effectively.</li><li>Zero risk in cybersecurity is unrealistic; organisations must manage acceptable risk.</li><li>GDPR has significantly influenced how organisations approach data protection.</li><li>Phishing attacks remain a prevalent threat across all sectors.</li><li>Operational technologies are increasingly vulnerable to cyber threats.</li><li>Organisations need to adopt a proactive approach to cybersecurity.</li><li>Choosing the right security controls is essential for effective risk management.</li><li>Continuous improvement and adaptation are necessary in the cybersecurity landscape.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Geopolitics and Cybersecurity</p><p>02:29 Navigating the Complex Regulatory Landscape</p><p>05:15 The Role of AI in Cybersecurity</p><p>12:15 Understanding Acceptable Risk in Cybersecurity</p><p>18:24 Global Perspectives on Cybersecurity Regulations</p><p>23:04 Emerging Cyber Threats and Mitigation Strategies</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0795fbfc-1b0d-4028-b510-68d94e2290e2</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 20 Feb 2025 17:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/2a6966f6-cad4-447d-bb80-f0579c242f3b/THE-SECURITY-STRATEGIST-CyXcel-MASTER-converted.mp3" length="27054199" type="audio/mpeg"/><itunes:duration>28:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:season>1</podcast:season></item><item><title>Diversity in Cybersecurity: A Key to Innovation</title><itunes:title>Diversity in Cybersecurity: A Key to Innovation</itunes:title><description><![CDATA[<p>In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emphasizes how neurodiverse individuals can bring unique problem-solving skills that drive innovation in cybersecurity. The discussion also covers the significance of diversity in teams, the need for resilience in cybersecurity strategies, and the role of AI in enhancing human capabilities rather than replacing them. Rob highlights the balance between automation and human expertise, advocating for a thoughtful approach to implementing AI in organizations.</p><p><strong>Key Takeaways</strong></p><ul><li>Neurodiversity brings unique problem-solving approaches to cybersecurity.</li><li>Diverse teams are essential for tackling complex cybersecurity challenges.</li><li>Resilience is key in responding to cyber threats effectively.</li><li>AI should enhance human capabilities, not replace them.</li><li>Organizations need clear AI strategies and policies.</li><li>Creating environments that nurture diverse talents is crucial.</li><li>Cybersecurity requires a balance between automation and human expertise.</li><li>Proactive resilience is necessary for effective cybersecurity.</li><li>Diversity of thought prevents groupthink in cybersecurity.</li><li>Continuous learning and adaptation are vital in the cybersecurity landscape.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Neurodiversity</p><p>03:01 The Role of Neurodiversity in Cybersecurity Innovation</p><p>06:05 Diversity in Cybersecurity Teams</p><p>08:58 Resilience in Cybersecurity Strategies</p><p>12:06 AI's Impact on Cybersecurity</p><p>14:59 Balancing Automation and Human Expertise</p><p>18:01 Implementing AI Strategies in Organizations</p>]]></description><content:encoded><![CDATA[<p>In this conversation, Rob Demain shares his extensive background in cybersecurity and discusses the importance of neurodiversity in the field. He emphasizes how neurodiverse individuals can bring unique problem-solving skills that drive innovation in cybersecurity. The discussion also covers the significance of diversity in teams, the need for resilience in cybersecurity strategies, and the role of AI in enhancing human capabilities rather than replacing them. Rob highlights the balance between automation and human expertise, advocating for a thoughtful approach to implementing AI in organizations.</p><p><strong>Key Takeaways</strong></p><ul><li>Neurodiversity brings unique problem-solving approaches to cybersecurity.</li><li>Diverse teams are essential for tackling complex cybersecurity challenges.</li><li>Resilience is key in responding to cyber threats effectively.</li><li>AI should enhance human capabilities, not replace them.</li><li>Organizations need clear AI strategies and policies.</li><li>Creating environments that nurture diverse talents is crucial.</li><li>Cybersecurity requires a balance between automation and human expertise.</li><li>Proactive resilience is necessary for effective cybersecurity.</li><li>Diversity of thought prevents groupthink in cybersecurity.</li><li>Continuous learning and adaptation are vital in the cybersecurity landscape.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Neurodiversity</p><p>03:01 The Role of Neurodiversity in Cybersecurity Innovation</p><p>06:05 Diversity in Cybersecurity Teams</p><p>08:58 Resilience in Cybersecurity Strategies</p><p>12:06 AI's Impact on Cybersecurity</p><p>14:59 Balancing Automation and Human Expertise</p><p>18:01 Implementing AI Strategies in Organizations</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8453d08f-6786-4b22-a962-530610ec1219</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 12 Feb 2025 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac4d96a7-0c8f-4378-ac0f-1022ccb2c9cc/THE-SECURITY-STRATEGIST-Rob-Demain-MASTER-converted.mp3" length="19402249" type="audio/mpeg"/><itunes:duration>20:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:season>1</podcast:season></item><item><title>Is AI and Zero Trust the Future of Cyber Warfare?</title><itunes:title>Is AI and Zero Trust the Future of Cyber Warfare?</itunes:title><description><![CDATA[<p class="ql-align-justify">The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defences. The critical role of AI and Zero Trust has been shaping the future of cyber defence for a while now.&nbsp;</p><p class="ql-align-justify">It’s become absolutely necessary to adopt a zero-trust security model to protect against today's complex threats. AI too has become a powerful tool for enhancing cybersecurity measures, from threat detection to security operations, while also acknowledging its potential misuse by malicious actors.&nbsp;</p><p class="ql-align-justify">In this episode, <a href="https://www.linkedin.com/feed/update/urn:li:activity:7237219220944556032/" rel="noopener noreferrer" target="_blank">Danny Jenkins</a>, CEO of ThreatLocker, discusses the intersection of cybersecurity and artificial intelligence. The conversation explores the ethical considerations surrounding AI in security, spotlighting the need for strong regulatory frameworks that foster education and responsible development rather than stifling innovation.</p><p class="ql-align-justify">Join us as we unpack the vital components of building a future-proof cybersecurity strategy in the age of AI and Zero Trust.</p><p class="ql-align-justify"><strong>Key Takeaways</strong></p><ul><li class="ql-align-justify">AI can help identify threats but also aids attackers.</li><li class="ql-align-justify">The threat landscape has evolved with sophisticated malware.</li><li class="ql-align-justify">Zero trust security is essential for modern defence.</li><li class="ql-align-justify">AI should assist in decision-making, not replace it.</li><li class="ql-align-justify">Education on AI risks is crucial for organisations.</li><li class="ql-align-justify">Regulatory frameworks should focus on education, not restriction.</li><li class="ql-align-justify">AI can create unique malware easily, complicating detection.</li><li class="ql-align-justify">Organisations must reassess their threat models regularly.</li><li class="ql-align-justify">Collaboration and understanding are key to effective AI use.</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify">00:00 Introduction to Cybersecurity and AI</p><p class="ql-align-justify">03:09 The Evolving Threat Landscape</p><p class="ql-align-justify">06:11 Zero Trust Security: A New Mindset</p><p class="ql-align-justify">09:03 AI as a Tool for Cyber Defense</p><p class="ql-align-justify">12:10 Ethical Considerations in AI Security</p><p class="ql-align-justify">14:50 Regulatory Frameworks and Global Collaboration</p><p class="ql-align-justify">17:51 Conclusion and Future Directions</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">The digital warground is constantly advancing, with increasingly sophisticated malware and attack vectors challenging traditional cybersecurity defences. The critical role of AI and Zero Trust has been shaping the future of cyber defence for a while now.&nbsp;</p><p class="ql-align-justify">It’s become absolutely necessary to adopt a zero-trust security model to protect against today's complex threats. AI too has become a powerful tool for enhancing cybersecurity measures, from threat detection to security operations, while also acknowledging its potential misuse by malicious actors.&nbsp;</p><p class="ql-align-justify">In this episode, <a href="https://www.linkedin.com/feed/update/urn:li:activity:7237219220944556032/" rel="noopener noreferrer" target="_blank">Danny Jenkins</a>, CEO of ThreatLocker, discusses the intersection of cybersecurity and artificial intelligence. The conversation explores the ethical considerations surrounding AI in security, spotlighting the need for strong regulatory frameworks that foster education and responsible development rather than stifling innovation.</p><p class="ql-align-justify">Join us as we unpack the vital components of building a future-proof cybersecurity strategy in the age of AI and Zero Trust.</p><p class="ql-align-justify"><strong>Key Takeaways</strong></p><ul><li class="ql-align-justify">AI can help identify threats but also aids attackers.</li><li class="ql-align-justify">The threat landscape has evolved with sophisticated malware.</li><li class="ql-align-justify">Zero trust security is essential for modern defence.</li><li class="ql-align-justify">AI should assist in decision-making, not replace it.</li><li class="ql-align-justify">Education on AI risks is crucial for organisations.</li><li class="ql-align-justify">Regulatory frameworks should focus on education, not restriction.</li><li class="ql-align-justify">AI can create unique malware easily, complicating detection.</li><li class="ql-align-justify">Organisations must reassess their threat models regularly.</li><li class="ql-align-justify">Collaboration and understanding are key to effective AI use.</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify">00:00 Introduction to Cybersecurity and AI</p><p class="ql-align-justify">03:09 The Evolving Threat Landscape</p><p class="ql-align-justify">06:11 Zero Trust Security: A New Mindset</p><p class="ql-align-justify">09:03 AI as a Tool for Cyber Defense</p><p class="ql-align-justify">12:10 Ethical Considerations in AI Security</p><p class="ql-align-justify">14:50 Regulatory Frameworks and Global Collaboration</p><p class="ql-align-justify">17:51 Conclusion and Future Directions</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">597c8d09-5e87-4756-a813-f298af99d075</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 07 Feb 2025 11:15:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/eb33e67a-2f41-4bdf-a625-89ea36f4fe93/THE-SECURITY-STRATEGIST-Danny-Jenkins-MASTER-converted.mp3" length="19611166" type="audio/mpeg"/><itunes:duration>20:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:season>1</podcast:season></item><item><title>Meeting of the Minds: State Of Cybersecurity in 2025</title><itunes:title>Meeting of the Minds: State Of Cybersecurity in 2025</itunes:title><description><![CDATA[<p>The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. </p><p>In the first episode of Meeting of the Minds, three leading industry analysts – Christopher Steffen, VP of Research at EMA; Richard Stiennon, Founder and Chief Analyst at IT-Harvest; and Brad LaPorte, Morphisec CMO &amp; Advisor at Lionfish Tech Advisors – along with moderator Evgeniy Kharam, Founder of EK Cyber &amp; Media Consulting, explore the critical challenges and opportunities that will shape the state of cybersecurity in 2025.</p><p>They discuss the complex role of AI in security, examining both its potential to enhance defences and the new vulnerabilities it introduces. The experts also tackle the security implications of open-source technologies such as <a href="https://em360tech.com/tech-article/what-is-deepseek" rel="noopener noreferrer" target="_blank"><strong>DeepSeek</strong></a> and the ongoing debate surrounding self-regulation within the industry.</p><p>A key focus of the conversation is the strategic approach to cybersecurity. The analysts break down the merits and drawbacks of platform solutions versus best-of-breed tools, considering the importance of maturity levels in tool selection and the integration challenges that often follow acquisitions.&nbsp;</p><p>The episode also explores the tension between achieving compliance and building a truly secure environment. The panel highlights the importance of moving beyond simply checking boxes and instead focus on developing strong security postures.</p><p>Join us for this vital discussion as we navigate the complex sphere of cybersecurity in 2025.&nbsp;</p><p><strong>Takeaways</strong></p><ul><li>AI is both a tool and a potential vulnerability in cybersecurity.</li><li>Guardrails are essential to prevent misuse of AI technologies.</li><li>The rapid adoption of AI has outpaced the establishment of security measures.</li><li>Open-source AI models like <strong>DeepSeek</strong> can introduce significant security risks.</li><li>Self-regulation and testing are critical for organisations using AI as the trustworthiness of AI outputs is a major concern for decision-making.</li><li>Companies should focus on enhancing <strong>core capabilities with AI</strong>, not just adopting it for marketing.</li><li>Choosing between specialised tools and comprehensive platforms is a key decision for businesses. <strong>Companies that rely on platformisation are often doomed to fail</strong>.</li><li><strong>Compliance does not guarantee security</strong>; many compliant companies have faced breaches.</li><li>Organisations should focus on quick wins in security improvements.</li><li><strong>Training and staffing</strong> are crucial for effective tool management.</li><li>The lifespan of a CISO is short; quick gains are necessary.</li><li>Understanding the roadmap of existing tools can prevent unnecessary purchases.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity in 2025</p><p>02:05 The Role of AI in Cybersecurity</p><p>09:49 Vulnerabilities in AI Models</p><p>16:04 Open Source AI and Security Challenges</p><p>19:59 Best of Breed vs. Platform Solutions</p><p>22:34 The Perils of Platformisation</p><p>25:05 Maturity Levels and Tool Selection</p><p>28:07 Integration Challenges in Acquisitions</p><p>34:13 Compliance vs. Security</p><p>44:05 Proactive Security Strategies</p>]]></description><content:encoded><![CDATA[<p>The state of cybersecurity is rapidly and constantly evolving, and the future is not necessarily certain. </p><p>In the first episode of Meeting of the Minds, three leading industry analysts – Christopher Steffen, VP of Research at EMA; Richard Stiennon, Founder and Chief Analyst at IT-Harvest; and Brad LaPorte, Morphisec CMO &amp; Advisor at Lionfish Tech Advisors – along with moderator Evgeniy Kharam, Founder of EK Cyber &amp; Media Consulting, explore the critical challenges and opportunities that will shape the state of cybersecurity in 2025.</p><p>They discuss the complex role of AI in security, examining both its potential to enhance defences and the new vulnerabilities it introduces. The experts also tackle the security implications of open-source technologies such as <a href="https://em360tech.com/tech-article/what-is-deepseek" rel="noopener noreferrer" target="_blank"><strong>DeepSeek</strong></a> and the ongoing debate surrounding self-regulation within the industry.</p><p>A key focus of the conversation is the strategic approach to cybersecurity. The analysts break down the merits and drawbacks of platform solutions versus best-of-breed tools, considering the importance of maturity levels in tool selection and the integration challenges that often follow acquisitions.&nbsp;</p><p>The episode also explores the tension between achieving compliance and building a truly secure environment. The panel highlights the importance of moving beyond simply checking boxes and instead focus on developing strong security postures.</p><p>Join us for this vital discussion as we navigate the complex sphere of cybersecurity in 2025.&nbsp;</p><p><strong>Takeaways</strong></p><ul><li>AI is both a tool and a potential vulnerability in cybersecurity.</li><li>Guardrails are essential to prevent misuse of AI technologies.</li><li>The rapid adoption of AI has outpaced the establishment of security measures.</li><li>Open-source AI models like <strong>DeepSeek</strong> can introduce significant security risks.</li><li>Self-regulation and testing are critical for organisations using AI as the trustworthiness of AI outputs is a major concern for decision-making.</li><li>Companies should focus on enhancing <strong>core capabilities with AI</strong>, not just adopting it for marketing.</li><li>Choosing between specialised tools and comprehensive platforms is a key decision for businesses. <strong>Companies that rely on platformisation are often doomed to fail</strong>.</li><li><strong>Compliance does not guarantee security</strong>; many compliant companies have faced breaches.</li><li>Organisations should focus on quick wins in security improvements.</li><li><strong>Training and staffing</strong> are crucial for effective tool management.</li><li>The lifespan of a CISO is short; quick gains are necessary.</li><li>Understanding the roadmap of existing tools can prevent unnecessary purchases.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity in 2025</p><p>02:05 The Role of AI in Cybersecurity</p><p>09:49 Vulnerabilities in AI Models</p><p>16:04 Open Source AI and Security Challenges</p><p>19:59 Best of Breed vs. Platform Solutions</p><p>22:34 The Perils of Platformisation</p><p>25:05 Maturity Levels and Tool Selection</p><p>28:07 Integration Challenges in Acquisitions</p><p>34:13 Compliance vs. Security</p><p>44:05 Proactive Security Strategies</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8b6e80b7-55eb-400b-bcc0-99f69dc1e8aa</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 06 Feb 2025 16:33:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4f362f86-3c9a-4430-94e7-386f68965d10/Meeting-of-the-Minds-State-of-Cybersecurity-in-2025-MASTER-conv.mp3" length="42355180" type="audio/mpeg"/><itunes:duration>44:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:season>1</podcast:season></item><item><title>Navigating Cybersecurity: Insights from Jim Liddle</title><itunes:title>Navigating Cybersecurity: Insights from Jim Liddle</itunes:title><description><![CDATA[<p>This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity of proactive security measures in an increasingly interconnected digital world. The discussion highlights essential themes such as data resilience, the seamless integration of security and recovery strategies, and the complex role of artificial intelligence, which simultaneously bolsters and challenges cybersecurity efforts. A call to action is made for organisations to shift their perspective, viewing cybersecurity as a strategic enabler rather than a mere cost, while also emphasising the value of comprehensive employee training to maintain strong security practices.</p><p>In a captivating second act, Jim Liddle dives into the transformative potential of leveraging AI and other emerging technologies to predict and neutralise threats before they occur. By aligning cybersecurity initiatives with broader organisational objectives, he illustrates how businesses can turn security into a driver of innovation and competitive advantage. Through engaging real-world examples and actionable advice, the conversation urges listeners to abandon outdated, reactive strategies in favour of a forward-looking, resilient approach. </p><p><strong>Key Takeaways</strong></p><ul><li>True cybersecurity leadership comes from data infrastructure.</li><li>Companies need to adopt a proactive approach to cybersecurity.</li><li>Data resilience is crucial for effective recovery from attacks.</li><li>AI can both enhance and complicate cybersecurity efforts.</li><li>Security should be integrated into the core infrastructure.</li><li>Training employees is essential to mitigate human error.</li><li>Cybersecurity can be a competitive advantage for businesses.</li><li>Organisations must plan for potential security breaches.</li><li>Immutable data architectures can prevent data loss.</li><li>Investing in security is investing in business growth.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 - Introduction to Cybersecurity and Data Infrastructure</p><p>02:54 - The Importance of Data Resilience in Cybersecurity</p><p>05:58 - Integrating Security and Recovery for Resilience</p><p>08:59 - AI: A Double-Edged Sword in Cybersecurity</p><p>12:11 - Transforming Cybersecurity into a Competitive Advantage</p><p>15:10 - Fostering Innovation While Ensuring Security</p><p>17:55 - Conclusion and Future Directions</p>]]></description><content:encoded><![CDATA[<p>This conversation explores the critical and ever-evolving relationship between data infrastructure and cybersecurity, shining a light on the necessity of proactive security measures in an increasingly interconnected digital world. The discussion highlights essential themes such as data resilience, the seamless integration of security and recovery strategies, and the complex role of artificial intelligence, which simultaneously bolsters and challenges cybersecurity efforts. A call to action is made for organisations to shift their perspective, viewing cybersecurity as a strategic enabler rather than a mere cost, while also emphasising the value of comprehensive employee training to maintain strong security practices.</p><p>In a captivating second act, Jim Liddle dives into the transformative potential of leveraging AI and other emerging technologies to predict and neutralise threats before they occur. By aligning cybersecurity initiatives with broader organisational objectives, he illustrates how businesses can turn security into a driver of innovation and competitive advantage. Through engaging real-world examples and actionable advice, the conversation urges listeners to abandon outdated, reactive strategies in favour of a forward-looking, resilient approach. </p><p><strong>Key Takeaways</strong></p><ul><li>True cybersecurity leadership comes from data infrastructure.</li><li>Companies need to adopt a proactive approach to cybersecurity.</li><li>Data resilience is crucial for effective recovery from attacks.</li><li>AI can both enhance and complicate cybersecurity efforts.</li><li>Security should be integrated into the core infrastructure.</li><li>Training employees is essential to mitigate human error.</li><li>Cybersecurity can be a competitive advantage for businesses.</li><li>Organisations must plan for potential security breaches.</li><li>Immutable data architectures can prevent data loss.</li><li>Investing in security is investing in business growth.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 - Introduction to Cybersecurity and Data Infrastructure</p><p>02:54 - The Importance of Data Resilience in Cybersecurity</p><p>05:58 - Integrating Security and Recovery for Resilience</p><p>08:59 - AI: A Double-Edged Sword in Cybersecurity</p><p>12:11 - Transforming Cybersecurity into a Competitive Advantage</p><p>15:10 - Fostering Innovation While Ensuring Security</p><p>17:55 - Conclusion and Future Directions</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3811d5dd-fed3-4817-8de1-90bd5a24cd8b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 20 Jan 2025 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/da5e9473-0c26-4da8-8cea-305433dd2425/THE-SECURITY-STRATEGIST-Jim-Liddle-MASTER-converted.mp3" length="19515672" type="audio/mpeg"/><itunes:duration>20:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:season>1</podcast:season></item><item><title>Unlocking the Power of APIs in AI</title><itunes:title>Unlocking the Power of APIs in AI</itunes:title><description><![CDATA[<p>Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. APIs, the backbone of modern technology, are vital for enabling seamless communication between applications. However, as their usage grows, so do the risks associated with inadequate API management and security. These vulnerabilities can lead to unauthorised access, data breaches, and system disruptions, making API security a top priority for businesses of all sizes.</p><p>In the face of these challenges, safeguarding APIs demands more than basic measures. Organisations must adopt a comprehensive approach that integrates proactive security practices, advanced tools, and a culture of security embedded within the development lifecycle. Just as an assembly line ensures precision in manufacturing, API security must be built into every stage of application development to mitigate risks effectively.</p><p>The stakes are particularly high in this rapidly evolving landscape. As highlighted by Marco Palladino, CTO and co-founder of Kong, organisations must stay ahead of emerging trends in AI and API usage while addressing the challenges of protecting their systems. Proactive measures, such as implementing API gateways, monitoring traffic for anomalies, and employing zero-trust principles, are essential to ensure robust protection.</p><p><strong>Key Takeaways</strong></p><ul><li>APIs are essential for connecting software and services.</li><li>AI integration relies heavily on APIs for functionality.</li><li>Effective API management is crucial for security and compliance.</li><li>Organisations must adopt proactive security measures for APIs.</li><li>Security should be integrated into the development lifecycle.</li><li>API-related attacks are on the rise, necessitating better security practices.</li><li>Automation can help identify security issues early in development.</li><li>The accuracy of AI responses remains a significant challenge.</li><li>Organisations need to balance retrieval and generation in AI applications.</li><li>Emerging trends in AI require organisations to adapt their API strategies.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 - Introduction to APIs and Their Importance</p><p>02:59 - The Role of APIs in AI Integration</p><p>05:50 - API Management and Security Concerns</p><p>09:00 - Best Practices for API Security</p><p>11:56 - Challenges and Threats in API Security</p><p>14:56 - Proactive Security Measures for APIs</p><p>17:45 - The Future of APIs in AI Development</p><p>21:07 - Emerging Trends in AI and API Usage</p>]]></description><content:encoded><![CDATA[<p>Today, organisations are grappling with the critical challenge of securing APIs in an era dominated by AI integration and increasing cyber threats. APIs, the backbone of modern technology, are vital for enabling seamless communication between applications. However, as their usage grows, so do the risks associated with inadequate API management and security. These vulnerabilities can lead to unauthorised access, data breaches, and system disruptions, making API security a top priority for businesses of all sizes.</p><p>In the face of these challenges, safeguarding APIs demands more than basic measures. Organisations must adopt a comprehensive approach that integrates proactive security practices, advanced tools, and a culture of security embedded within the development lifecycle. Just as an assembly line ensures precision in manufacturing, API security must be built into every stage of application development to mitigate risks effectively.</p><p>The stakes are particularly high in this rapidly evolving landscape. As highlighted by Marco Palladino, CTO and co-founder of Kong, organisations must stay ahead of emerging trends in AI and API usage while addressing the challenges of protecting their systems. Proactive measures, such as implementing API gateways, monitoring traffic for anomalies, and employing zero-trust principles, are essential to ensure robust protection.</p><p><strong>Key Takeaways</strong></p><ul><li>APIs are essential for connecting software and services.</li><li>AI integration relies heavily on APIs for functionality.</li><li>Effective API management is crucial for security and compliance.</li><li>Organisations must adopt proactive security measures for APIs.</li><li>Security should be integrated into the development lifecycle.</li><li>API-related attacks are on the rise, necessitating better security practices.</li><li>Automation can help identify security issues early in development.</li><li>The accuracy of AI responses remains a significant challenge.</li><li>Organisations need to balance retrieval and generation in AI applications.</li><li>Emerging trends in AI require organisations to adapt their API strategies.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 - Introduction to APIs and Their Importance</p><p>02:59 - The Role of APIs in AI Integration</p><p>05:50 - API Management and Security Concerns</p><p>09:00 - Best Practices for API Security</p><p>11:56 - Challenges and Threats in API Security</p><p>14:56 - Proactive Security Measures for APIs</p><p>17:45 - The Future of APIs in AI Development</p><p>21:07 - Emerging Trends in AI and API Usage</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b39a88e1-fa98-4a36-a801-686653983ccf</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 15 Jan 2025 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4202005c-082d-4047-8250-d06d67a09d0a/THE-SECURITY-STRATEGIST-Marco-Palladino-MASTER-converted.mp3" length="22815394" type="audio/mpeg"/><itunes:duration>23:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:season>1</podcast:season></item><item><title>The AI Shift: Transforming Roles and Securing IT Systems</title><itunes:title>The AI Shift: Transforming Roles and Securing IT Systems</itunes:title><description><![CDATA[<p>In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the importance of collaboration between IT and AI teams. He emphasizes that while AI may replace some jobs, it will primarily transform existing roles. The discussion also highlights the necessity of observability in IT systems to optimize performance and ensure security.</p><p><strong>Key Takeaways</strong></p><ul><li>AI will replace some jobs, but transform most.</li><li>AI needs to be supervised and trained.</li><li>AI is more of an assistant than a replacement.</li><li>There is a need for government regulation for AI.</li><li>Tension exists between IT and AI teams due to communication breakdowns.</li><li>AI can improve the efficiency of the whole IT organization.</li><li>Tool consolidation is becoming more popular in IT.</li><li>Losing business can happen in minutes without observability.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to AI and IT Teams</p><p>06:10 Regulations and Guidelines for AI</p><p>11:52 The Importance of Collaboration in IT</p><p>17:46 Security and Observability in IT</p>]]></description><content:encoded><![CDATA[<p>In this podcast, Sascha Giese discusses the evolving role of AI in IT teams, addressing employee perceptions, the need for regulations, and the importance of collaboration between IT and AI teams. He emphasizes that while AI may replace some jobs, it will primarily transform existing roles. The discussion also highlights the necessity of observability in IT systems to optimize performance and ensure security.</p><p><strong>Key Takeaways</strong></p><ul><li>AI will replace some jobs, but transform most.</li><li>AI needs to be supervised and trained.</li><li>AI is more of an assistant than a replacement.</li><li>There is a need for government regulation for AI.</li><li>Tension exists between IT and AI teams due to communication breakdowns.</li><li>AI can improve the efficiency of the whole IT organization.</li><li>Tool consolidation is becoming more popular in IT.</li><li>Losing business can happen in minutes without observability.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to AI and IT Teams</p><p>06:10 Regulations and Guidelines for AI</p><p>11:52 The Importance of Collaboration in IT</p><p>17:46 Security and Observability in IT</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">7b97450b-e620-40a5-a368-386d1da5ad0e</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 08 Jan 2025 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/dbb4c43b-0590-4b8c-8906-252721b849d1/THE-SECURITY-STRATEGIST-Sasha-Giese-MASTER-converted.mp3" length="22174048" type="audio/mpeg"/><itunes:duration>23:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:season>1</podcast:season></item><item><title>Unified Defences: Why CDR Matters</title><itunes:title>Unified Defences: Why CDR Matters</itunes:title><description><![CDATA[<p class="ql-align-justify">The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as organisations increasingly rely on the cloud, the attack surface for cyber threats has expanded significantly.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">Traditional security tools often struggle to keep up with the unique challenges of cloud environments, such as dynamic workloads, distributed systems, and multi-cloud configurations. This is where Cloud Detection and Response (CDR) becomes essential. CDR solutions are specifically designed to monitor cloud environments in real-time, identify potential threats, and provide swift responses to mitigate risks.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">The importance of CDR extends beyond just preventing breaches—it’s about safeguarding critical data, maintaining business continuity, and building trust with customers and stakeholders. With the rise of sophisticated attacks like ransomware and supply chain compromises targeting cloud infrastructure, having a comprehensive CDR strategy is no longer optional but a necessity.</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">In this episode, Aparna Sundararajan speaks to Mohit Bhasin, Senior Product Marketing Manager at Palo Alto Networks, about the importance of CDR and the need for a holistic approach to cybersecurity.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Cloud security is essential for organisational success.</li><li class="ql-align-justify">Real-time protection is crucial to prevent attacks.</li><li class="ql-align-justify">Organisations need a unified approach to cloud security.</li><li class="ql-align-justify">Visibility and context are critical in security solutions.</li><li class="ql-align-justify">Proactive risk management is necessary in cloud environments.</li><li class="ql-align-justify">Security should be integrated into the development process.</li><li class="ql-align-justify">Automation can enhance security team efficiency.</li><li class="ql-align-justify">Security is an enabler of innovation, not a blocker.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cloud Detection and Response</p><p class="ql-align-justify"><strong>02:55 -</strong> Understanding Cloud Detection and Response</p><p class="ql-align-justify"><strong>05:46 -</strong> Real-Time Protection and Customer Insights</p><p class="ql-align-justify"><strong>09:00 -</strong> The Future of Cloud Security</p><p class="ql-align-justify"><strong>11:52 -</strong> Overrated and Underrated Aspects of CDR</p><p class="ql-align-justify"><strong>14:46 -</strong> Final Thoughts on Cloud Security Strategy</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">The shift to cloud computing has transformed how businesses operate, offering unmatched flexibility, scalability, and cost efficiency. However, as organisations increasingly rely on the cloud, the attack surface for cyber threats has expanded significantly.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">Traditional security tools often struggle to keep up with the unique challenges of cloud environments, such as dynamic workloads, distributed systems, and multi-cloud configurations. This is where Cloud Detection and Response (CDR) becomes essential. CDR solutions are specifically designed to monitor cloud environments in real-time, identify potential threats, and provide swift responses to mitigate risks.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">The importance of CDR extends beyond just preventing breaches—it’s about safeguarding critical data, maintaining business continuity, and building trust with customers and stakeholders. With the rise of sophisticated attacks like ransomware and supply chain compromises targeting cloud infrastructure, having a comprehensive CDR strategy is no longer optional but a necessity.</p><p class="ql-align-justify"><br></p><p class="ql-align-justify">In this episode, Aparna Sundararajan speaks to Mohit Bhasin, Senior Product Marketing Manager at Palo Alto Networks, about the importance of CDR and the need for a holistic approach to cybersecurity.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Cloud security is essential for organisational success.</li><li class="ql-align-justify">Real-time protection is crucial to prevent attacks.</li><li class="ql-align-justify">Organisations need a unified approach to cloud security.</li><li class="ql-align-justify">Visibility and context are critical in security solutions.</li><li class="ql-align-justify">Proactive risk management is necessary in cloud environments.</li><li class="ql-align-justify">Security should be integrated into the development process.</li><li class="ql-align-justify">Automation can enhance security team efficiency.</li><li class="ql-align-justify">Security is an enabler of innovation, not a blocker.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cloud Detection and Response</p><p class="ql-align-justify"><strong>02:55 -</strong> Understanding Cloud Detection and Response</p><p class="ql-align-justify"><strong>05:46 -</strong> Real-Time Protection and Customer Insights</p><p class="ql-align-justify"><strong>09:00 -</strong> The Future of Cloud Security</p><p class="ql-align-justify"><strong>11:52 -</strong> Overrated and Underrated Aspects of CDR</p><p class="ql-align-justify"><strong>14:46 -</strong> Final Thoughts on Cloud Security Strategy</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3f634de1-b977-474c-8f22-78ba8cb1f5ac</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 18 Dec 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a00a3bbc-8f5e-44fc-bb56-01e587eee17a/THE-SECURITY-STRATEGIST-Palo-Alto-2-MASTER-v2-converted.mp3" length="16092103" type="audio/mpeg"/><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:season>1</podcast:season></item><item><title>Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve</title><itunes:title>Supply Chain Survival: How to Dodge Disasters and Stay Ahead of the Curve</itunes:title><description><![CDATA[<p class="ql-align-justify">Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geopolitical tensions, or unexpected global events like pandemics can ripple through even the most carefully planned supply chains.&nbsp;</p><p class="ql-align-justify">Companies that fail to anticipate and mitigate these risks can face costly delays, increased operational costs, and damaged reputations. By prioritising risk management, businesses can identify vulnerabilities, strengthen their supply chain resilience, and ensure that they can respond swiftly to unforeseen challenges.&nbsp;&nbsp;</p><p class="ql-align-justify">Proactively managing supply chain risk offers a competitive edge in an increasingly unpredictable marketplace. It allows businesses to build stronger relationships with suppliers, improve operational efficiency, and ensure continuity of service, even in times of crisis. Implementing strategies such as diversifying suppliers, leveraging technology for better visibility, and adopting flexible logistical models can help organisations stay agile and minimise potential disruptions.&nbsp;</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Haydn Brooks, CEO and Co-Founder of Risk Ledger, about third-party risk management and the best practices for organisations to enhance their security posture.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Supply chains have become more interconnected, increasing exposure to cyber risks.</li><li>Hackers target corporate supply chains for financial gain and geopolitical reasons.</li><li>The attack surface has expanded significantly without corresponding security measures.</li><li>Supply chain attacks can be untargeted or targeted, with different motivations.</li><li>Developing security tools for supply chains is challenging due to complexity and the need for more visibility.</li><li>Real-world examples like Target and SolarWinds illustrate the consequences of supply chain breaches.</li><li>Neglecting third-party risk management can lead to reputational and operational impacts.</li><li>Collaboration with suppliers is essential for a unified defence against cyber threats.</li></ul><br/><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Supply Chain Risk Management</p><p><strong>01:51 - </strong>Understanding the Motivation Behind Supply Chain Attacks</p><p><strong>04:39 -</strong> Challenges in Developing Security Tools for Supply Chains</p><p><strong>06:37 - </strong>Real-World Consequences of Supply Chain Breaches</p><p><strong>09:23 -</strong> The Importance of Third-Party Risk Management</p><p><strong>11:18 -</strong> Best Practices for Enhancing Third-Party Risk Management</p><p><strong>13:37 -</strong> The Role of Automation in Risk Management</p><p><strong>15:04 -</strong> Creating a Unified Defense Strategy with Suppliers</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Effective supply chain risk management is no longer optional—it is essential for long-term business success. Disruptions from natural disasters, geopolitical tensions, or unexpected global events like pandemics can ripple through even the most carefully planned supply chains.&nbsp;</p><p class="ql-align-justify">Companies that fail to anticipate and mitigate these risks can face costly delays, increased operational costs, and damaged reputations. By prioritising risk management, businesses can identify vulnerabilities, strengthen their supply chain resilience, and ensure that they can respond swiftly to unforeseen challenges.&nbsp;&nbsp;</p><p class="ql-align-justify">Proactively managing supply chain risk offers a competitive edge in an increasingly unpredictable marketplace. It allows businesses to build stronger relationships with suppliers, improve operational efficiency, and ensure continuity of service, even in times of crisis. Implementing strategies such as diversifying suppliers, leveraging technology for better visibility, and adopting flexible logistical models can help organisations stay agile and minimise potential disruptions.&nbsp;</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Haydn Brooks, CEO and Co-Founder of Risk Ledger, about third-party risk management and the best practices for organisations to enhance their security posture.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Supply chains have become more interconnected, increasing exposure to cyber risks.</li><li>Hackers target corporate supply chains for financial gain and geopolitical reasons.</li><li>The attack surface has expanded significantly without corresponding security measures.</li><li>Supply chain attacks can be untargeted or targeted, with different motivations.</li><li>Developing security tools for supply chains is challenging due to complexity and the need for more visibility.</li><li>Real-world examples like Target and SolarWinds illustrate the consequences of supply chain breaches.</li><li>Neglecting third-party risk management can lead to reputational and operational impacts.</li><li>Collaboration with suppliers is essential for a unified defence against cyber threats.</li></ul><br/><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Supply Chain Risk Management</p><p><strong>01:51 - </strong>Understanding the Motivation Behind Supply Chain Attacks</p><p><strong>04:39 -</strong> Challenges in Developing Security Tools for Supply Chains</p><p><strong>06:37 - </strong>Real-World Consequences of Supply Chain Breaches</p><p><strong>09:23 -</strong> The Importance of Third-Party Risk Management</p><p><strong>11:18 -</strong> Best Practices for Enhancing Third-Party Risk Management</p><p><strong>13:37 -</strong> The Role of Automation in Risk Management</p><p><strong>15:04 -</strong> Creating a Unified Defense Strategy with Suppliers</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a3fc75cc-2ac1-49b5-ad16-43456479fb18</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 18 Dec 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d63d1225-1cc0-44e9-aa7e-09641619d4f4/THE-SECURITY-STRATEGIST-Haydn-Brooks-MASTER-converted.mp3" length="17224258" type="audio/mpeg"/><itunes:duration>17:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:season>1</podcast:season></item><item><title>Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution</title><itunes:title>Passwords Are So Last Year: Biometrics, Deepfakes, and the Passwordless Revolution</itunes:title><description><![CDATA[<p class="ql-align-justify">Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabilities can result in data breaches, financial losses, and reputational damage, making them a top concern for businesses of all sizes. Despite technological advances, many organisations struggle to keep up with increasingly sophisticated phishing techniques and the risks of weak or reused passwords.&nbsp;</p><p class="ql-align-justify">Addressing these challenges requires more than cookie-cutter solutions—it demands a holistic approach to cybersecurity that encompasses technology, employee education, and robust policy enforcement.&nbsp;&nbsp;</p><p class="ql-align-justify">The stakes are exceptionally high for small and medium-sized enterprises (SMEs). Cybercriminals often target SMEs, perceiving them as less prepared to fend off attacks. Implementing effective cybersecurity measures doesn’t have to be overwhelming or costly, but it does require understanding the risks and taking proactive steps to mitigate them.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Steven Furnell, IEEE senior member and professor of cybersecurity at the University of Nottingham.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Cybersecurity posture shows little improvement year over year.</li><li class="ql-align-justify">Phishing remains the most reported cybersecurity threat.</li><li class="ql-align-justify">Community support is vital for SMEs in cybersecurity.</li><li class="ql-align-justify">Transitioning to passwordless solutions is underway but not complete.</li><li class="ql-align-justify">Biometric data should be stored securely on user devices.</li><li class="ql-align-justify">Usability must be balanced with security in technology development.</li><li class="ql-align-justify">Deepfake technology presents new challenges for biometric systems.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cybersecurity Insights</p><p class="ql-align-justify"><strong>01:27 -</strong> Current Cybersecurity Posture and Challenges</p><p class="ql-align-justify"><strong>03:23 -</strong> Phishing and Common Cybersecurity Threats</p><p class="ql-align-justify"><strong>07:09 -</strong> Supporting Small and Medium Enterprises</p><p class="ql-align-justify"><strong>10:56 -</strong> Transitioning to a Passwordless Future</p><p class="ql-align-justify"><strong>17:16 -</strong> Biometric Security and Its Challenges</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Today, organisations face relentless cybersecurity threats, with phishing attacks and poor password management leading the charge. These vulnerabilities can result in data breaches, financial losses, and reputational damage, making them a top concern for businesses of all sizes. Despite technological advances, many organisations struggle to keep up with increasingly sophisticated phishing techniques and the risks of weak or reused passwords.&nbsp;</p><p class="ql-align-justify">Addressing these challenges requires more than cookie-cutter solutions—it demands a holistic approach to cybersecurity that encompasses technology, employee education, and robust policy enforcement.&nbsp;&nbsp;</p><p class="ql-align-justify">The stakes are exceptionally high for small and medium-sized enterprises (SMEs). Cybercriminals often target SMEs, perceiving them as less prepared to fend off attacks. Implementing effective cybersecurity measures doesn’t have to be overwhelming or costly, but it does require understanding the risks and taking proactive steps to mitigate them.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Steven Furnell, IEEE senior member and professor of cybersecurity at the University of Nottingham.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Cybersecurity posture shows little improvement year over year.</li><li class="ql-align-justify">Phishing remains the most reported cybersecurity threat.</li><li class="ql-align-justify">Community support is vital for SMEs in cybersecurity.</li><li class="ql-align-justify">Transitioning to passwordless solutions is underway but not complete.</li><li class="ql-align-justify">Biometric data should be stored securely on user devices.</li><li class="ql-align-justify">Usability must be balanced with security in technology development.</li><li class="ql-align-justify">Deepfake technology presents new challenges for biometric systems.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cybersecurity Insights</p><p class="ql-align-justify"><strong>01:27 -</strong> Current Cybersecurity Posture and Challenges</p><p class="ql-align-justify"><strong>03:23 -</strong> Phishing and Common Cybersecurity Threats</p><p class="ql-align-justify"><strong>07:09 -</strong> Supporting Small and Medium Enterprises</p><p class="ql-align-justify"><strong>10:56 -</strong> Transitioning to a Passwordless Future</p><p class="ql-align-justify"><strong>17:16 -</strong> Biometric Security and Its Challenges</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d80ccc95-a454-440f-be9f-c7fb7a8b05e0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 09 Dec 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/283f2f9f-0d38-4fef-b26d-abaf03c92929/THE-SECURITY-STRATEGIST-Steve-Furnell-MASTER-converted.mp3" length="23278263" type="audio/mpeg"/><itunes:duration>24:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Cyber Game: Simulations, Ranges, and Digital Twins</title><itunes:title>The Cyber Game: Simulations, Ranges, and Digital Twins</itunes:title><description><![CDATA[<p>Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To stay ahead in emerging risks, organisations must adopt cutting-edge tools that enable proactive preparation and robust defence strategies against these risks.</p><p>Cyber ranges and digital twins are revolutionising cybersecurity by offering highly effective methods for simulating real-world attacks, testing security protocols, and providing predictive insights into potential vulnerabilities. These tools provide a safe, controlled environment for teams to practice and refine their response strategies, ensuring they can confidently tackle sophisticated cyber threats.</p><p>Cyber ranges create realistic virtual environments that mimic complex network infrastructures, enabling security teams to engage in hands-on training exercises and test their systems under simulated attack scenarios. Meanwhile, digital twins—virtual replicas of physical systems—allow for continuous monitoring and real-time analysis of critical infrastructure.&nbsp;</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Aare Reintam, COO of CybExer Technologies, about their NATO-award-winning cyber ranges.&nbsp;</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>Cyber ranges are essential for simulating real-world cyber attacks.</li><li>Digital twins provide a safe environment for testing and learning.</li><li>AI can enhance both offensive and defensive cybersecurity strategies.</li><li>Regular participation in cyber ranges improves team readiness.</li><li>Understanding interdependencies in critical infrastructure is vital.</li><li>Proactive measures are necessary to address cybersecurity weaknesses.</li></ul><br/><p><br></p><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Cyber Ranges and Digital Twins</p><p><strong>02:50 -</strong> The Role of Cyber Ranges in Cybersecurity Training</p><p><strong>05:45 -</strong> Digital Twins: Enhancing Cybersecurity Simulations</p><p><strong>09:06 - </strong>Adapting to Evolving Cyber Threats</p><p><strong>12:01 -</strong> AI and Machine Learning in Cyber Ranges</p><p><strong>14:57 -</strong> Long-term Implications of Cyber Ranges for Organizations</p><p><strong>17:52 -</strong> Best Practices for Cyber Range Participation</p><p><strong>21:04 -</strong> The Importance of Continuous Training for Governments</p><p><strong>23:57</strong> <strong>-</strong> Conclusion and Resources</p>]]></description><content:encoded><![CDATA[<p>Governments and institutions face unprecedented cyber threats challenging national infrastructure, sensitive data security, and public services. To stay ahead in emerging risks, organisations must adopt cutting-edge tools that enable proactive preparation and robust defence strategies against these risks.</p><p>Cyber ranges and digital twins are revolutionising cybersecurity by offering highly effective methods for simulating real-world attacks, testing security protocols, and providing predictive insights into potential vulnerabilities. These tools provide a safe, controlled environment for teams to practice and refine their response strategies, ensuring they can confidently tackle sophisticated cyber threats.</p><p>Cyber ranges create realistic virtual environments that mimic complex network infrastructures, enabling security teams to engage in hands-on training exercises and test their systems under simulated attack scenarios. Meanwhile, digital twins—virtual replicas of physical systems—allow for continuous monitoring and real-time analysis of critical infrastructure.&nbsp;</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Aare Reintam, COO of CybExer Technologies, about their NATO-award-winning cyber ranges.&nbsp;</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>Cyber ranges are essential for simulating real-world cyber attacks.</li><li>Digital twins provide a safe environment for testing and learning.</li><li>AI can enhance both offensive and defensive cybersecurity strategies.</li><li>Regular participation in cyber ranges improves team readiness.</li><li>Understanding interdependencies in critical infrastructure is vital.</li><li>Proactive measures are necessary to address cybersecurity weaknesses.</li></ul><br/><p><br></p><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Cyber Ranges and Digital Twins</p><p><strong>02:50 -</strong> The Role of Cyber Ranges in Cybersecurity Training</p><p><strong>05:45 -</strong> Digital Twins: Enhancing Cybersecurity Simulations</p><p><strong>09:06 - </strong>Adapting to Evolving Cyber Threats</p><p><strong>12:01 -</strong> AI and Machine Learning in Cyber Ranges</p><p><strong>14:57 -</strong> Long-term Implications of Cyber Ranges for Organizations</p><p><strong>17:52 -</strong> Best Practices for Cyber Range Participation</p><p><strong>21:04 -</strong> The Importance of Continuous Training for Governments</p><p><strong>23:57</strong> <strong>-</strong> Conclusion and Resources</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c5c02bcd-276e-46a9-95e0-264b98baa74a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 04 Dec 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4ec6678b-7afd-4ce1-85c3-56a117f52dcc/THE-SECURITY-STRATEGIST-Aare-Reintam-MASTER-2-converted.mp3" length="23890003" type="audio/mpeg"/><itunes:duration>24:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:season>1</podcast:season></item><item><title>Why Tracking Your Digital Risk is a Big Deal</title><itunes:title>Why Tracking Your Digital Risk is a Big Deal</itunes:title><description><![CDATA[<p class="ql-align-justify">Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safeguarding sensitive data to mitigating external threats. Businesses must move beyond traditional cybersecurity approaches, embracing holistic digital risk strategies that protect their reputation, assets, and customers. Organisations can create resilient systems that adapt to today’s complexities by anticipating risks rather than merely reacting to them.&nbsp;</p><p class="ql-align-justify">However, adequate digital risk protection isn’t just about technology—it requires a cultural shift. Fostering a security-first mindset means embedding security practices into every level of an organisation, from executive leadership to front-line employees. This cultural evolution goes hand in hand with compliance, as businesses align their strategies with ever-changing regulations.&nbsp;</p><br><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Scott Walker, Cyber Security Incident Response Team manager at Orange Cyberdefense, about the continuous nature of cybersecurity efforts, highlighting the thrill and challenges of incident response.</p><br><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><br><ul><li class="ql-align-justify">Digital risk protection is essential for organisations.</li><li class="ql-align-justify">Cultural shifts are necessary for effective cybersecurity compliance.</li><li class="ql-align-justify">Honesty in reporting incidents is crucial for effective response.</li><li class="ql-align-justify">Real-time metrics are vital for measuring cybersecurity effectiveness.</li><li class="ql-align-justify">Community support can help smaller businesses improve security.</li><li class="ql-align-justify">Incident response is a dynamic and exciting field.</li><li class="ql-align-justify">Understanding past threats helps in preparing for future ones.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><br><p class="ql-align-justify"><strong>00:00 -</strong> From Military to Cybersecurity: Scott Walker's Journey</p><p class="ql-align-justify"><strong>01:24 -</strong> The Importance of Digital Risk Protection</p><p class="ql-align-justify"><strong>05:41 - </strong>Cultural Shifts in Cybersecurity Compliance</p><p class="ql-align-justify"><strong>09:00 -</strong> Building a Culture of Honesty in Cybersecurity</p><p class="ql-align-justify"><strong>10:54 - </strong>The Role of Real-Time Metrics in Cyber Defense</p><p class="ql-align-justify"><strong>13:41 - </strong>Community Support in Cybersecurity</p><p class="ql-align-justify"><strong>15:34 - </strong>Emerging Threats: AI and Cybersecurity Resilience</p><p><strong>19:35 -</strong> The Thrill of Incident Response</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Digital risk protection has become a cornerstone of organisational security. Proactive measures are essential to defend against cyber risks, from safeguarding sensitive data to mitigating external threats. Businesses must move beyond traditional cybersecurity approaches, embracing holistic digital risk strategies that protect their reputation, assets, and customers. Organisations can create resilient systems that adapt to today’s complexities by anticipating risks rather than merely reacting to them.&nbsp;</p><p class="ql-align-justify">However, adequate digital risk protection isn’t just about technology—it requires a cultural shift. Fostering a security-first mindset means embedding security practices into every level of an organisation, from executive leadership to front-line employees. This cultural evolution goes hand in hand with compliance, as businesses align their strategies with ever-changing regulations.&nbsp;</p><br><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Scott Walker, Cyber Security Incident Response Team manager at Orange Cyberdefense, about the continuous nature of cybersecurity efforts, highlighting the thrill and challenges of incident response.</p><br><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><br><ul><li class="ql-align-justify">Digital risk protection is essential for organisations.</li><li class="ql-align-justify">Cultural shifts are necessary for effective cybersecurity compliance.</li><li class="ql-align-justify">Honesty in reporting incidents is crucial for effective response.</li><li class="ql-align-justify">Real-time metrics are vital for measuring cybersecurity effectiveness.</li><li class="ql-align-justify">Community support can help smaller businesses improve security.</li><li class="ql-align-justify">Incident response is a dynamic and exciting field.</li><li class="ql-align-justify">Understanding past threats helps in preparing for future ones.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><br><p class="ql-align-justify"><strong>00:00 -</strong> From Military to Cybersecurity: Scott Walker's Journey</p><p class="ql-align-justify"><strong>01:24 -</strong> The Importance of Digital Risk Protection</p><p class="ql-align-justify"><strong>05:41 - </strong>Cultural Shifts in Cybersecurity Compliance</p><p class="ql-align-justify"><strong>09:00 -</strong> Building a Culture of Honesty in Cybersecurity</p><p class="ql-align-justify"><strong>10:54 - </strong>The Role of Real-Time Metrics in Cyber Defense</p><p class="ql-align-justify"><strong>13:41 - </strong>Community Support in Cybersecurity</p><p class="ql-align-justify"><strong>15:34 - </strong>Emerging Threats: AI and Cybersecurity Resilience</p><p><strong>19:35 -</strong> The Thrill of Incident Response</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">12a44a22-6044-43db-8533-d0dba4738d17</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 02 Dec 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8567b77f-d63a-48bc-923d-1f5bbd71211f/THE-SECURITY-STRATEGIST-Scott-Walker-MASTER-1-converted.mp3" length="21432622" type="audio/mpeg"/><itunes:duration>22:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Psychology of Security: Empowering People to Protect</title><itunes:title>The Psychology of Security: Empowering People to Protect</itunes:title><description><![CDATA[<p class="ql-align-justify">Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effectiveness of security measures. By prioritising behavioural insights, organisations can anticipate potential threats and design systems that align with how people naturally act and interact.&nbsp;</p><p class="ql-align-justify">Discussing the psychological drivers behind employee behaviour helps uncover why individuals may unknowingly bypass security protocols, highlighting the importance of addressing root causes rather than merely enforcing rules.&nbsp;&nbsp;</p><p class="ql-align-justify">Security isn’t just about preventing incidents; it’s about cultivating a culture where individuals are empowered to make informed decisions. This involves fostering a "just culture," where employees feel safe reporting mistakes without fear of punishment, enabling continuous improvement. By focusing on trust, transparency, and education, organisations can instil a security-first mindset across their workforce.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to John Scott, Lead Cyber Security Researcher at CultureAI, about building trust and responsibility within security culture to mitigate cyber risks effectively.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Understanding human behaviour is crucial for security.</li><li class="ql-align-justify">Human errors are inevitable; organisations must accept this.</li><li class="ql-align-justify">A ‘just culture’ is essential for a secure environment.</li><li class="ql-align-justify">Leadership must model security behaviours.</li><li class="ql-align-justify">Security should be seen as everyone's responsibility.</li><li class="ql-align-justify">Simplifying reporting processes encourages engagement.</li><li class="ql-align-justify">Fostering secure behaviour at home enhances workplace security.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Understanding Human Behavior in Security</p><p class="ql-align-justify"><strong>05:15 -</strong> The Role of Psychological Drivers</p><p class="ql-align-justify"><strong>10:55 -</strong> Fostering a Security-First Mindset</p><p class="ql-align-justify"><strong>17:32 -</strong> Bridging the Generational Gap in Security Awareness</p><p class="ql-align-justify"><strong>25:30 -</strong> Building Trust and Responsibility in Security Culture</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Understanding human behaviour is critical in creating secure environments, as human actions, decisions, and vulnerabilities often determine the effectiveness of security measures. By prioritising behavioural insights, organisations can anticipate potential threats and design systems that align with how people naturally act and interact.&nbsp;</p><p class="ql-align-justify">Discussing the psychological drivers behind employee behaviour helps uncover why individuals may unknowingly bypass security protocols, highlighting the importance of addressing root causes rather than merely enforcing rules.&nbsp;&nbsp;</p><p class="ql-align-justify">Security isn’t just about preventing incidents; it’s about cultivating a culture where individuals are empowered to make informed decisions. This involves fostering a "just culture," where employees feel safe reporting mistakes without fear of punishment, enabling continuous improvement. By focusing on trust, transparency, and education, organisations can instil a security-first mindset across their workforce.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to John Scott, Lead Cyber Security Researcher at CultureAI, about building trust and responsibility within security culture to mitigate cyber risks effectively.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Understanding human behaviour is crucial for security.</li><li class="ql-align-justify">Human errors are inevitable; organisations must accept this.</li><li class="ql-align-justify">A ‘just culture’ is essential for a secure environment.</li><li class="ql-align-justify">Leadership must model security behaviours.</li><li class="ql-align-justify">Security should be seen as everyone's responsibility.</li><li class="ql-align-justify">Simplifying reporting processes encourages engagement.</li><li class="ql-align-justify">Fostering secure behaviour at home enhances workplace security.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Understanding Human Behavior in Security</p><p class="ql-align-justify"><strong>05:15 -</strong> The Role of Psychological Drivers</p><p class="ql-align-justify"><strong>10:55 -</strong> Fostering a Security-First Mindset</p><p class="ql-align-justify"><strong>17:32 -</strong> Bridging the Generational Gap in Security Awareness</p><p class="ql-align-justify"><strong>25:30 -</strong> Building Trust and Responsibility in Security Culture</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">5de101dd-3324-410b-9008-a711820347e3</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 27 Nov 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0d35d02b-a541-4269-81a2-0275d2082b86/THE-SECURITY-STRATEGIST-John-Scott-MASTER-1-converted.mp3" length="29802229" type="audio/mpeg"/><itunes:duration>31:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:season>1</podcast:season></item><item><title>How do Hackers Collect Intelligence on their Victims?</title><itunes:title>How do Hackers Collect Intelligence on their Victims?</itunes:title><description><![CDATA[<p class="ql-align-justify">Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data mining to get ahead. From scouring social media profiles to exploiting publicly available data, attackers gather intelligence that helps them pinpoint vulnerabilities and personalise attacks. Every detail—personal photos, company affiliations, online connections—can provide valuable clues for hackers, helping them craft realistic phishing attempts, exploit system weaknesses, or impersonate trusted contacts.&nbsp;</p><p class="ql-align-justify">Understanding how hackers operate is the first line of defence in protecting your personal and business information. By exploring the methods hackers use, such as network reconnaissance, dark web monitoring, and social profiling, individuals and companies can recognise potential threats before they escalate. Awareness is power, and by knowing how hackers collect intelligence, you can adopt strategies to reduce your digital footprint, secure sensitive data, and stay one step ahead.&nbsp;</p><p class="ql-align-justify">In this episode, Alejandro Leal, Analyst at KuppingerCole speaks to Arik Atar, Senior Threat Intelligence Researcher at Radware, about the increasing sophistication of attacks, especially during the holiday season.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Threat actors are opportunists, targeting based on available information.</li><li class="ql-align-justify">Social media is a significant source of personal information for attackers.</li><li class="ql-align-justify">Holiday seasons see a spike in cyber attacks due to increased online activity.</li><li class="ql-align-justify">Using separate emails for different services can minimise risk.</li><li class="ql-align-justify">Regularly check privacy settings on social media and apps.</li><li class="ql-align-justify">Avoid saving passwords in web browsers for better security.</li><li class="ql-align-justify">Be cautious of seemingly legitimate offers that may involve stolen accounts.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Understanding Threat Actors' Motivations</p><p class="ql-align-justify"><strong>02:27 -</strong> The Role of Social Media in Cybersecurity</p><p class="ql-align-justify"><strong>05:44 - </strong>Evolution of Threat Actor Behavior</p><p class="ql-align-justify"><strong>09:32 -</strong> Anticipating Holiday Season Cyber Threats</p><p class="ql-align-justify"><strong>12:52 - </strong>Future-Proofing Your Digital Security</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Hackers today rely on sophisticated techniques to collect information about their targets, combining digital stealth, social engineering, and data mining to get ahead. From scouring social media profiles to exploiting publicly available data, attackers gather intelligence that helps them pinpoint vulnerabilities and personalise attacks. Every detail—personal photos, company affiliations, online connections—can provide valuable clues for hackers, helping them craft realistic phishing attempts, exploit system weaknesses, or impersonate trusted contacts.&nbsp;</p><p class="ql-align-justify">Understanding how hackers operate is the first line of defence in protecting your personal and business information. By exploring the methods hackers use, such as network reconnaissance, dark web monitoring, and social profiling, individuals and companies can recognise potential threats before they escalate. Awareness is power, and by knowing how hackers collect intelligence, you can adopt strategies to reduce your digital footprint, secure sensitive data, and stay one step ahead.&nbsp;</p><p class="ql-align-justify">In this episode, Alejandro Leal, Analyst at KuppingerCole speaks to Arik Atar, Senior Threat Intelligence Researcher at Radware, about the increasing sophistication of attacks, especially during the holiday season.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Threat actors are opportunists, targeting based on available information.</li><li class="ql-align-justify">Social media is a significant source of personal information for attackers.</li><li class="ql-align-justify">Holiday seasons see a spike in cyber attacks due to increased online activity.</li><li class="ql-align-justify">Using separate emails for different services can minimise risk.</li><li class="ql-align-justify">Regularly check privacy settings on social media and apps.</li><li class="ql-align-justify">Avoid saving passwords in web browsers for better security.</li><li class="ql-align-justify">Be cautious of seemingly legitimate offers that may involve stolen accounts.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Understanding Threat Actors' Motivations</p><p class="ql-align-justify"><strong>02:27 -</strong> The Role of Social Media in Cybersecurity</p><p class="ql-align-justify"><strong>05:44 - </strong>Evolution of Threat Actor Behavior</p><p class="ql-align-justify"><strong>09:32 -</strong> Anticipating Holiday Season Cyber Threats</p><p class="ql-align-justify"><strong>12:52 - </strong>Future-Proofing Your Digital Security</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">283434d0-61e2-4837-8800-a68e00e6906a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 18 Nov 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/b3512cb7-3ccb-4189-b752-e2b3bfd3c6b1/THE-SECURITY-STRATEGIST-Radware-MASTER-1-converted.mp3" length="14538359" type="audio/mpeg"/><itunes:duration>15:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season></item><item><title>Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs</title><itunes:title>Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs</itunes:title><description><![CDATA[<p class="ql-align-justify">As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and consumers alike. These advanced vehicles, packed with digital features and data-driven capabilities, also bring new cybersecurity challenges. With sophisticated connectivity features, onboard software, and data collection systems, the risk of cyber vulnerabilities is heightened, raising questions about data privacy, vehicle security, and the integrity of critical infrastructure.&nbsp;</p><p class="ql-align-justify">The intersection of cybersecurity and the influx of Chinese EVs requires strict data protection standards, secure software protocols, and collaboration across the automotive and tech industries. European markets increasingly prioritise transparency and rigorous testing to ensure these vehicles meet robust cybersecurity standards. By addressing these challenges, Europe can continue to embrace the electric future with confidence, ensuring that cutting-edge technology goes hand-in-hand with safety and security for all.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Gianni Cuozzo, founder and CEO of Exein, about&nbsp; the evolution of the automotive industry, the competitive landscape shaped by Chinese manufacturers, and the cybersecurity risks associated with connected technologies in EVs</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>EVs are fundamentally IoT systems on wheels.</li><li>The automotive industry has evolved from mechanical to digital to connected vehicles.</li><li>Chinese EVs are reshaping the competitive landscape in Europe.</li><li>The Cyber Resilience Act aims to enforce security standards for manufacturers.</li><li>Firmware updates can introduce new vulnerabilities post-certification.</li><li>The automotive supply chain must adhere to new security regulations.</li><li>Innovation in EVs must be balanced with robust security measures.</li></ul><br/><br><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 - </strong>Introduction to Cybersecurity and EVs</p><p><strong>02:58 - </strong>The Evolution of the Automotive Industry</p><p><strong>05:52 - </strong>Impact of Chinese EVs on European Market</p><p><strong>09:06 - </strong>Cybersecurity Risks of Connected EVs</p><p><strong>12:52 - </strong>The Cyber Resilience Act and Its Implications</p><p><strong>17:03 - </strong>Navigating Innovation and Security in EVs</p><br>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">As Chinese electric vehicles (EVs) rapidly gain market share across Europe, cybersecurity has become a key focus for regulators, manufacturers, and consumers alike. These advanced vehicles, packed with digital features and data-driven capabilities, also bring new cybersecurity challenges. With sophisticated connectivity features, onboard software, and data collection systems, the risk of cyber vulnerabilities is heightened, raising questions about data privacy, vehicle security, and the integrity of critical infrastructure.&nbsp;</p><p class="ql-align-justify">The intersection of cybersecurity and the influx of Chinese EVs requires strict data protection standards, secure software protocols, and collaboration across the automotive and tech industries. European markets increasingly prioritise transparency and rigorous testing to ensure these vehicles meet robust cybersecurity standards. By addressing these challenges, Europe can continue to embrace the electric future with confidence, ensuring that cutting-edge technology goes hand-in-hand with safety and security for all.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Gianni Cuozzo, founder and CEO of Exein, about&nbsp; the evolution of the automotive industry, the competitive landscape shaped by Chinese manufacturers, and the cybersecurity risks associated with connected technologies in EVs</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>EVs are fundamentally IoT systems on wheels.</li><li>The automotive industry has evolved from mechanical to digital to connected vehicles.</li><li>Chinese EVs are reshaping the competitive landscape in Europe.</li><li>The Cyber Resilience Act aims to enforce security standards for manufacturers.</li><li>Firmware updates can introduce new vulnerabilities post-certification.</li><li>The automotive supply chain must adhere to new security regulations.</li><li>Innovation in EVs must be balanced with robust security measures.</li></ul><br/><br><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 - </strong>Introduction to Cybersecurity and EVs</p><p><strong>02:58 - </strong>The Evolution of the Automotive Industry</p><p><strong>05:52 - </strong>Impact of Chinese EVs on European Market</p><p><strong>09:06 - </strong>Cybersecurity Risks of Connected EVs</p><p><strong>12:52 - </strong>The Cyber Resilience Act and Its Implications</p><p><strong>17:03 - </strong>Navigating Innovation and Security in EVs</p><br>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d2e4afcb-783d-4bb6-a752-6cadfe0b83a8</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 13 Nov 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8d69654f-6183-4371-9448-44e438a2d5c9/TECH-TRANSFORMED-Gianni-Cuozzo-MASTER-converted.mp3" length="24546778" type="audio/mpeg"/><itunes:duration>25:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season></item><item><title>Closing the Cloud Gap: CDR vs. Traditional Security in the  Fight for Resilience</title><itunes:title>Closing the Cloud Gap: CDR vs. Traditional Security in the  Fight for Resilience</itunes:title><description><![CDATA[<p class="ql-align-justify">With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and how does it fit alongside other advanced security solutions like XDR? Just as Security Operations Centers (SOCs) defend the enterprise network, they now must extend their defences to the cloud, ensuring threats are detected and addressed in real time.&nbsp;</p><p class="ql-align-justify">However, many organisations still rely heavily on Posture Management and "Shift Left" strategies to secure their cloud. While effective, these approaches leave gaps in protection, especially against modern attack methods. There's often an assumption that cloud security is entirely handled by the Cloud Service Provider (CSP), which leads to critical oversights.&nbsp;</p><p class="ql-align-justify">Recent research reveals that traditional security measures often miss threats like runtime attacks and identity mismanagement. In this episode, Chris Steffen, EMA's Vice President of Research, speaks to Nathaniel "Q" Quist, Palo Alto's Cloud Threat Intelligence Manager, to discuss CDR and its benefits.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Understanding the shared responsibility model is crucial for organisations.</li><li class="ql-align-justify">Misconfigurations are a leading cause of cloud security breaches.</li><li class="ql-align-justify">Ransomware attacks in the cloud behave differently than on-premises.</li><li class="ql-align-justify">Identity access management is a primary target for attackers.</li><li class="ql-align-justify">Visibility and telemetry are essential to effective security operations.</li><li class="ql-align-justify">Hard-coded credentials pose significant risks in cloud environments.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cloud Detection and Response</p><p class="ql-align-justify"><strong>02:56 -</strong> Understanding the Shared Responsibility Model</p><p class="ql-align-justify"><strong>05:47 -</strong> Cloud Security Posture Management and Its Importance</p><p class="ql-align-justify"><strong>09:07 -</strong> Real-World Scenarios in Cloud Security</p><p class="ql-align-justify"><strong>11:53 -</strong> The Evolution of Cybersecurity Technologies</p><p><strong>15:13 -</strong> Key Security Gaps in Cloud Environment </p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">With cloud attacks rising, Cloud Detection and Response (CDR) is becoming a crucial focus in modern security operations. But what exactly is CDR, and how does it fit alongside other advanced security solutions like XDR? Just as Security Operations Centers (SOCs) defend the enterprise network, they now must extend their defences to the cloud, ensuring threats are detected and addressed in real time.&nbsp;</p><p class="ql-align-justify">However, many organisations still rely heavily on Posture Management and "Shift Left" strategies to secure their cloud. While effective, these approaches leave gaps in protection, especially against modern attack methods. There's often an assumption that cloud security is entirely handled by the Cloud Service Provider (CSP), which leads to critical oversights.&nbsp;</p><p class="ql-align-justify">Recent research reveals that traditional security measures often miss threats like runtime attacks and identity mismanagement. In this episode, Chris Steffen, EMA's Vice President of Research, speaks to Nathaniel "Q" Quist, Palo Alto's Cloud Threat Intelligence Manager, to discuss CDR and its benefits.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Understanding the shared responsibility model is crucial for organisations.</li><li class="ql-align-justify">Misconfigurations are a leading cause of cloud security breaches.</li><li class="ql-align-justify">Ransomware attacks in the cloud behave differently than on-premises.</li><li class="ql-align-justify">Identity access management is a primary target for attackers.</li><li class="ql-align-justify">Visibility and telemetry are essential to effective security operations.</li><li class="ql-align-justify">Hard-coded credentials pose significant risks in cloud environments.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Cloud Detection and Response</p><p class="ql-align-justify"><strong>02:56 -</strong> Understanding the Shared Responsibility Model</p><p class="ql-align-justify"><strong>05:47 -</strong> Cloud Security Posture Management and Its Importance</p><p class="ql-align-justify"><strong>09:07 -</strong> Real-World Scenarios in Cloud Security</p><p class="ql-align-justify"><strong>11:53 -</strong> The Evolution of Cybersecurity Technologies</p><p><strong>15:13 -</strong> Key Security Gaps in Cloud Environment </p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">021bf810-af15-490a-a3b1-9f314e263d45</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 06 Nov 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d63c0c88-fdd8-4b61-81f6-3fc57c2eeff0/THE-SECURITY-STRATEGIST-Palo-Alto-1-MASTER-v2-converted.mp3" length="18965233" type="audio/mpeg"/><itunes:duration>19:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season></item><item><title>Courage &amp; Resilience: Bringing FBI Grit to Cybersecurity</title><itunes:title>Courage &amp; Resilience: Bringing FBI Grit to Cybersecurity</itunes:title><description><![CDATA[<p class="ql-align-justify">When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions can mean the difference between safeguarding critical assets and exposing vulnerabilities. This requires a willingness to act decisively, even under uncertainty, and to take calculated risks for the greater good of organizational security. Courage in this field isn’t just about individual bravery—it’s about fostering a culture where team members feel empowered to make tough calls, share unconventional insights, and drive proactive security measures.</p><p class="ql-align-justify">Equally important in cybersecurity is the value of followership and resilience. Effective followership involves supporting leadership and strategic decisions, embracing a shared sense of responsibility, and prioritising team goals over individual recognition. With a combination of courageous leadership, strong followership, and resilience, organizations can build a cybersecurity posture that not only withstands attacks but continuously improves in the face of emerging threats.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks with Miguel Clark, a retired FBI special agent, about the nuances of leadership, particularly in high-pressure environments like law enforcement and the tech industry.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Leadership is about placing others' needs above your own.</li><li class="ql-align-justify">Followership is crucial for effective leadership.</li><li class="ql-align-justify">Courage is developed by confronting fears.</li><li class="ql-align-justify">Mistakes are opportunities for learning and growth.</li><li class="ql-align-justify">Long-term organizational health requires valuing team contributions.</li><li class="ql-align-justify">Effective communication is essential for leadership success.</li><li class="ql-align-justify">Preparation for crises is key to resilience.</li><li class="ql-align-justify">Building a culture of trust encourages open communication.</li><li class="ql-align-justify">Perfectionism can hinder decision-making and progress.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Leadership and Followership</p><p class="ql-align-justify"><strong>02:45 -</strong> The Transition from FBI to Tech Industry Leadership</p><p class="ql-align-justify"><strong>06:36 -</strong> Understanding Followership in Leadership</p><p class="ql-align-justify"><strong>09:59 - </strong>Courage and Fear in Decision Making</p><p class="ql-align-justify"><strong>13:34 -</strong> Learning from Mistakes and Accountability</p><p class="ql-align-justify"><strong>17:52 -</strong> Long-term Health of Organizations</p><p class="ql-align-justify"><strong>21:39 -</strong> Communication and Understanding in Leadership</p><p class="ql-align-justify"><strong>25:56 -</strong> Preparing for Cybersecurity Breaches</p><p class="ql-align-justify"><strong>30:07 -</strong> Building a Culture of Trust</p><p class="ql-align-justify"><strong>33:51 - </strong>Conclusion: Resilience in Cybersecurity</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">When it comes to decision-making, courage is paramount. Cybersecurity professionals must navigate high-stakes environments where swift, bold decisions can mean the difference between safeguarding critical assets and exposing vulnerabilities. This requires a willingness to act decisively, even under uncertainty, and to take calculated risks for the greater good of organizational security. Courage in this field isn’t just about individual bravery—it’s about fostering a culture where team members feel empowered to make tough calls, share unconventional insights, and drive proactive security measures.</p><p class="ql-align-justify">Equally important in cybersecurity is the value of followership and resilience. Effective followership involves supporting leadership and strategic decisions, embracing a shared sense of responsibility, and prioritising team goals over individual recognition. With a combination of courageous leadership, strong followership, and resilience, organizations can build a cybersecurity posture that not only withstands attacks but continuously improves in the face of emerging threats.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks with Miguel Clark, a retired FBI special agent, about the nuances of leadership, particularly in high-pressure environments like law enforcement and the tech industry.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Leadership is about placing others' needs above your own.</li><li class="ql-align-justify">Followership is crucial for effective leadership.</li><li class="ql-align-justify">Courage is developed by confronting fears.</li><li class="ql-align-justify">Mistakes are opportunities for learning and growth.</li><li class="ql-align-justify">Long-term organizational health requires valuing team contributions.</li><li class="ql-align-justify">Effective communication is essential for leadership success.</li><li class="ql-align-justify">Preparation for crises is key to resilience.</li><li class="ql-align-justify">Building a culture of trust encourages open communication.</li><li class="ql-align-justify">Perfectionism can hinder decision-making and progress.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Leadership and Followership</p><p class="ql-align-justify"><strong>02:45 -</strong> The Transition from FBI to Tech Industry Leadership</p><p class="ql-align-justify"><strong>06:36 -</strong> Understanding Followership in Leadership</p><p class="ql-align-justify"><strong>09:59 - </strong>Courage and Fear in Decision Making</p><p class="ql-align-justify"><strong>13:34 -</strong> Learning from Mistakes and Accountability</p><p class="ql-align-justify"><strong>17:52 -</strong> Long-term Health of Organizations</p><p class="ql-align-justify"><strong>21:39 -</strong> Communication and Understanding in Leadership</p><p class="ql-align-justify"><strong>25:56 -</strong> Preparing for Cybersecurity Breaches</p><p class="ql-align-justify"><strong>30:07 -</strong> Building a Culture of Trust</p><p class="ql-align-justify"><strong>33:51 - </strong>Conclusion: Resilience in Cybersecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6308755f-76c4-4960-ab62-731aec0fd9f5</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 06 Nov 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/18ab2d5e-ec96-492f-a644-0553c9ac23db/THE-SECURITY-STRATEGIST-Miguel-Clarke-MASTER-1-converted.mp3" length="33578164" type="audio/mpeg"/><itunes:duration>35:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ransom-Repeat: How to Stop Funding Your Favorite Hackers!</title><itunes:title>Ransom-Repeat: How to Stop Funding Your Favorite Hackers!</itunes:title><description><![CDATA[<p>Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational damage. Semperis’s <a href="https://www.semperis.com/ransomware-risk-report/" rel="noopener noreferrer" target="_blank">Ransomware Risk Report</a> explores the reasons behind the high percentage of businesses making payments, which inadvertently encourages attackers to strike again. By giving in to demands, many companies fall into a dangerous cycle of repeated attacks, becoming easy targets for cybercriminals.</p><p>To mitigate this risk, it is critical to adopt an "assume breach" mindset. Organisations must be prepared for potential breaches by investing in robust recovery plans and strengthening cybersecurity measures, ensuring they can respond effectively without succumbing to ransom demands.</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Simon Hodgkinson about the reasons behind the high percentage of organisations paying ransoms, the cycle of repeated attacks, and the critical importance of having robust recovery plans.</p><p><strong>Key Takeaways:</strong></p><ul><li>Paying ransom does not guarantee recovery.</li><li>Business resilience is crucial during recovery.</li><li>Recovery plans must be robust and well-tested.</li><li>Identity management is a critical vulnerability.</li><li>Dedicated tools are necessary for identity recovery.</li><li>Recovery time objectives (RTO) need improvement.</li></ul><br/><p><a href="https://www.semperis.com/purple-knight/" rel="noopener noreferrer" target="_blank"><strong><em>Purple Knight</em></strong></a><strong><em> </em></strong><em>is highlighted in the report as a key tool in detecting vulnerabilities before attackers can strike. With Purple Knight, organisations can proactively assess their defences, identify weak points, and strengthen recovery plans—helping to break the costly cycle of ransomware payments.</em></p><p><br></p><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Ransomware and Its Impact</p><p><strong>02:50 -</strong> Understanding the Ransom Payment Dilemma</p><p><strong>06:03 -</strong> The Cycle of Repeated Attacks</p><p><strong>08:55 -</strong> The Importance of Recovery Plans</p><p><strong>12:05 -</strong> Identity Recovery and Its Challenges</p><p><strong>14:51 -</strong> Best Practices for Ransomware Resilience</p><p><strong>17:50 -</strong> Tools for Active Directory Recovery</p><p><strong>21:03 -</strong> Conclusion and Key Takeaways</p>]]></description><content:encoded><![CDATA[<p>Ransomware attacks increasingly force organisations to pay ransom due to the significant impact on operations, data loss, and the fear of reputational damage. Semperis’s <a href="https://www.semperis.com/ransomware-risk-report/" rel="noopener noreferrer" target="_blank">Ransomware Risk Report</a> explores the reasons behind the high percentage of businesses making payments, which inadvertently encourages attackers to strike again. By giving in to demands, many companies fall into a dangerous cycle of repeated attacks, becoming easy targets for cybercriminals.</p><p>To mitigate this risk, it is critical to adopt an "assume breach" mindset. Organisations must be prepared for potential breaches by investing in robust recovery plans and strengthening cybersecurity measures, ensuring they can respond effectively without succumbing to ransom demands.</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Simon Hodgkinson about the reasons behind the high percentage of organisations paying ransoms, the cycle of repeated attacks, and the critical importance of having robust recovery plans.</p><p><strong>Key Takeaways:</strong></p><ul><li>Paying ransom does not guarantee recovery.</li><li>Business resilience is crucial during recovery.</li><li>Recovery plans must be robust and well-tested.</li><li>Identity management is a critical vulnerability.</li><li>Dedicated tools are necessary for identity recovery.</li><li>Recovery time objectives (RTO) need improvement.</li></ul><br/><p><a href="https://www.semperis.com/purple-knight/" rel="noopener noreferrer" target="_blank"><strong><em>Purple Knight</em></strong></a><strong><em> </em></strong><em>is highlighted in the report as a key tool in detecting vulnerabilities before attackers can strike. With Purple Knight, organisations can proactively assess their defences, identify weak points, and strengthen recovery plans—helping to break the costly cycle of ransomware payments.</em></p><p><br></p><p><strong>Chapters:&nbsp;</strong></p><p><strong>00:00 -</strong> Introduction to Ransomware and Its Impact</p><p><strong>02:50 -</strong> Understanding the Ransom Payment Dilemma</p><p><strong>06:03 -</strong> The Cycle of Repeated Attacks</p><p><strong>08:55 -</strong> The Importance of Recovery Plans</p><p><strong>12:05 -</strong> Identity Recovery and Its Challenges</p><p><strong>14:51 -</strong> Best Practices for Ransomware Resilience</p><p><strong>17:50 -</strong> Tools for Active Directory Recovery</p><p><strong>21:03 -</strong> Conclusion and Key Takeaways</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b93d3faa-5d38-4022-9362-5612aacdfa37</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 23 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/97b48702-96b0-48d6-95f3-66d8e8f22fc3/THE-SECURITY-STRATEGIST-Simon-Sempris-MASTER-3-converted.mp3" length="23024728" type="audio/mpeg"/><itunes:duration>24:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Innovation Paradox: Security and Productivity in a Regulatory World</title><itunes:title>The Innovation Paradox: Security and Productivity in a Regulatory World</itunes:title><description><![CDATA[<p class="ql-align-justify">Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to growth. However, as businesses embrace digital transformation, they open themselves to new security vulnerabilities. These advancements can quickly become liabilities without proper protection, exposing companies to cyberattacks, data breaches, and other security threats.</p><p class="ql-align-justify">Striking the right balance between innovation and security is essential for long-term success. Companies must prioritise cybersecurity alongside growth initiatives, ensuring that strong defences back every new technology or system.&nbsp;</p><p class="ql-align-justify">In this episode, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Adeel Ahmad, Director of Technical Field Strategy at HashiCorp, and Grant Webb, Cloud Technologist, about the innovation paradox.</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>The balance between innovation and security</li><li>How digital transformation introduces new vulnerabilities</li><li class="ql-align-justify">Strategies for prioritizing cybersecurity alongside growth</li><li class="ql-align-justify">Innovation is about change, while security is about safety.</li><li class="ql-align-justify">Security should not be seen as a hindrance to innovation.</li><li class="ql-align-justify">Embedding security in design can reduce friction.</li><li class="ql-align-justify">Regulatory compliance can complicate the innovation process.</li><li class="ql-align-justify">Shared objectives can align security and innovation efforts.</li><li class="ql-align-justify">Building relationships between security and development teams is crucial.</li><li class="ql-align-justify">CISOs should be integrated into the innovation process.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> The Innovation Paradox: An Introduction</p><p class="ql-align-justify"><strong>02:53 -</strong> Balancing Innovation and Security</p><p class="ql-align-justify"><strong>05:49 -</strong> Regulatory Challenges in Innovation</p><p class="ql-align-justify"><strong>09:14 -</strong> Embedding Security in Organizational Culture</p><p class="ql-align-justify"><strong>12:07 -</strong> Lessons from HashiCorp's Experience</p><p class="ql-align-justify"><strong>14:58 - </strong>Building Relationships Between Security and Development</p><p class="ql-align-justify"><strong>17:52 - </strong>Creative Approaches to Security and Productivity</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Companies are constantly pushing for innovation to stay competitive. Whether adopting new technologies or streamlining processes, innovation is key to growth. However, as businesses embrace digital transformation, they open themselves to new security vulnerabilities. These advancements can quickly become liabilities without proper protection, exposing companies to cyberattacks, data breaches, and other security threats.</p><p class="ql-align-justify">Striking the right balance between innovation and security is essential for long-term success. Companies must prioritise cybersecurity alongside growth initiatives, ensuring that strong defences back every new technology or system.&nbsp;</p><p class="ql-align-justify">In this episode, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Adeel Ahmad, Director of Technical Field Strategy at HashiCorp, and Grant Webb, Cloud Technologist, about the innovation paradox.</p><p><strong>Key Takeaways:&nbsp;</strong></p><ul><li>The balance between innovation and security</li><li>How digital transformation introduces new vulnerabilities</li><li class="ql-align-justify">Strategies for prioritizing cybersecurity alongside growth</li><li class="ql-align-justify">Innovation is about change, while security is about safety.</li><li class="ql-align-justify">Security should not be seen as a hindrance to innovation.</li><li class="ql-align-justify">Embedding security in design can reduce friction.</li><li class="ql-align-justify">Regulatory compliance can complicate the innovation process.</li><li class="ql-align-justify">Shared objectives can align security and innovation efforts.</li><li class="ql-align-justify">Building relationships between security and development teams is crucial.</li><li class="ql-align-justify">CISOs should be integrated into the innovation process.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> The Innovation Paradox: An Introduction</p><p class="ql-align-justify"><strong>02:53 -</strong> Balancing Innovation and Security</p><p class="ql-align-justify"><strong>05:49 -</strong> Regulatory Challenges in Innovation</p><p class="ql-align-justify"><strong>09:14 -</strong> Embedding Security in Organizational Culture</p><p class="ql-align-justify"><strong>12:07 -</strong> Lessons from HashiCorp's Experience</p><p class="ql-align-justify"><strong>14:58 - </strong>Building Relationships Between Security and Development</p><p class="ql-align-justify"><strong>17:52 - </strong>Creative Approaches to Security and Productivity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">57e819ea-03a5-45a8-8da6-b6e2d4bedb98</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 16 Oct 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/93e7e44d-481d-40de-bc85-b7f944318381/THE-SECURITY-STRATEGIST-Hashicorp-MASTER-1-converted.mp3" length="22554769" type="audio/mpeg"/><itunes:duration>23:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ransomware: A Battle for Cyber Security</title><itunes:title>Ransomware: A Battle for Cyber Security</itunes:title><description><![CDATA[<p class="ql-align-justify">Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormous, often involving extensive data restoration, system reconfiguration, and potential business disruptions. The financial toll, reputational damage, and operational downtime can be devastating.&nbsp;</p><p class="ql-align-justify">AI can be a powerful tool in this battle that allows organisations to spot and prevent threats more effectively, analyse vast datasets for anomalies, and automate critical security tasks.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Jim McGann, VP of Strategic Partnerships at Index Engine, about Ransomware and its consequences.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Ransomware continues to be a significant threat to organisations.</li><li>The complexity of IT infrastructure contributes to ransomware vulnerabilities.</li><li>User training is crucial in preventing ransomware attacks.</li><li>Recovery from ransomware can take months and cost billions.</li><li>Organisations often confuse disaster recovery with cyber recovery.</li><li>AI can help identify patterns of bad actor behaviour.</li><li>Validating data integrity is essential for effective recovery.</li><li>Many organisations lack a cyber resiliency strategy.</li><li>Ransomware actors often return to organisations that have paid ransoms.</li><li>A proactive recovery strategy is necessary for minimising impact.</li></ul><br/><p><strong>Chapters:</strong></p><p><strong>00:00</strong> Introduction to Ransomware Challenges</p><p><strong>01:28</strong> Understanding the Persistence of Ransomware</p><p><strong>05:17</strong> Complexities of Recovery After an Attack</p><p><strong>10:57 </strong>The Role of AI in Cybersecurity</p><p><strong>15:31 </strong>Real-World Applications of AI in Recovery</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Ransomware has become a pervasive threat, targeting organisations of all sizes and industries. The complexities of recovery after an attack are enormous, often involving extensive data restoration, system reconfiguration, and potential business disruptions. The financial toll, reputational damage, and operational downtime can be devastating.&nbsp;</p><p class="ql-align-justify">AI can be a powerful tool in this battle that allows organisations to spot and prevent threats more effectively, analyse vast datasets for anomalies, and automate critical security tasks.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Jim McGann, VP of Strategic Partnerships at Index Engine, about Ransomware and its consequences.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Ransomware continues to be a significant threat to organisations.</li><li>The complexity of IT infrastructure contributes to ransomware vulnerabilities.</li><li>User training is crucial in preventing ransomware attacks.</li><li>Recovery from ransomware can take months and cost billions.</li><li>Organisations often confuse disaster recovery with cyber recovery.</li><li>AI can help identify patterns of bad actor behaviour.</li><li>Validating data integrity is essential for effective recovery.</li><li>Many organisations lack a cyber resiliency strategy.</li><li>Ransomware actors often return to organisations that have paid ransoms.</li><li>A proactive recovery strategy is necessary for minimising impact.</li></ul><br/><p><strong>Chapters:</strong></p><p><strong>00:00</strong> Introduction to Ransomware Challenges</p><p><strong>01:28</strong> Understanding the Persistence of Ransomware</p><p><strong>05:17</strong> Complexities of Recovery After an Attack</p><p><strong>10:57 </strong>The Role of AI in Cybersecurity</p><p><strong>15:31 </strong>Real-World Applications of AI in Recovery</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c450255e-4b3d-4820-a471-073f3a37f984</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 16 Oct 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/64253d58-ca29-41e1-8723-8d574f3588f0/THE-SECURITY-STRATEGIST-Jim-McGann-MASTER-converted.mp3" length="18729628" type="audio/mpeg"/><itunes:duration>19:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>1</podcast:season></item><item><title>Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know</title><itunes:title>Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know</itunes:title><description><![CDATA[<p class="ql-align-justify">In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information security, drawing on key findings from their latest report. The discussion emphasises the growing importance of compliance in the face of rising data breaches and supply chain vulnerabilities.&nbsp;</p><p class="ql-align-justify">They explore artificial intelligence's dual role in cybersecurity, highlighting its potential to enhance defences and the increasing threat posed by AI-driven attacks like deep fakes. Luke stresses the need for businesses, especially in sensitive industries, to foster a culture of compliance and continuous improvement in cybersecurity measures to stay ahead of evolving risks.</p><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">99% of businesses faced fines for data breaches.</li><li class="ql-align-justify">Supply chain attacks have increased by 22%.</li><li class="ql-align-justify">Deepfakes are now a significant security threat.</li><li class="ql-align-justify">A culture of compliance is essential for organisations.</li><li class="ql-align-justify">ISO 27001 is crucial for information security management.</li><li class="ql-align-justify">Cybersecurity should be part of daily business operations.</li><li class="ql-align-justify">Continuous improvement is critical to effective security practices.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00</strong> Introduction to Information Security and Compliance</p><p class="ql-align-justify"><strong>01:21 </strong>Key Findings from the State of Information Security Report</p><p class="ql-align-justify"><strong>03:10</strong> Addressing Supply Chain Security Risks</p><p class="ql-align-justify"><strong>05:57</strong> The Role of AI in Cybersecurity</p><p class="ql-align-justify"><strong>08:19</strong> The Rise of Deepfakes and Their Impact</p><p class="ql-align-justify"><strong>10:39 </strong>Building a Culture of Compliance in Organizations</p><p class="ql-align-justify"><strong>12:36</strong> Best Practices for Compliance in Sensitive Industries</p><p class="ql-align-justify"><strong>15:27 </strong>Continuous Improvement in Cybersecurity Practices</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">In this episode, Luke Dash, CEO of ISMS.online, speaks to Paulina Rios Maya, Head of Industry Relations, about the current state of information security, drawing on key findings from their latest report. The discussion emphasises the growing importance of compliance in the face of rising data breaches and supply chain vulnerabilities.&nbsp;</p><p class="ql-align-justify">They explore artificial intelligence's dual role in cybersecurity, highlighting its potential to enhance defences and the increasing threat posed by AI-driven attacks like deep fakes. Luke stresses the need for businesses, especially in sensitive industries, to foster a culture of compliance and continuous improvement in cybersecurity measures to stay ahead of evolving risks.</p><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">99% of businesses faced fines for data breaches.</li><li class="ql-align-justify">Supply chain attacks have increased by 22%.</li><li class="ql-align-justify">Deepfakes are now a significant security threat.</li><li class="ql-align-justify">A culture of compliance is essential for organisations.</li><li class="ql-align-justify">ISO 27001 is crucial for information security management.</li><li class="ql-align-justify">Cybersecurity should be part of daily business operations.</li><li class="ql-align-justify">Continuous improvement is critical to effective security practices.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00</strong> Introduction to Information Security and Compliance</p><p class="ql-align-justify"><strong>01:21 </strong>Key Findings from the State of Information Security Report</p><p class="ql-align-justify"><strong>03:10</strong> Addressing Supply Chain Security Risks</p><p class="ql-align-justify"><strong>05:57</strong> The Role of AI in Cybersecurity</p><p class="ql-align-justify"><strong>08:19</strong> The Rise of Deepfakes and Their Impact</p><p class="ql-align-justify"><strong>10:39 </strong>Building a Culture of Compliance in Organizations</p><p class="ql-align-justify"><strong>12:36</strong> Best Practices for Compliance in Sensitive Industries</p><p class="ql-align-justify"><strong>15:27 </strong>Continuous Improvement in Cybersecurity Practices</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">609a8c0b-3d79-4b26-b856-765be9fc4eeb</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 16 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/b2417925-d9a2-485f-a04d-c49d2b78cc3e/THE-SECURITY-STRATEGIST-ISMS-Online-Luke-MASTER-2-converted.mp3" length="17436511" type="audio/mpeg"/><itunes:duration>18:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season></item><item><title>Hackers: Heroes vs Villains – The Code Wars</title><itunes:title>Hackers: Heroes vs Villains – The Code Wars</itunes:title><description><![CDATA[<p class="ql-align-justify">Ethical hacking, or penetration testing, plays a key role in protecting businesses from cyber threats by identifying vulnerabilities before malicious hackers can exploit them. As AI becomes more embedded in critical operations, it becomes a prime target for cybercriminals. Ethical hackers are stepping up to defend these systems, using their skills to protect sensitive data, safeguard privacy, and ensure businesses stay secure and operational.</p><p class="ql-align-justify">With the rise of AI-powered security tools, ethical hackers can analyse and respond to threats faster and more accurately than ever. However, the rapid advancement of AI also raises new challenges—automated systems can sometimes behave unpredictably, and new vulnerabilities may emerge.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Joseph Carson, Chief Security Scientist &amp; Advisory CISO at Delinea, about the differences between superhero hackers, who use their skills for good, and villain hackers, who exploit vulnerabilities for malicious purposes.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Hacking is a skillset and mindset, not inherently criminal.</li><li class="ql-align-justify">There are two types of hackers: superheroes and villains.</li><li class="ql-align-justify">AI is primarily used for defensive purposes in cybersecurity.</li><li class="ql-align-justify">Data minimisation is essential for protecting user privacy.</li><li class="ql-align-justify">Attackers are increasingly targeting individuals rather than systems.</li><li class="ql-align-justify">Identity protection is a top priority in cybersecurity.</li><li class="ql-align-justify">User-friendly security measures are necessary to enhance protection.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Ethical Hacking and AI's Impact</p><p class="ql-align-justify"><strong>03:14 -</strong> The Dual Nature of Hackers: Heroes vs. Villains</p><p class="ql-align-justify"><strong>06:33 - </strong>AI's Role in Cybersecurity: Opportunities and Threats</p><p class="ql-align-justify"><strong>11:18 - </strong>Balancing User Privacy and Security</p><p class="ql-align-justify"><strong>14:35 - </strong>The Role of Ethical Hackers in Cybersecurity</p><p class="ql-align-justify"><strong>17:13 - </strong>Overlooked Vulnerabilities: The Human Element in Cybersecurity</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Ethical hacking, or penetration testing, plays a key role in protecting businesses from cyber threats by identifying vulnerabilities before malicious hackers can exploit them. As AI becomes more embedded in critical operations, it becomes a prime target for cybercriminals. Ethical hackers are stepping up to defend these systems, using their skills to protect sensitive data, safeguard privacy, and ensure businesses stay secure and operational.</p><p class="ql-align-justify">With the rise of AI-powered security tools, ethical hackers can analyse and respond to threats faster and more accurately than ever. However, the rapid advancement of AI also raises new challenges—automated systems can sometimes behave unpredictably, and new vulnerabilities may emerge.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Joseph Carson, Chief Security Scientist &amp; Advisory CISO at Delinea, about the differences between superhero hackers, who use their skills for good, and villain hackers, who exploit vulnerabilities for malicious purposes.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Hacking is a skillset and mindset, not inherently criminal.</li><li class="ql-align-justify">There are two types of hackers: superheroes and villains.</li><li class="ql-align-justify">AI is primarily used for defensive purposes in cybersecurity.</li><li class="ql-align-justify">Data minimisation is essential for protecting user privacy.</li><li class="ql-align-justify">Attackers are increasingly targeting individuals rather than systems.</li><li class="ql-align-justify">Identity protection is a top priority in cybersecurity.</li><li class="ql-align-justify">User-friendly security measures are necessary to enhance protection.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Ethical Hacking and AI's Impact</p><p class="ql-align-justify"><strong>03:14 -</strong> The Dual Nature of Hackers: Heroes vs. Villains</p><p class="ql-align-justify"><strong>06:33 - </strong>AI's Role in Cybersecurity: Opportunities and Threats</p><p class="ql-align-justify"><strong>11:18 - </strong>Balancing User Privacy and Security</p><p class="ql-align-justify"><strong>14:35 - </strong>The Role of Ethical Hackers in Cybersecurity</p><p class="ql-align-justify"><strong>17:13 - </strong>Overlooked Vulnerabilities: The Human Element in Cybersecurity</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">23d46135-b2dd-4e33-9315-ce5d37e3a6cb</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 14 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/71e01ddb-6f99-4df5-999e-43217edc5af1/THE-SECURITY-STRATEGIST-Joe-Carson-MASTER-1-converted.mp3" length="20595703" type="audio/mpeg"/><itunes:duration>21:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season></item><item><title>Identity - a quick win in your Zero Trust roadmap</title><itunes:title>Identity - a quick win in your Zero Trust roadmap</itunes:title><description><![CDATA[<p class="ql-align-justify">Traditional security models are no longer enough. Identity and Zero Trust have become essential pillars of modern information security strategies. By focusing on “never trust, always verify,” Zero Trust ensures that no user or device is trusted by default—whether inside or outside the network—identity management, meanwhile, safeguards access by verifying who is accessing your systems and data.</p><p class="ql-align-justify">Together, these approaches offer a more robust, adaptive defence against cyber threats, helping organisations protect sensitive information and mitigate risk.</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Chris Steffen, EMA's vice president of research, speaks to Ran Lampert, CEO and co-founder of Infinipoint, about the importance of identity when building your Zero Trust journey.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Identity and device authentication are equally important in Zero Trust.</li><li class="ql-align-justify">Compliance requirements increasingly demand device verification.</li><li class="ql-align-justify">Quick wins in identity management can lead to immediate improvements.</li><li class="ql-align-justify">Gradual implementation of security solutions is key to success.</li><li class="ql-align-justify">Zero Trust is a continuous journey, not a one-time fix.</li><li class="ql-align-justify">Integrating user and device authentication can reduce security risks.</li><li class="ql-align-justify">The landscape of identity management is evolving rapidly.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Identity and Zero Trust</p><p class="ql-align-justify"><strong>02:46 - </strong>The Evolving Landscape of Identity and Access Management</p><p class="ql-align-justify"><strong>06:09 -</strong> Understanding Attack Vectors and Security Gaps</p><p class="ql-align-justify"><strong>09:00 -</strong> Compliance and Regulatory Requirements</p><p class="ql-align-justify"><strong>11:47 - </strong>Quick Wins in Identity and Access Management</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Traditional security models are no longer enough. Identity and Zero Trust have become essential pillars of modern information security strategies. By focusing on “never trust, always verify,” Zero Trust ensures that no user or device is trusted by default—whether inside or outside the network—identity management, meanwhile, safeguards access by verifying who is accessing your systems and data.</p><p class="ql-align-justify">Together, these approaches offer a more robust, adaptive defence against cyber threats, helping organisations protect sensitive information and mitigate risk.</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Chris Steffen, EMA's vice president of research, speaks to Ran Lampert, CEO and co-founder of Infinipoint, about the importance of identity when building your Zero Trust journey.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Identity and device authentication are equally important in Zero Trust.</li><li class="ql-align-justify">Compliance requirements increasingly demand device verification.</li><li class="ql-align-justify">Quick wins in identity management can lead to immediate improvements.</li><li class="ql-align-justify">Gradual implementation of security solutions is key to success.</li><li class="ql-align-justify">Zero Trust is a continuous journey, not a one-time fix.</li><li class="ql-align-justify">Integrating user and device authentication can reduce security risks.</li><li class="ql-align-justify">The landscape of identity management is evolving rapidly.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Identity and Zero Trust</p><p class="ql-align-justify"><strong>02:46 - </strong>The Evolving Landscape of Identity and Access Management</p><p class="ql-align-justify"><strong>06:09 -</strong> Understanding Attack Vectors and Security Gaps</p><p class="ql-align-justify"><strong>09:00 -</strong> Compliance and Regulatory Requirements</p><p class="ql-align-justify"><strong>11:47 - </strong>Quick Wins in Identity and Access Management</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8164bc36-860a-446a-90fc-16ba119c4440</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 10 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/68e4dec0-3e43-42b4-8113-79f915befe8c/THE-SECURITY-STRATEGIST-Infinipoint-MASTER-v2-1-converted.mp3" length="16941532" type="audio/mpeg"/><itunes:duration>17:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season></item><item><title>Infiltration Insights: Red Team Operations</title><itunes:title>Infiltration Insights: Red Team Operations</itunes:title><description><![CDATA[<p class="ql-align-justify">Red teaming is a proactive cybersecurity approach where ethical hackers simulate real-world attacks to test an organisation’s defences. Unlike traditional testing, red teaming mimics sophisticated threats to expose vulnerabilities in networks, systems, and even human factors. This process helps organisations identify weaknesses, strengthen their security posture, and improve their incident response plans to stay ahead of evolving cyber threats.</p><p class="ql-align-justify">An important aspect of red teaming is the interpersonal dynamics between the red team and the organisation’s internal teams. Collaboration and transparent communication are crucial to ensuring the exercise remains productive. Maintaining positive relationships during and after the tests fosters trust and encourages constructive feedback, essential for implementing security improvements without creating internal friction.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Gemma Moore, Co-founder and Director of Cyberis about the role of red teaming in developing detection and response capabilities.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Red teaming involves testing people, processes, and technology.</li><li class="ql-align-justify">Maintaining positive relationships is crucial during red team exercises.</li><li class="ql-align-justify">Non-security stakeholders need actionable insights from red team outputs.</li><li class="ql-align-justify">Informed consent is essential for ethical red team operations.</li><li class="ql-align-justify">Respecting personal boundaries is important in red teaming.</li><li class="ql-align-justify">Building relationships with blue teams fosters a collaborative environment.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Red Teaming and Cybersecurity</p><p class="ql-align-justify"><strong>01:20 - </strong>Understanding Red Teams: Definition and Purpose</p><p class="ql-align-justify"><strong>03:38 - </strong>Interpersonal Dynamics in Red Team Exercises</p><p class="ql-align-justify"><strong>05:58 -</strong> Engaging Non-Security Stakeholders</p><p class="ql-align-justify"><strong>08:43 -</strong> The Importance of Informed Consent</p><p class="ql-align-justify"><strong>12:34 -</strong> Ethical Considerations in Red Teaming</p><p class="ql-align-justify"><strong>17:44 - </strong>Developing Detection and Response Capabilities</p><p><strong>20:53 - </strong>Conclusion and Resources for Further Learning</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Red teaming is a proactive cybersecurity approach where ethical hackers simulate real-world attacks to test an organisation’s defences. Unlike traditional testing, red teaming mimics sophisticated threats to expose vulnerabilities in networks, systems, and even human factors. This process helps organisations identify weaknesses, strengthen their security posture, and improve their incident response plans to stay ahead of evolving cyber threats.</p><p class="ql-align-justify">An important aspect of red teaming is the interpersonal dynamics between the red team and the organisation’s internal teams. Collaboration and transparent communication are crucial to ensuring the exercise remains productive. Maintaining positive relationships during and after the tests fosters trust and encourages constructive feedback, essential for implementing security improvements without creating internal friction.</p><p class="ql-align-justify">In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Gemma Moore, Co-founder and Director of Cyberis about the role of red teaming in developing detection and response capabilities.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Red teaming involves testing people, processes, and technology.</li><li class="ql-align-justify">Maintaining positive relationships is crucial during red team exercises.</li><li class="ql-align-justify">Non-security stakeholders need actionable insights from red team outputs.</li><li class="ql-align-justify">Informed consent is essential for ethical red team operations.</li><li class="ql-align-justify">Respecting personal boundaries is important in red teaming.</li><li class="ql-align-justify">Building relationships with blue teams fosters a collaborative environment.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to Red Teaming and Cybersecurity</p><p class="ql-align-justify"><strong>01:20 - </strong>Understanding Red Teams: Definition and Purpose</p><p class="ql-align-justify"><strong>03:38 - </strong>Interpersonal Dynamics in Red Team Exercises</p><p class="ql-align-justify"><strong>05:58 -</strong> Engaging Non-Security Stakeholders</p><p class="ql-align-justify"><strong>08:43 -</strong> The Importance of Informed Consent</p><p class="ql-align-justify"><strong>12:34 -</strong> Ethical Considerations in Red Teaming</p><p class="ql-align-justify"><strong>17:44 - </strong>Developing Detection and Response Capabilities</p><p><strong>20:53 - </strong>Conclusion and Resources for Further Learning</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">dce468d8-bffe-4d83-8e95-2665a8e7543f</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 09 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c4b25ebb-85b4-4c75-b649-80d0c47602cb/THE-SECURITY-STRATEGIST-Gemma-Moore-MASTER-2-converted.mp3" length="20801701" type="audio/mpeg"/><itunes:duration>21:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season></item><item><title>AI and Data Security: How to Protect What’s Powering the Future</title><itunes:title>AI and Data Security: How to Protect What’s Powering the Future</itunes:title><description><![CDATA[<p>Protecting sensitive data requires a robust approach, with Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) at the forefront. DSPM aligns security policies with data architecture, while DLP prevents unauthorised access and leaks.</p><p>Understanding data classification and custodianship is key to this, as it ensures that sensitive data is prioritised. Integrating AI further strengthens these strategies, offering real-time threat detection and automated protection.</p><p>In this episode, Chris Steffen VP of Research at EMA speaks to Shannon Murphy, Global Security &amp; Risk Strategist at Trend Micro, to discuss data security management.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Data Security Posture Management (DSPM) is essential for visibility.</li><li>Data classification is crucial for effective data security.</li><li>AI can enhance data discovery and classification processes.</li><li>Data custodianship should involve those who understand the data.</li><li>Continuous monitoring is necessary for effective data protection.</li><li>A layered defense approach is necessary against emerging threats.</li><li>Data security is an ongoing process, not a one-time fix.</li></ul><br/><p><strong>Chapters:</strong></p><p><strong>00:00 -</strong>&nbsp;Introduction to Data Security Management</p><p><strong>02:55 -</strong>&nbsp;Understanding DSPM vs DLP</p><p><strong>06:12 -&nbsp;</strong>The Role of AI in Data Security</p><p><strong>08:57 -&nbsp;</strong>Data Classification and Metadata</p><p><strong>11:48 -&nbsp;</strong>Data Custodianship and Responsibility</p><p><strong>15:11 -&nbsp;</strong>Creating a Culture of Security</p><p><strong>17:57 -</strong>&nbsp;The Future of Data Security Strategies</p>]]></description><content:encoded><![CDATA[<p>Protecting sensitive data requires a robust approach, with Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) at the forefront. DSPM aligns security policies with data architecture, while DLP prevents unauthorised access and leaks.</p><p>Understanding data classification and custodianship is key to this, as it ensures that sensitive data is prioritised. Integrating AI further strengthens these strategies, offering real-time threat detection and automated protection.</p><p>In this episode, Chris Steffen VP of Research at EMA speaks to Shannon Murphy, Global Security &amp; Risk Strategist at Trend Micro, to discuss data security management.&nbsp;</p><p><strong>Key Takeaways:</strong></p><ul><li>Data Security Posture Management (DSPM) is essential for visibility.</li><li>Data classification is crucial for effective data security.</li><li>AI can enhance data discovery and classification processes.</li><li>Data custodianship should involve those who understand the data.</li><li>Continuous monitoring is necessary for effective data protection.</li><li>A layered defense approach is necessary against emerging threats.</li><li>Data security is an ongoing process, not a one-time fix.</li></ul><br/><p><strong>Chapters:</strong></p><p><strong>00:00 -</strong>&nbsp;Introduction to Data Security Management</p><p><strong>02:55 -</strong>&nbsp;Understanding DSPM vs DLP</p><p><strong>06:12 -&nbsp;</strong>The Role of AI in Data Security</p><p><strong>08:57 -&nbsp;</strong>Data Classification and Metadata</p><p><strong>11:48 -&nbsp;</strong>Data Custodianship and Responsibility</p><p><strong>15:11 -&nbsp;</strong>Creating a Culture of Security</p><p><strong>17:57 -</strong>&nbsp;The Future of Data Security Strategies</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8acb3a7e-0bb2-4626-84c3-aa9ac7fccb70</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 04 Oct 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f5412342-cd14-4ffd-91b5-5968f37b4e7c/THE-SECURITY-STRATEGIST-Trend-Micro-MASTER-1-converted.mp3" length="20920129" type="audio/mpeg"/><itunes:duration>21:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season></item><item><title>Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys</title><itunes:title>Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys</itunes:title><description><![CDATA[<p>Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evolve, these industries face growing challenges in identifying, disrupting, and preventing their activities.</p><p>According to Sumsub internal research, <a href="https://sumsub.com/newsroom/research-exposes-every-100th-user-of-online-services-involved-in-fraud-network/" rel="noopener noreferrer" target="_blank">every 100th user</a> was involved in fraudulent networks in 2023. The need for robust fraud detection and prevention, from financial institutions to crypto exchanges and online gaming platforms, has never been greater. Understanding the inner workings of fraud networks and how they evolve, is not just crucial but empowering for protecting assets and customers.</p><p>In this episode, Alvaro Garcia, Transaction Monitoring Technical Manager at Sumsub, speaks to Paulina Rios Maya, Head of Industry Relations at EM360, about how to Outsmart the Bad Guys.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><br><ul><li class="ql-align-justify">Fraud networks, or fraud rings, can vary in size and complexity.</li><li class="ql-align-justify">Money mules are often unaware they are part of fraudulent schemes.</li><li class="ql-align-justify">The iGaming industry is particularly vulnerable to bonus abuse.</li><li class="ql-align-justify">A multi-layered approach is essential for effective fraud prevention.</li><li class="ql-align-justify">Ongoing monitoring is crucial to catch fraud after onboarding.</li></ul><br/><br><h2 class="ql-align-justify">Chapters</h2><br><p class="ql-align-justify"><strong>00:00 - </strong>Understanding Fraud Networks</p><p class="ql-align-justify"><strong>05:17 - </strong>Money Muling and Its Impact</p><p class="ql-align-justify"><strong>09:58 - </strong>Proactive Measures in Financial Sector</p><p class="ql-align-justify"><strong>13:43 - </strong>Navigating Risks in the Crypto Sector</p><p class="ql-align-justify"><strong>17:00 - </strong>Creative Tactics of Fraudsters</p><p class="ql-align-justify"><strong>19:50 - </strong>The Role of AI in Fraud Detection</p><p class="ql-align-justify"><strong>23:38 - </strong>Implementing a Multi-Layered Approach</p>]]></description><content:encoded><![CDATA[<p>Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evolve, these industries face growing challenges in identifying, disrupting, and preventing their activities.</p><p>According to Sumsub internal research, <a href="https://sumsub.com/newsroom/research-exposes-every-100th-user-of-online-services-involved-in-fraud-network/" rel="noopener noreferrer" target="_blank">every 100th user</a> was involved in fraudulent networks in 2023. The need for robust fraud detection and prevention, from financial institutions to crypto exchanges and online gaming platforms, has never been greater. Understanding the inner workings of fraud networks and how they evolve, is not just crucial but empowering for protecting assets and customers.</p><p>In this episode, Alvaro Garcia, Transaction Monitoring Technical Manager at Sumsub, speaks to Paulina Rios Maya, Head of Industry Relations at EM360, about how to Outsmart the Bad Guys.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><br><ul><li class="ql-align-justify">Fraud networks, or fraud rings, can vary in size and complexity.</li><li class="ql-align-justify">Money mules are often unaware they are part of fraudulent schemes.</li><li class="ql-align-justify">The iGaming industry is particularly vulnerable to bonus abuse.</li><li class="ql-align-justify">A multi-layered approach is essential for effective fraud prevention.</li><li class="ql-align-justify">Ongoing monitoring is crucial to catch fraud after onboarding.</li></ul><br/><br><h2 class="ql-align-justify">Chapters</h2><br><p class="ql-align-justify"><strong>00:00 - </strong>Understanding Fraud Networks</p><p class="ql-align-justify"><strong>05:17 - </strong>Money Muling and Its Impact</p><p class="ql-align-justify"><strong>09:58 - </strong>Proactive Measures in Financial Sector</p><p class="ql-align-justify"><strong>13:43 - </strong>Navigating Risks in the Crypto Sector</p><p class="ql-align-justify"><strong>17:00 - </strong>Creative Tactics of Fraudsters</p><p class="ql-align-justify"><strong>19:50 - </strong>The Role of AI in Fraud Detection</p><p class="ql-align-justify"><strong>23:38 - </strong>Implementing a Multi-Layered Approach</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">de9f0f22-2a30-4614-aa51-4e57595fb7b5</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 26 Sep 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/40bff6ed-d2cb-4b23-9aea-a02e7d365d8e/THE-SECURITY-STRATEGIST-Sumsub-2-MASTER-v2-1-converted.mp3" length="24819496" type="audio/mpeg"/><itunes:duration>25:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season></item><item><title>Neural Networks at Risk: AI and Cyber Threats</title><itunes:title>Neural Networks at Risk: AI and Cyber Threats</itunes:title><description><![CDATA[<p>New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks and Gen-AI. These advanced AI models, while powerful, are vulnerable to a range of attacks, including adversarial manipulation, data poisoning, and model inversion, where attackers can reverse-engineer sensitive data from the AI’s output. The complexity of neural networks often makes detecting and mitigating these risks difficult, leaving organisations exposed to potential breaches.</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Peter Garraghan, co-founder and CEO (and CTO) of Mindgard, about the importance of understanding these risks, the hidden vulnerabilities in AI systems, and the best practices organisations should implement to ensure security hygiene.</p><p><strong>Key Takeaways:</strong></p><ul><li>AI and generative AI introduce new and evolving cyber threats.</li><li>Understanding AI vulnerabilities is crucial for security teams.</li><li>AI risks manifest in ways that are different but not new.</li><li>Security teams must adapt their strategies to AI's opaqueness.</li><li>AI can be used as a vector for launching attacks.</li><li>Data leakage is a significant risk with AI systems.</li></ul><br/><p><strong>Chapters</strong></p><p><strong>00:00</strong> Introduction to Cybersecurity and AI Risks</p><p><strong>05:13</strong> Understanding AI Vulnerabilities and Cyber Threats</p><p><strong>10:55</strong> Industry-Specific Risks and Threats from AI</p><p><strong>15:54 </strong>Best Practices for AI Security Hygiene</p>]]></description><content:encoded><![CDATA[<p>New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks and Gen-AI. These advanced AI models, while powerful, are vulnerable to a range of attacks, including adversarial manipulation, data poisoning, and model inversion, where attackers can reverse-engineer sensitive data from the AI’s output. The complexity of neural networks often makes detecting and mitigating these risks difficult, leaving organisations exposed to potential breaches.</p><p>In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Peter Garraghan, co-founder and CEO (and CTO) of Mindgard, about the importance of understanding these risks, the hidden vulnerabilities in AI systems, and the best practices organisations should implement to ensure security hygiene.</p><p><strong>Key Takeaways:</strong></p><ul><li>AI and generative AI introduce new and evolving cyber threats.</li><li>Understanding AI vulnerabilities is crucial for security teams.</li><li>AI risks manifest in ways that are different but not new.</li><li>Security teams must adapt their strategies to AI's opaqueness.</li><li>AI can be used as a vector for launching attacks.</li><li>Data leakage is a significant risk with AI systems.</li></ul><br/><p><strong>Chapters</strong></p><p><strong>00:00</strong> Introduction to Cybersecurity and AI Risks</p><p><strong>05:13</strong> Understanding AI Vulnerabilities and Cyber Threats</p><p><strong>10:55</strong> Industry-Specific Risks and Threats from AI</p><p><strong>15:54 </strong>Best Practices for AI Security Hygiene</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f5070014-65e7-44a1-a3bc-1b511b258caa</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 25 Sep 2024 05:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5252dcbc-58bd-4875-8fe4-b843edb1f3cd/THE-SECURITY-STRATEGIST-Peter-MASTER-3-converted.mp3" length="18324304" type="audio/mpeg"/><itunes:duration>19:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season></item><item><title>Authenticating Users with Traditional SSO is Not Enough</title><itunes:title>Authenticating Users with Traditional SSO is Not Enough</itunes:title><description><![CDATA[<p class="ql-align-justify">Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access.&nbsp;</p><p class="ql-align-justify">Infinipoint addresses these vulnerabilities by offering one-click remediation for device security posture checks. This innovative solution ensures that only devices meeting strict security standards can access critical resources, thereby enhancing overall security.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina speaks with Ran Lampert, CEO and Co-founder of Infinipoint, about the weaknesses inherent in conventional access methods.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Traditional workforce access is broken and vulnerable to account takeovers and phishing attacks.</li><li class="ql-align-justify">Zero trust access, which combines user and device authentication, is key to defending sensitive data and resources.</li><li class="ql-align-justify">InfiniPoint provides a solution that prevents MFA fatigue, phishing attacks, and vulnerable device access.</li><li class="ql-align-justify">The platform offers one-click remediation for device security posture checks and allows enterprises to customise checks.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>03:22</strong> <strong>-</strong> The Inception of InfiniPoint</p><p class="ql-align-justify"><strong>04:46 -</strong> The Evolution of Access with COVID-19</p><p class="ql-align-justify"><strong>08:07 -</strong> Vulnerable Devices and Exploitation</p><p class="ql-align-justify"><strong>10:03 -</strong> The Importance of Device Authentication</p><p class="ql-align-justify"><strong>11:02 -</strong> InfiniPoint's Approach to Secure Access</p><p class="ql-align-justify"><strong>14:46 -</strong> Use Cases for InfiniPoint</p><p class="ql-align-justify"><strong>18:36 -</strong> One-Click Remediation and Customization</p><p class="ql-align-justify"><strong>20:00 -</strong> Frictionless Access and Future-Proofing</p><p><strong>21:27 -</strong> Conclusion</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access.&nbsp;</p><p class="ql-align-justify">Infinipoint addresses these vulnerabilities by offering one-click remediation for device security posture checks. This innovative solution ensures that only devices meeting strict security standards can access critical resources, thereby enhancing overall security.&nbsp;</p><p class="ql-align-justify">In this episode, Paulina speaks with Ran Lampert, CEO and Co-founder of Infinipoint, about the weaknesses inherent in conventional access methods.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Traditional workforce access is broken and vulnerable to account takeovers and phishing attacks.</li><li class="ql-align-justify">Zero trust access, which combines user and device authentication, is key to defending sensitive data and resources.</li><li class="ql-align-justify">InfiniPoint provides a solution that prevents MFA fatigue, phishing attacks, and vulnerable device access.</li><li class="ql-align-justify">The platform offers one-click remediation for device security posture checks and allows enterprises to customise checks.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>03:22</strong> <strong>-</strong> The Inception of InfiniPoint</p><p class="ql-align-justify"><strong>04:46 -</strong> The Evolution of Access with COVID-19</p><p class="ql-align-justify"><strong>08:07 -</strong> Vulnerable Devices and Exploitation</p><p class="ql-align-justify"><strong>10:03 -</strong> The Importance of Device Authentication</p><p class="ql-align-justify"><strong>11:02 -</strong> InfiniPoint's Approach to Secure Access</p><p class="ql-align-justify"><strong>14:46 -</strong> Use Cases for InfiniPoint</p><p class="ql-align-justify"><strong>18:36 -</strong> One-Click Remediation and Customization</p><p class="ql-align-justify"><strong>20:00 -</strong> Frictionless Access and Future-Proofing</p><p><strong>21:27 -</strong> Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">072cd163-b3f8-4d3a-9de9-451179eab6cf</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 20 Sep 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/260123f1-18f7-4230-86a0-8c4eb11cccd3/SECURITY-STRATEGIST-Infinipoint-MASTER-v3-converted.mp3" length="20876761" type="audio/mpeg"/><itunes:duration>21:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season></item><item><title>SCION: The Future of Critical Infrastructure Defence</title><itunes:title>SCION: The Future of Critical Infrastructure Defence</itunes:title><description><![CDATA[<p class="ql-align-justify">As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up with the increasingly sophisticated threats targeting critical networks in sectors like utilities and finance. To address these challenges, there is a pressing need for a new approach to Internet security that can create secure, isolated environments within the existing Internet infrastructure.</p><p class="ql-align-justify">SCION offers a groundbreaking solution by upgrading the traditional border gateway protocol router, enabling the creation of isolation domains. These isolated networks enhance security by preventing unauthorised access and minimising potential points of failure. As more infrastructure providers adopt SCION, its possible applications in critical sectors promise everyone a safer, more resilient internet.</p><p class="ql-align-justify">In this episode, Richard Stiennon, Senior Chief Research Analyst at IT-Harvest, speaks to Martin Bosshardt, CEO of Anapaya, about cyber breaches and solutions like SCION.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">The increasing number of connected devices and IoT is driving a rise in cyber breaches, making defence more challenging.</li><li class="ql-align-justify">SCION offers a new approach to internet security by creating isolation domains within the existing internet infrastructure.</li><li class="ql-align-justify">SCION allows for the secure and isolated operation of critical applications in sectors like utilities and finance.</li><li class="ql-align-justify">The adoption of SCION by infrastructure providers and organisations holds the potential to significantly enhance internet security. By creating secure, isolated environments within the existing Internet infrastructure, SCION can effectively protect against nation-state attackers and other threats, making the internet a safer place for all.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to IT Harvest and Anapaya</p><p class="ql-align-justify"><strong>00:57 - </strong>Understanding Recent Cyber Breaches</p><p class="ql-align-justify"><strong>02:23 -</strong> The Vulnerability of Connected Devices and IoT</p><p class="ql-align-justify"><strong>03:45 -</strong> SCION: A New Approach to Internet Security</p><p class="ql-align-justify"><strong>05:36 -</strong> Creating Isolation Domains with SCION</p><p class="ql-align-justify"><strong>08:55 -</strong> Adoption of SCION and its Potential Applications</p><p class="ql-align-justify"><strong>13:13 - </strong>Getting Started with SCION</p><p class="ql-align-justify"><strong>15:09 -</strong> SCION vs. Other Solutions for Internet Security</p><p><strong>17:05 -</strong> Conclusion and Call to Action</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up with the increasingly sophisticated threats targeting critical networks in sectors like utilities and finance. To address these challenges, there is a pressing need for a new approach to Internet security that can create secure, isolated environments within the existing Internet infrastructure.</p><p class="ql-align-justify">SCION offers a groundbreaking solution by upgrading the traditional border gateway protocol router, enabling the creation of isolation domains. These isolated networks enhance security by preventing unauthorised access and minimising potential points of failure. As more infrastructure providers adopt SCION, its possible applications in critical sectors promise everyone a safer, more resilient internet.</p><p class="ql-align-justify">In this episode, Richard Stiennon, Senior Chief Research Analyst at IT-Harvest, speaks to Martin Bosshardt, CEO of Anapaya, about cyber breaches and solutions like SCION.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">The increasing number of connected devices and IoT is driving a rise in cyber breaches, making defence more challenging.</li><li class="ql-align-justify">SCION offers a new approach to internet security by creating isolation domains within the existing internet infrastructure.</li><li class="ql-align-justify">SCION allows for the secure and isolated operation of critical applications in sectors like utilities and finance.</li><li class="ql-align-justify">The adoption of SCION by infrastructure providers and organisations holds the potential to significantly enhance internet security. By creating secure, isolated environments within the existing Internet infrastructure, SCION can effectively protect against nation-state attackers and other threats, making the internet a safer place for all.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to IT Harvest and Anapaya</p><p class="ql-align-justify"><strong>00:57 - </strong>Understanding Recent Cyber Breaches</p><p class="ql-align-justify"><strong>02:23 -</strong> The Vulnerability of Connected Devices and IoT</p><p class="ql-align-justify"><strong>03:45 -</strong> SCION: A New Approach to Internet Security</p><p class="ql-align-justify"><strong>05:36 -</strong> Creating Isolation Domains with SCION</p><p class="ql-align-justify"><strong>08:55 -</strong> Adoption of SCION and its Potential Applications</p><p class="ql-align-justify"><strong>13:13 - </strong>Getting Started with SCION</p><p class="ql-align-justify"><strong>15:09 -</strong> SCION vs. Other Solutions for Internet Security</p><p><strong>17:05 -</strong> Conclusion and Call to Action</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e5592c42-8629-47f5-ad30-8074dc88e2d3</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 17 Sep 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/413a6599-e812-4124-b010-b1b130a687d3/THE-SECURITY-STRATEGIST-Anapaya-MASTER-v2-converted.mp3" length="16801837" type="audio/mpeg"/><itunes:duration>17:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season></item><item><title>How is Proactive CDR Revolutionising Cloud Security</title><itunes:title>How is Proactive CDR Revolutionising Cloud Security</itunes:title><description><![CDATA[<p class="ql-align-justify">As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the complexity of modern infrastructures and cyber threats. Traditional security measures often fail to identify and respond to sophisticated cloud-based attacks, leaving businesses vulnerable to breaches, data loss, and service disruptions.</p><p class="ql-align-justify">Skyhawk addresses these challenges with its cutting-edge autonomous purple team approach. By combining AI-based red teaming with continuous detection and response capabilities, Skyhawk’s solution proactively identifies and mitigates cloud threats before they cause harm. This advanced strategy ensures that organisations can maintain robust cloud security while keeping pace with the dynamic threat landscape, enabling faster, more effective threat responses with minimal manual intervention.</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Paulina Rios Maya, Head of Industry Relations at EM360Tech, speaks to Chen Burshan, CEO of Skyhawk Security, to discuss Cloud Threat Detection and Response and how proactivity is always better than reactivity.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Cloud threat detection and response (CDR) solutions are in high demand due to the growing attack surface and non-patchable attacks in cloud environments.</li><li class="ql-align-justify">The challenges of current CDR technologies include the overwhelming volume of alerts, the difficulty in analysing and correlating different indications of compromise, and the lack of automated response capabilities.</li><li class="ql-align-justify">Skyhawk's CDR solution reduces noise and increases the accuracy of alerts by aggregating and correlating relevant indicators of compromise. It also enables proactive threat detection and response through simulated attacks and pre-verified automation.</li><li class="ql-align-justify">Skyhawk's solution's advantages include reducing alert fatigue, increasing alert accuracy, enabling effective automation, and providing a proactive defense against potential attacks.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Overview of Skyhawk Security</p><p class="ql-align-justify"><strong>01:51 - </strong>The Growing Demand for Cloud Threat Detection</p><p class="ql-align-justify"><strong>04:10 - </strong>Challenges of Current CDR Technologies</p><p class="ql-align-justify"><strong>06:01 - </strong>Skyhawk's Proactive Approach to Cloud Threat Detection</p><p class="ql-align-justify"><strong>08:55 - </strong>Advantages of Skyhawk's CDR Solution</p><p class="ql-align-justify"><strong>11:14 - </strong>The Time Machine Perspective and Pre-Verified Detection</p><p class="ql-align-justify"><strong>13:03 - </strong>Utilizing Skyhawk's CDR Solution for Enhanced Cybersecurity</p><p><strong>15:29 - </strong>Conclusion and Call to Action</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the complexity of modern infrastructures and cyber threats. Traditional security measures often fail to identify and respond to sophisticated cloud-based attacks, leaving businesses vulnerable to breaches, data loss, and service disruptions.</p><p class="ql-align-justify">Skyhawk addresses these challenges with its cutting-edge autonomous purple team approach. By combining AI-based red teaming with continuous detection and response capabilities, Skyhawk’s solution proactively identifies and mitigates cloud threats before they cause harm. This advanced strategy ensures that organisations can maintain robust cloud security while keeping pace with the dynamic threat landscape, enabling faster, more effective threat responses with minimal manual intervention.</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Paulina Rios Maya, Head of Industry Relations at EM360Tech, speaks to Chen Burshan, CEO of Skyhawk Security, to discuss Cloud Threat Detection and Response and how proactivity is always better than reactivity.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Cloud threat detection and response (CDR) solutions are in high demand due to the growing attack surface and non-patchable attacks in cloud environments.</li><li class="ql-align-justify">The challenges of current CDR technologies include the overwhelming volume of alerts, the difficulty in analysing and correlating different indications of compromise, and the lack of automated response capabilities.</li><li class="ql-align-justify">Skyhawk's CDR solution reduces noise and increases the accuracy of alerts by aggregating and correlating relevant indicators of compromise. It also enables proactive threat detection and response through simulated attacks and pre-verified automation.</li><li class="ql-align-justify">Skyhawk's solution's advantages include reducing alert fatigue, increasing alert accuracy, enabling effective automation, and providing a proactive defense against potential attacks.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Overview of Skyhawk Security</p><p class="ql-align-justify"><strong>01:51 - </strong>The Growing Demand for Cloud Threat Detection</p><p class="ql-align-justify"><strong>04:10 - </strong>Challenges of Current CDR Technologies</p><p class="ql-align-justify"><strong>06:01 - </strong>Skyhawk's Proactive Approach to Cloud Threat Detection</p><p class="ql-align-justify"><strong>08:55 - </strong>Advantages of Skyhawk's CDR Solution</p><p class="ql-align-justify"><strong>11:14 - </strong>The Time Machine Perspective and Pre-Verified Detection</p><p class="ql-align-justify"><strong>13:03 - </strong>Utilizing Skyhawk's CDR Solution for Enhanced Cybersecurity</p><p><strong>15:29 - </strong>Conclusion and Call to Action</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4096d39e-b378-4c6d-91a9-8d013b3c7400</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 16 Sep 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d6d09b78-2e30-45ab-b687-7e8cdcce72d8/THE-SECURITY-STRATEGIST-Skyhawk-Security-MASTER-1-converted.mp3" length="15525816" type="audio/mpeg"/><itunes:duration>16:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season></item><item><title>Defend Like a Pro: Comprehensive Threat Detection &amp; Response with Proactive Risk Management</title><itunes:title>Defend Like a Pro: Comprehensive Threat Detection &amp; Response with Proactive Risk Management</itunes:title><description><![CDATA[<p>Critical Start&amp;#39;s Managed Detection and Response (MDR) service is designed to provide</p><p>24x7x365 monitoring, human-driven threat investigation, and flexible deployment across</p><p>IT and OT environments.</p><p>By leveraging deep technical expertise, robust API integrations, and contractual SLAs,</p><p>they offer comprehensive protection against evolving cyber threats.</p><p>Critical Start tackles attack vectors such as phishing, brute force attacks, and</p><p>vulnerability exploitation by combining advanced threat detection &amp;amp; response, incident</p><p>response, and proactive risk management.</p><p>These capabilities empower organizations to continuously map, monitor, and mitigate</p><p>threats, vulnerabilities, and risks—enhancing security posture.</p><p>In this episode, Paulina Rios Maya of EM360Tech interviews Tim Bandos, Field CISO</p><p>at Critical Start, about the skills needed for a SOC team and how an MDR provider</p><p>helps organizations reduce risks and improve cybersecurity resilience.</p><p>Key Takeaways:</p><ul><li>Implement comprehensive monitoring and deep visibility into endpoints to enhance SOC capabilities.</li><li>Critical Start’s MDR service offers 24x7x365 monitoring, threat intelligence, and endpoint protection.</li><li>Ensure SOCs receive expected signals by monitoring endpoint security gaps and log ingestion failures</li><li>Leverage lessons from ongoing MDR operations by mapping telemetry to the MITRE ATT&amp;amp; CK® framework and deploying proactive mitigations to reduce long- term risk.</li></ul><br/><p><strong>Chapters:</strong></p><p>00:00 - Skills Needed for a SOC Team</p><p>05:05 - Deliverables of a Managed Detection and Response Service</p><p>07:21 - Common Entrance Vectors of Attack</p><p>10:37 - Proactive Defense Strategies</p><p>11:06 - Ensuring Expected Signals</p><p>12:31 - Endpoint Protection and Security Software</p><p>15:37 - Using Data and Lessons from MDR Operation</p>]]></description><content:encoded><![CDATA[<p>Critical Start&amp;#39;s Managed Detection and Response (MDR) service is designed to provide</p><p>24x7x365 monitoring, human-driven threat investigation, and flexible deployment across</p><p>IT and OT environments.</p><p>By leveraging deep technical expertise, robust API integrations, and contractual SLAs,</p><p>they offer comprehensive protection against evolving cyber threats.</p><p>Critical Start tackles attack vectors such as phishing, brute force attacks, and</p><p>vulnerability exploitation by combining advanced threat detection &amp;amp; response, incident</p><p>response, and proactive risk management.</p><p>These capabilities empower organizations to continuously map, monitor, and mitigate</p><p>threats, vulnerabilities, and risks—enhancing security posture.</p><p>In this episode, Paulina Rios Maya of EM360Tech interviews Tim Bandos, Field CISO</p><p>at Critical Start, about the skills needed for a SOC team and how an MDR provider</p><p>helps organizations reduce risks and improve cybersecurity resilience.</p><p>Key Takeaways:</p><ul><li>Implement comprehensive monitoring and deep visibility into endpoints to enhance SOC capabilities.</li><li>Critical Start’s MDR service offers 24x7x365 monitoring, threat intelligence, and endpoint protection.</li><li>Ensure SOCs receive expected signals by monitoring endpoint security gaps and log ingestion failures</li><li>Leverage lessons from ongoing MDR operations by mapping telemetry to the MITRE ATT&amp;amp; CK® framework and deploying proactive mitigations to reduce long- term risk.</li></ul><br/><p><strong>Chapters:</strong></p><p>00:00 - Skills Needed for a SOC Team</p><p>05:05 - Deliverables of a Managed Detection and Response Service</p><p>07:21 - Common Entrance Vectors of Attack</p><p>10:37 - Proactive Defense Strategies</p><p>11:06 - Ensuring Expected Signals</p><p>12:31 - Endpoint Protection and Security Software</p><p>15:37 - Using Data and Lessons from MDR Operation</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">43f01fd5-f636-4d3a-bd48-48f79abb0098</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 11 Sep 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/db8749c8-812b-42d1-8317-4cdae2701de3/THE-SECURITY-STRATEGIST-Critical-Start-MASTER-1-converted.mp3" length="17991118" type="audio/mpeg"/><itunes:duration>18:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season></item><item><title>Cutting Through the Noise: Redefining Detection and Response With Secureworks</title><itunes:title>Cutting Through the Noise: Redefining Detection and Response With Secureworks</itunes:title><description><![CDATA[<p class="ql-align-justify">When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies?&nbsp;</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Chris Steffen, EMA's Vice President of Research, speaks to Kyle Falkenhagen, Secureworks’ Chief Product Officer, to discuss how organizations are investing in extended detection and response solutions as a comprehensive approach to cybersecurity.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">XDR (Extended Detection and Response) is a comprehensive approach that combines proactive risk reduction with reactive response. But not all solutions are equal, and it’s important to understand the distinction between basic and robust response.</li><li class="ql-align-justify">Identity plays a critical role in cybersecurity, with many breaches having an identity component. Organizations should focus on securing their identity environment and detecting and responding to identity-based threats.</li><li class="ql-align-justify">Balancing proactive security measures with traditional detection and response is vital for improving security posture. Organizations should look for security partners that can provide reactive and proactive capabilities.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>02:48 - </strong>The Role of Response in XDR</p><p class="ql-align-justify"><strong>08:50 - </strong>Balancing Proactive Security and Detection &amp; Response</p><p class="ql-align-justify"><strong>11:03 - </strong>The Significance of Identity in Cybersecurity</p><p class="ql-align-justify"><strong>18:51 - </strong>Integrating Threat and Exposure Data for Better Security Posture</p><p><strong>23:23 - </strong>Conclusion</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies?&nbsp;</p><p class="ql-align-justify">In this episode of the EM360 Podcast, Chris Steffen, EMA's Vice President of Research, speaks to Kyle Falkenhagen, Secureworks’ Chief Product Officer, to discuss how organizations are investing in extended detection and response solutions as a comprehensive approach to cybersecurity.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">XDR (Extended Detection and Response) is a comprehensive approach that combines proactive risk reduction with reactive response. But not all solutions are equal, and it’s important to understand the distinction between basic and robust response.</li><li class="ql-align-justify">Identity plays a critical role in cybersecurity, with many breaches having an identity component. Organizations should focus on securing their identity environment and detecting and responding to identity-based threats.</li><li class="ql-align-justify">Balancing proactive security measures with traditional detection and response is vital for improving security posture. Organizations should look for security partners that can provide reactive and proactive capabilities.</li></ul><br/><br><p class="ql-align-justify"><strong>Chapters:&nbsp;</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>02:48 - </strong>The Role of Response in XDR</p><p class="ql-align-justify"><strong>08:50 - </strong>Balancing Proactive Security and Detection &amp; Response</p><p class="ql-align-justify"><strong>11:03 - </strong>The Significance of Identity in Cybersecurity</p><p class="ql-align-justify"><strong>18:51 - </strong>Integrating Threat and Exposure Data for Better Security Posture</p><p><strong>23:23 - </strong>Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d02000ab-7a80-4f65-b463-4381a8ca0fa9</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 04 Sep 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/66e59cc9-5be7-4c88-9f37-20a41e478226/THE-SECURITY-STRATEGIST-Secureworks-MASTER-1-converted.mp3" length="22533085" type="audio/mpeg"/><itunes:duration>23:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season></item><item><title>What Would 1% Do to Your Business: ML for Optimal Security Strategies</title><itunes:title>What Would 1% Do to Your Business: ML for Optimal Security Strategies</itunes:title><description><![CDATA[<p class="ql-align-justify">Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats.&nbsp;</p><p class="ql-align-justify">Embrace a dynamic approach to security that adapts to evolving risk profiles. ML optimises your security investments and ensures that measures are tailored to specific threats, enhancing protection and efficiency.&nbsp;</p><p class="ql-align-justify">In this episode of the Security Strategist, Chris Steffen, EMA's VP of research, speaks to Brady Harrison, Kount's Director of Customer Analytics Solution Delivery, to discuss maximising value through optimal security strategies.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Finding a balance between fraud prevention and sales generation is crucial for optimising security strategies.</li><li class="ql-align-justify">Machine learning can help businesses make informed, risk-based decisions by analysing large volumes of data in real-time.</li><li class="ql-align-justify">Optimising security investments involves evaluating the cost-benefit trade-offs and setting appropriate risk thresholds.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to the Security Strategist podcast</p><p class="ql-align-justify"><strong>00:25 -</strong> Introduction to Kount and its focus on customer analytics and fraud prevention</p><p class="ql-align-justify"><strong>01:49 -</strong> Differences between EU and US security strategies</p><p class="ql-align-justify"><strong>05:12 -</strong> Balancing fraud prevention and sales conversion</p><p class="ql-align-justify"><strong>08:59 -</strong> Optimizing security investments with machine learning</p><p class="ql-align-justify"><strong>14:43 -</strong> Advantages of machine learning in security</p><p class="ql-align-justify"><strong>18:31 -</strong> Setting security strategy based on machine learning</p><p class="ql-align-justify"><strong>23:47 -</strong> Treating customers as good until proven otherwise</p><p><strong>25:11 -</strong> Conclusion and call to action</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats.&nbsp;</p><p class="ql-align-justify">Embrace a dynamic approach to security that adapts to evolving risk profiles. ML optimises your security investments and ensures that measures are tailored to specific threats, enhancing protection and efficiency.&nbsp;</p><p class="ql-align-justify">In this episode of the Security Strategist, Chris Steffen, EMA's VP of research, speaks to Brady Harrison, Kount's Director of Customer Analytics Solution Delivery, to discuss maximising value through optimal security strategies.</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Finding a balance between fraud prevention and sales generation is crucial for optimising security strategies.</li><li class="ql-align-justify">Machine learning can help businesses make informed, risk-based decisions by analysing large volumes of data in real-time.</li><li class="ql-align-justify">Optimising security investments involves evaluating the cost-benefit trade-offs and setting appropriate risk thresholds.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction to the Security Strategist podcast</p><p class="ql-align-justify"><strong>00:25 -</strong> Introduction to Kount and its focus on customer analytics and fraud prevention</p><p class="ql-align-justify"><strong>01:49 -</strong> Differences between EU and US security strategies</p><p class="ql-align-justify"><strong>05:12 -</strong> Balancing fraud prevention and sales conversion</p><p class="ql-align-justify"><strong>08:59 -</strong> Optimizing security investments with machine learning</p><p class="ql-align-justify"><strong>14:43 -</strong> Advantages of machine learning in security</p><p class="ql-align-justify"><strong>18:31 -</strong> Setting security strategy based on machine learning</p><p class="ql-align-justify"><strong>23:47 -</strong> Treating customers as good until proven otherwise</p><p><strong>25:11 -</strong> Conclusion and call to action</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">53498a2c-ce3c-4493-95fb-0e0832efd68a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 23 Aug 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f9c4dc67-6bb7-45d3-b12d-f7416b4102e8/THE-SECURITY-STRATEGIST-Kount-MASTER-1-converted.mp3" length="24514669" type="audio/mpeg"/><itunes:duration>25:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season></item><item><title>Rethinking Security in the Age of Zero Trust</title><itunes:title>Rethinking Security in the Age of Zero Trust</itunes:title><description><![CDATA[<p class="ql-align-justify">In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight the need for a new approach.</p><p class="ql-align-justify">Explore the critical components of Zero Trust, including explicit verification, least privilege access, continuous monitoring, and adaptive policies. Discover how shifting to a Zero Trust framework can better protect your organisation in today’s complex and evolving landscape.&nbsp;</p><p class="ql-align-justify">In this episode of The Security Strategist, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, speaks to Alejandro Leal, Analyst at KuppingerCole, about why evolving your security strategy is essential for staying secure and resilient.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">A layered approach to user, application, device, and network security is crucial for comprehensive protection, reducing the overall attack surface and focusing on newer threats.</li><li class="ql-align-justify">Common user vulnerabilities include weak authentication, insider threats, privilege escalation, misconfigured access controls, and unpatched vulnerabilities.</li><li class="ql-align-justify">Organisations can better protect against these risks at the identity level by implementing risk assessment procedures, enforcing strong password policies, monitoring user behaviour for anomalies, and providing context-based employee training.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction and Challenges of Perimeter-Based Approach</p><p>05:09 Zero Trust: Critical Components and Differences</p><p>09:55 The Importance of a Layered Approach to Security</p><p>13:15 Common Vulnerabilities Associated with Users</p><p>18:04 Protecting Against Risks at the Identity Level</p><p>21:26 Translating the Zero Trust Philosophy into Actionable Steps with Managed Engine</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight the need for a new approach.</p><p class="ql-align-justify">Explore the critical components of Zero Trust, including explicit verification, least privilege access, continuous monitoring, and adaptive policies. Discover how shifting to a Zero Trust framework can better protect your organisation in today’s complex and evolving landscape.&nbsp;</p><p class="ql-align-justify">In this episode of The Security Strategist, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, speaks to Alejandro Leal, Analyst at KuppingerCole, about why evolving your security strategy is essential for staying secure and resilient.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">A layered approach to user, application, device, and network security is crucial for comprehensive protection, reducing the overall attack surface and focusing on newer threats.</li><li class="ql-align-justify">Common user vulnerabilities include weak authentication, insider threats, privilege escalation, misconfigured access controls, and unpatched vulnerabilities.</li><li class="ql-align-justify">Organisations can better protect against these risks at the identity level by implementing risk assessment procedures, enforcing strong password policies, monitoring user behaviour for anomalies, and providing context-based employee training.</li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction and Challenges of Perimeter-Based Approach</p><p>05:09 Zero Trust: Critical Components and Differences</p><p>09:55 The Importance of a Layered Approach to Security</p><p>13:15 Common Vulnerabilities Associated with Users</p><p>18:04 Protecting Against Risks at the Identity Level</p><p>21:26 Translating the Zero Trust Philosophy into Actionable Steps with Managed Engine</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">58125970-e835-4055-bd5e-118d39e579f6</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 21 Aug 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/b7b2dfff-7630-47ae-a7b6-1d9817f70b6c/THE-SECURITY-STRATEGIST-ManageEngine-MASTER-converted.mp3" length="24831172" type="audio/mpeg"/><itunes:duration>25:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season></item><item><title>Zero Trust Security: Mastering the Weakest Link</title><itunes:title>Zero Trust Security: Mastering the Weakest Link</itunes:title><description><![CDATA[<p class="ql-align-justify">Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This model helps prevent breaches and limits the spread of threats within a network.</p><p class="ql-align-justify">While transitioning to Zero Trust can be challenging, it can be implemented gradually without disrupting existing systems. Future advancements may include a software bill of materials to verify the integrity of the code used within the network.</p><p class="ql-align-justify">In this episode, William Malik, advisor at Lionfish Tech, speaks to Paulina Rios Maya, Head of Industry Relations at EM360, about Zero Trust architecture, security breaches and network segmentation.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Zero Trust architecture eliminates the concept of a perimeter and focuses on network segmentation and granular access control.</li><li class="ql-align-justify">Transitioning to the Zero Trust model can be done incrementally without disrupting the entire environment.</li><li class="ql-align-justify">The future of Zero Trust security may involve implementing a software bill of materials to ensure the veracity of the code being used.</li></ul><br/><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Zero Trust Architecture</p><p class="ql-align-justify"><strong>02:23 -</strong> The Importance of Network Segmentation</p><p class="ql-align-justify"><strong>04:45 - </strong>Transitioning to Zero Trust</p><p><strong>13:25 -</strong> The Future of Zero Trust</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This model helps prevent breaches and limits the spread of threats within a network.</p><p class="ql-align-justify">While transitioning to Zero Trust can be challenging, it can be implemented gradually without disrupting existing systems. Future advancements may include a software bill of materials to verify the integrity of the code used within the network.</p><p class="ql-align-justify">In this episode, William Malik, advisor at Lionfish Tech, speaks to Paulina Rios Maya, Head of Industry Relations at EM360, about Zero Trust architecture, security breaches and network segmentation.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Zero Trust architecture eliminates the concept of a perimeter and focuses on network segmentation and granular access control.</li><li class="ql-align-justify">Transitioning to the Zero Trust model can be done incrementally without disrupting the entire environment.</li><li class="ql-align-justify">The future of Zero Trust security may involve implementing a software bill of materials to ensure the veracity of the code being used.</li></ul><br/><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction to Zero Trust Architecture</p><p class="ql-align-justify"><strong>02:23 -</strong> The Importance of Network Segmentation</p><p class="ql-align-justify"><strong>04:45 - </strong>Transitioning to Zero Trust</p><p><strong>13:25 -</strong> The Future of Zero Trust</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">bcf81272-e077-42e1-be19-69fc18288188</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 14 Aug 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/6f3e212f-718f-430d-913f-c45f53dba5ce/THESECURITY-STRATEGIST-William-Malik-MASTER-converted.mp3" length="15052104" type="audio/mpeg"/><itunes:duration>15:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season></item><item><title>Automated Network Pentesting: Your Secret Weapon in Cybersecurity</title><itunes:title>Automated Network Pentesting: Your Secret Weapon in Cybersecurity</itunes:title><description><![CDATA[<p>Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. That’s where automated network testing comes in! It’s like having a tactical SWAT team on standby, ready to spot exploitable vulnerabilities and provide you with remediation tactics whenever you need them.</p><p>You will be able to quickly uncover weaknesses before the bad guys can exploit them. These real-world attack simulations can be run on a weekly, monthly, or quarterly basis, giving you the upper hand in bolstering your security posture.</p><p class="ql-align-justify">In our latest podcast, join Richard Stiennon, Chief Research Analyst at IT-Harvest, and Alton Johnson, Founder of Vonahi Security, as they dive into why automated network pen testing is the answer to securing your network against cyber threats year-round.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Pen testing is an essential part of cybersecurity, helping organisations identify vulnerabilities and improve their security posture.</li><li class="ql-align-justify">Automated network pen testing simplifies the process and makes it more affordable and accessible for MSPs and organisations.</li><li class="ql-align-justify">The future of pen testing involves more automation and integration with AI, with pen testers focusing on coding and web app testing.</li></ul><br/><h2 class="ql-align-justify">Chapters:</h2><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>02:19 - </strong>Frustrations with Pen Testing Companies</p><p class="ql-align-justify"><strong>07:04 - </strong>Simplifying Pen Testing for MSPs</p><p class="ql-align-justify"><strong>13:39 - </strong>Acceptance of Automated Pen Testing</p><p class="ql-align-justify"><strong>15:04 - </strong>The Future of Pen Testing</p><p class="ql-align-justify"><strong>19:20 - </strong>Conclusion</p>]]></description><content:encoded><![CDATA[<p>Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. That’s where automated network testing comes in! It’s like having a tactical SWAT team on standby, ready to spot exploitable vulnerabilities and provide you with remediation tactics whenever you need them.</p><p>You will be able to quickly uncover weaknesses before the bad guys can exploit them. These real-world attack simulations can be run on a weekly, monthly, or quarterly basis, giving you the upper hand in bolstering your security posture.</p><p class="ql-align-justify">In our latest podcast, join Richard Stiennon, Chief Research Analyst at IT-Harvest, and Alton Johnson, Founder of Vonahi Security, as they dive into why automated network pen testing is the answer to securing your network against cyber threats year-round.</p><p class="ql-align-justify"><strong>Key Takeaways:&nbsp;</strong></p><ul><li class="ql-align-justify">Pen testing is an essential part of cybersecurity, helping organisations identify vulnerabilities and improve their security posture.</li><li class="ql-align-justify">Automated network pen testing simplifies the process and makes it more affordable and accessible for MSPs and organisations.</li><li class="ql-align-justify">The future of pen testing involves more automation and integration with AI, with pen testers focusing on coding and web app testing.</li></ul><br/><h2 class="ql-align-justify">Chapters:</h2><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Background</p><p class="ql-align-justify"><strong>02:19 - </strong>Frustrations with Pen Testing Companies</p><p class="ql-align-justify"><strong>07:04 - </strong>Simplifying Pen Testing for MSPs</p><p class="ql-align-justify"><strong>13:39 - </strong>Acceptance of Automated Pen Testing</p><p class="ql-align-justify"><strong>15:04 - </strong>The Future of Pen Testing</p><p class="ql-align-justify"><strong>19:20 - </strong>Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">08d2aa72-93ab-4491-bde3-aa5408b99006</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 09 Aug 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0758ccf4-1ef1-4540-b04c-2595b813f4a5/THE-SECURITY-STRATEGIST-Vonahi-Security-MASTER-1-converted.mp3" length="19335112" type="audio/mpeg"/><itunes:duration>20:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode></item><item><title>Cybersecurity Automation: Cutting Through the Manual Clutter</title><itunes:title>Cybersecurity Automation: Cutting Through the Manual Clutter</itunes:title><description><![CDATA[<p class="ql-align-justify">In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods are time-consuming and error-prone and struggle to scale with the growing volume of threat sophistication.&nbsp;</p><p class="ql-align-justify">Automation, particularly in Software Composition Analysis (SCA), is a beacon of hope in the face of these challenges. It brings relief by streamlining the identification and response to security threats, providing a more efficient and effective solution.&nbsp;</p><p class="ql-align-justify">In this podcast, Chris Lindsey, application security evangelist for Mend.io., and Richard Stiennon, Chief Research Analyst at IT-Harvest, discuss how SCA tools can help identify vulnerabilities and the benefits of dependency automation.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Manual processes in application security are inefficient and cannot keep up with the speed of innovation.</li><li class="ql-align-justify">Upgrading dependencies is crucial to address security vulnerabilities and reduce security debt.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction and Background</p><p class="ql-align-justify"><strong>02:23 -</strong> The Limitations of Manual Processes in Application Security</p><p class="ql-align-justify"><strong>06:40 -</strong> The Role of Software Composition Analysis in Identifying Security Threats</p><p class="ql-align-justify"><strong>10:02 -</strong> The Importance of Upgrading Dependencies in Application Security</p><p class="ql-align-justify"><strong>13:44 -</strong> Integrating Automation into the CI/CD Pipeline for Application Security</p><p class="ql-align-justify"><strong>21:05 -</strong> MEND.IO: Scalable and Comprehensive Security Solutions</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods are time-consuming and error-prone and struggle to scale with the growing volume of threat sophistication.&nbsp;</p><p class="ql-align-justify">Automation, particularly in Software Composition Analysis (SCA), is a beacon of hope in the face of these challenges. It brings relief by streamlining the identification and response to security threats, providing a more efficient and effective solution.&nbsp;</p><p class="ql-align-justify">In this podcast, Chris Lindsey, application security evangelist for Mend.io., and Richard Stiennon, Chief Research Analyst at IT-Harvest, discuss how SCA tools can help identify vulnerabilities and the benefits of dependency automation.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Manual processes in application security are inefficient and cannot keep up with the speed of innovation.</li><li class="ql-align-justify">Upgrading dependencies is crucial to address security vulnerabilities and reduce security debt.</li></ul><br/><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction and Background</p><p class="ql-align-justify"><strong>02:23 -</strong> The Limitations of Manual Processes in Application Security</p><p class="ql-align-justify"><strong>06:40 -</strong> The Role of Software Composition Analysis in Identifying Security Threats</p><p class="ql-align-justify"><strong>10:02 -</strong> The Importance of Upgrading Dependencies in Application Security</p><p class="ql-align-justify"><strong>13:44 -</strong> Integrating Automation into the CI/CD Pipeline for Application Security</p><p class="ql-align-justify"><strong>21:05 -</strong> MEND.IO: Scalable and Comprehensive Security Solutions</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">524911e9-f157-4402-8ff4-c1bb5188b55c</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 05 Aug 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/48fdd0fc-a2e8-41b7-9569-04e62ebe57b7/THE-SECURITY-STRATEGIST-Mend-IO-MASTER-1-converted.mp3" length="22849588" type="audio/mpeg"/><itunes:duration>23:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season></item><item><title>Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance</title><itunes:title>Understanding PCI DSS 4.0, NIS2, and DORA Cybersecurity Compliance</itunes:title><description><![CDATA[<p class="ql-align-justify"><strong>Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives Explained</strong></p><p class="ql-align-justify"><br></p><p class="ql-align-justify">Compliance with cybersecurity standards is essential for any organisation to protect sensitive information, maintain customer trust, and mitigate the risks associated with data breaches and cyber threats. Adhering to recognized frameworks and regulations, not only safeguards the integrity, confidentiality, and availability of data but also demonstrates a proactive commitment to security best practices.&nbsp;</p><p class="ql-align-justify">Join Chris Steffen and Uri Dorot, Senior Product Marketing Manager at Radware, as they delve into the critical aspects of compliance with cybersecurity standards.&nbsp;</p><p class="ql-align-justify"><strong>Themes</strong></p><ul><li class="ql-align-justify">Compliance</li><li class="ql-align-justify">PCI DSS 4.0&nbsp;</li><li class="ql-align-justify">NIS2&nbsp;</li><li class="ql-align-justify">Dora</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction and Overview</p><p class="ql-align-justify"><strong>02:20 -</strong> Complying with the Latest Cybersecurity Standards: PCI DSS 4.0</p><p class="ql-align-justify"><strong>09:37 -</strong> Understanding and Implementing NIST 2: Enhancing Cybersecurity in the EU</p><p class="ql-align-justify"><strong>19:28 - </strong>Preparing for DORA: Operational Resilience for Financial Organisations</p><p class="ql-align-justify"><strong>23:08 - </strong>Conclusion and Key Takeaways</p><p class="ql-align-justify"><br></p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify"><strong>Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives Explained</strong></p><p class="ql-align-justify"><br></p><p class="ql-align-justify">Compliance with cybersecurity standards is essential for any organisation to protect sensitive information, maintain customer trust, and mitigate the risks associated with data breaches and cyber threats. Adhering to recognized frameworks and regulations, not only safeguards the integrity, confidentiality, and availability of data but also demonstrates a proactive commitment to security best practices.&nbsp;</p><p class="ql-align-justify">Join Chris Steffen and Uri Dorot, Senior Product Marketing Manager at Radware, as they delve into the critical aspects of compliance with cybersecurity standards.&nbsp;</p><p class="ql-align-justify"><strong>Themes</strong></p><ul><li class="ql-align-justify">Compliance</li><li class="ql-align-justify">PCI DSS 4.0&nbsp;</li><li class="ql-align-justify">NIS2&nbsp;</li><li class="ql-align-justify">Dora</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction and Overview</p><p class="ql-align-justify"><strong>02:20 -</strong> Complying with the Latest Cybersecurity Standards: PCI DSS 4.0</p><p class="ql-align-justify"><strong>09:37 -</strong> Understanding and Implementing NIST 2: Enhancing Cybersecurity in the EU</p><p class="ql-align-justify"><strong>19:28 - </strong>Preparing for DORA: Operational Resilience for Financial Organisations</p><p class="ql-align-justify"><strong>23:08 - </strong>Conclusion and Key Takeaways</p><p class="ql-align-justify"><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c6539661-2bb9-4d4c-b765-ad1c0969d1e8</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 31 Jul 2024 16:45:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f49ff86a-d721-4df7-9e7e-8abdcfeddf12/SECURITY-STRATEGIST-Radware-MASTER-3-0-converted.mp3" length="22269958" type="audio/mpeg"/><itunes:duration>23:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season></item><item><title>Improv a Secret Weapon Against Cyber Threats</title><itunes:title>Improv a Secret Weapon Against Cyber Threats</itunes:title><description><![CDATA[<p class="ql-align-justify">Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wit and adaptability of seasoned improvisers!&nbsp;</p><p class="ql-align-justify">Communication and collaboration are the secret sauce of robust cybersecurity. Improv supercharges team communication and cranks up problem-solving skills to eleven.&nbsp;</p><p class="ql-align-justify">In this podcast, Jeremy Strozer, Artistic Director at Wild Atlantic Theatre, and Paulina Rios Maya, Head of Industry Relations, discuss how improv can become your secret weapon against cyber criminals.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Improv techniques can enhance the adaptability of cybersecurity teams during incidents.</li><li class="ql-align-justify">Communication and collaboration are critical in cybersecurity, and improv can improve team communication.</li></ul><br/><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction</p><p class="ql-align-justify"><strong>01:33 - </strong>Becoming Interested in Improv</p><p class="ql-align-justify"><strong>03:00 -</strong> Using Improv in Strategic Planning</p><p class="ql-align-justify"><strong>04:49 -</strong> Playing Out Scenarios</p><p class="ql-align-justify"><strong>06:39 -</strong> Improving Communication in Teams</p><p class="ql-align-justify"><strong>08:06 -</strong> Identifying and Mitigating Security Threats</p><p class="ql-align-justify"><strong>09:02 -</strong> Conclusion</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wit and adaptability of seasoned improvisers!&nbsp;</p><p class="ql-align-justify">Communication and collaboration are the secret sauce of robust cybersecurity. Improv supercharges team communication and cranks up problem-solving skills to eleven.&nbsp;</p><p class="ql-align-justify">In this podcast, Jeremy Strozer, Artistic Director at Wild Atlantic Theatre, and Paulina Rios Maya, Head of Industry Relations, discuss how improv can become your secret weapon against cyber criminals.&nbsp;</p><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Key Takeaways:</strong></p><ul><li class="ql-align-justify">Improv techniques can enhance the adaptability of cybersecurity teams during incidents.</li><li class="ql-align-justify">Communication and collaboration are critical in cybersecurity, and improv can improve team communication.</li></ul><br/><p class="ql-align-justify"><br></p><p class="ql-align-justify"><strong>Chapters:</strong></p><p class="ql-align-justify"><strong>00:00 -</strong> Introduction</p><p class="ql-align-justify"><strong>01:33 - </strong>Becoming Interested in Improv</p><p class="ql-align-justify"><strong>03:00 -</strong> Using Improv in Strategic Planning</p><p class="ql-align-justify"><strong>04:49 -</strong> Playing Out Scenarios</p><p class="ql-align-justify"><strong>06:39 -</strong> Improving Communication in Teams</p><p class="ql-align-justify"><strong>08:06 -</strong> Identifying and Mitigating Security Threats</p><p class="ql-align-justify"><strong>09:02 -</strong> Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">954badf5-1e70-46f2-97d6-29b25a95b214</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 31 Jul 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/bae87253-99a5-4c9d-b5a7-bb08f8b4eda0/SECURITY-STRATEGIST-Jeremy-Strozer-MASTER-converted.mp3" length="9797904" type="audio/mpeg"/><itunes:duration>10:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season></item><item><title>Why the Cybersecurity Industry Needs Podcasts</title><itunes:title>Why the Cybersecurity Industry Needs Podcasts</itunes:title><description><![CDATA[<p class="ql-align-justify">Podcasts are revolutionising how we raise awareness about cybersecurity.&nbsp;</p><p class="ql-align-justify">They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday conversations. By breaking down these complex issues into relatable and exciting discussions, podcasts make cybersecurity accessible and understandable to a broader audience.</p><p class="ql-align-justify">In this podcast, Chris Steffen, VP of Research at EMA and Paulina Rios Maya, Head of Industry Relations at EM360Tech, discuss the transformative power of podcasts in the cybersecurity world.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways</strong></p><ul><li class="ql-align-justify">Podcasts are a valuable tool for educating and engaging the cybersecurity industry.</li><li class="ql-align-justify">Cybersecurity professionals should advocate for themselves and discuss cybersecurity in accessible and engaging formats.</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Launching the Podcast</p><p class="ql-align-justify"><strong>03:17 -</strong> Advocating for Cybersecurity and Thought Leadership</p><p class="ql-align-justify"><strong>07:03 -</strong> Exploring AI and Zero Trust in Cybersecurity</p><p class="ql-align-justify"><strong>09:31 -</strong> The Human Factor in Cybersecurity</p><p class="ql-align-justify"><strong>13:36 -</strong> Continuous Improvement in the Cybersecurity Industry</p><p class="ql-align-justify"><strong>17:40 -</strong> Conclusion and Where to Find More</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">Podcasts are revolutionising how we raise awareness about cybersecurity.&nbsp;</p><p class="ql-align-justify">They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday conversations. By breaking down these complex issues into relatable and exciting discussions, podcasts make cybersecurity accessible and understandable to a broader audience.</p><p class="ql-align-justify">In this podcast, Chris Steffen, VP of Research at EMA and Paulina Rios Maya, Head of Industry Relations at EM360Tech, discuss the transformative power of podcasts in the cybersecurity world.&nbsp;</p><p class="ql-align-justify"><strong>Key Takeaways</strong></p><ul><li class="ql-align-justify">Podcasts are a valuable tool for educating and engaging the cybersecurity industry.</li><li class="ql-align-justify">Cybersecurity professionals should advocate for themselves and discuss cybersecurity in accessible and engaging formats.</li></ul><br/><p class="ql-align-justify"><strong>Chapters</strong></p><p class="ql-align-justify"><strong>00:00 - </strong>Introduction and Launching the Podcast</p><p class="ql-align-justify"><strong>03:17 -</strong> Advocating for Cybersecurity and Thought Leadership</p><p class="ql-align-justify"><strong>07:03 -</strong> Exploring AI and Zero Trust in Cybersecurity</p><p class="ql-align-justify"><strong>09:31 -</strong> The Human Factor in Cybersecurity</p><p class="ql-align-justify"><strong>13:36 -</strong> Continuous Improvement in the Cybersecurity Industry</p><p class="ql-align-justify"><strong>17:40 -</strong> Conclusion and Where to Find More</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">acf15089-e4a6-46fe-82a3-2a30e0e73975</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 24 Jul 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/7fa789df-4fe1-41c5-9189-4ceff3b34dbf/SECURITY-STRATEGIST-Chris-Steffen-MASTER-converted.mp3" length="17744257" type="audio/mpeg"/><itunes:duration>18:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season></item><item><title>Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC</title><itunes:title>Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC</itunes:title><description><![CDATA[<p>Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collaboration between these teams is crucial to addressing the unique challenges and dynamic threats seen increasingly today targeting cloud platforms.</p><p>Despite their shared goal of safeguarding organisational assets, Cloud Security and SOC teams often operate in silos, leading to communication gaps and inefficiencies. Bridging this gap requires unified strategies, shared tools, and streamlined processes that enable real-time information sharing and coordinated responses. By integrating Cloud Security with the SOC, organisations can enhance threat visibility, improve incident response times, and fortify their security posture.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:</p><ul><li>The gap between cloud security and the SOC</li><li>The importance of prioritizing cloud visibility for the SOC</li><li>A platform approach for stronger cloud security</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 - </strong>Introduction and Background</p><p><strong>01:10 - </strong>Organizational Disconnect: DevSecOps vs. SOC</p><p><strong>23:59 - </strong>The Need for a Unified, Centralized Platform</p><p><strong>27:45 - </strong>The Future of Cloud Security: Unified, Ubiquitous, and Uninterrupted</p><p><strong>30:33 - </strong>Conclusion</p>]]></description><content:encoded><![CDATA[<p>Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collaboration between these teams is crucial to addressing the unique challenges and dynamic threats seen increasingly today targeting cloud platforms.</p><p>Despite their shared goal of safeguarding organisational assets, Cloud Security and SOC teams often operate in silos, leading to communication gaps and inefficiencies. Bridging this gap requires unified strategies, shared tools, and streamlined processes that enable real-time information sharing and coordinated responses. By integrating Cloud Security with the SOC, organisations can enhance threat visibility, improve incident response times, and fortify their security posture.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:</p><ul><li>The gap between cloud security and the SOC</li><li>The importance of prioritizing cloud visibility for the SOC</li><li>A platform approach for stronger cloud security</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 - </strong>Introduction and Background</p><p><strong>01:10 - </strong>Organizational Disconnect: DevSecOps vs. SOC</p><p><strong>23:59 - </strong>The Need for a Unified, Centralized Platform</p><p><strong>27:45 - </strong>The Future of Cloud Security: Unified, Ubiquitous, and Uninterrupted</p><p><strong>30:33 - </strong>Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6e57de3c-907f-4b88-aa63-6d78deb47950</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 03 Jul 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f94a7f17-121e-4ca6-8168-f750569c42db/EM360-PODCAST-Palo-Alto-3-MASTER-2-0-converted.mp3" length="31145386" type="audio/mpeg"/><itunes:duration>32:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Preventing Account Takeovers in Cloud Applications</title><itunes:title>Preventing Account Takeovers in Cloud Applications</itunes:title><description><![CDATA[<p>Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today are using more cloud applications than ever, and with the interconnected nature of the cloud, entry into one application can result in lateral movement to others—making the time to a breach faster than ever before. So how do we detect compromised accounts before it's too late?</p><p>Abnormal Security is expanding beyond email to provide full account takeover protection for some of today's most used applications: Salesforce, Dropbox, Workday, AWS, Azure and more. By understanding cross-platform human behavior, Abnormal AI can detect anomalous activity—remediating compromised accounts no matter where or how they originate.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="http://www.linkedin.com/in/mccounterhack/" rel="noopener noreferrer" target="_blank">Mick Leach</a>, Field CISO at&nbsp;<a href="http://em360tech.com/solution-providers/abnormal-security" rel="noopener noreferrer" target="_blank">Abnormal Security</a>, speaks to&nbsp;<a href="https://www.linkedin.com/in/jeremy-strozer/" rel="noopener noreferrer" target="_blank">Jeremy Strozer</a>, Director, Agile U Strategies and Communications, to discuss:</p><ul><li>Organizational application usage</li><li>Account takeover concerns</li><li>Security team limitations</li><li>Visibility and controls</li><li>Account takeover remediation</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -</strong>&nbsp;Introduction</p><p><strong>00:59 -&nbsp;</strong>Definition and Occurrence of Account Takeovers</p><p><strong>05:33 -</strong>&nbsp;Exploiting Trusted Relationships</p><p><strong>09:43 -</strong>&nbsp;Leveraging AI and Behavioral-Based Detection</p><p><strong>12:29 -</strong>&nbsp;API Integration and Visibility</p><p><strong>14:53 -</strong>&nbsp;Customized Models for Each Organization</p><p><strong>20:25 -</strong>&nbsp;Future of Account Security</p><p><strong>22:43 -</strong>&nbsp;Conclusion</p>]]></description><content:encoded><![CDATA[<p>Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today are using more cloud applications than ever, and with the interconnected nature of the cloud, entry into one application can result in lateral movement to others—making the time to a breach faster than ever before. So how do we detect compromised accounts before it's too late?</p><p>Abnormal Security is expanding beyond email to provide full account takeover protection for some of today's most used applications: Salesforce, Dropbox, Workday, AWS, Azure and more. By understanding cross-platform human behavior, Abnormal AI can detect anomalous activity—remediating compromised accounts no matter where or how they originate.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="http://www.linkedin.com/in/mccounterhack/" rel="noopener noreferrer" target="_blank">Mick Leach</a>, Field CISO at&nbsp;<a href="http://em360tech.com/solution-providers/abnormal-security" rel="noopener noreferrer" target="_blank">Abnormal Security</a>, speaks to&nbsp;<a href="https://www.linkedin.com/in/jeremy-strozer/" rel="noopener noreferrer" target="_blank">Jeremy Strozer</a>, Director, Agile U Strategies and Communications, to discuss:</p><ul><li>Organizational application usage</li><li>Account takeover concerns</li><li>Security team limitations</li><li>Visibility and controls</li><li>Account takeover remediation</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -</strong>&nbsp;Introduction</p><p><strong>00:59 -&nbsp;</strong>Definition and Occurrence of Account Takeovers</p><p><strong>05:33 -</strong>&nbsp;Exploiting Trusted Relationships</p><p><strong>09:43 -</strong>&nbsp;Leveraging AI and Behavioral-Based Detection</p><p><strong>12:29 -</strong>&nbsp;API Integration and Visibility</p><p><strong>14:53 -</strong>&nbsp;Customized Models for Each Organization</p><p><strong>20:25 -</strong>&nbsp;Future of Account Security</p><p><strong>22:43 -</strong>&nbsp;Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0d23ea51-f140-4886-ac52-ade76cdef792</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 02 Jul 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d39c0e17-5ae2-4ddb-92f0-97f09fc68156/EM360-PODCAST-Abnormal-Security-2-MASTER-1-converted.mp3" length="22432170" type="audio/mpeg"/><itunes:duration>23:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Guardz: Empower MSPs to Secure &amp; Insure Small Businesses</title><itunes:title>Guardz: Empower MSPs to Secure &amp; Insure Small Businesses</itunes:title><description><![CDATA[<p>Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats.&nbsp;</p><p>Managed Service Providers (MSPs) are tasked with the daunting responsibility of safeguarding diverse client environments, each with its own unique set of platforms and security needs. Traditional security measures often fall short against the ever-evolving tactics of cyber adversaries, putting both MSPs and their clients at risk. The next generation of cybersecurity detection and response solutions offers a path forward. Leveraging artificial intelligence and machine learning, these advanced tools can predict, identify, and mitigate threats in real time. This provides robust protection against the most sophisticated cyber threats.</p><p>By adopting cutting-edge technologies like Guardz, MSPs can enhance their security posture, ensuring comprehensive protection for their clients and staying ahead of cyber adversaries. Guardz's advanced capabilities simplify the complexities of cybersecurity, making it accessible and effective even for SMBs with limited resources.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/dor-eisner-17067744/" rel="noopener noreferrer" target="_blank">Dor Eisner</a>, CEO and Co-founder of <a href="https://em360tech.com/solution-providers/guardz" rel="noopener noreferrer" target="_blank">Guardz</a>, to discuss:</p><ul><li>MSPs</li><li>Security Infrastructure&nbsp;</li><li>AI in security infrastructure</li><li>Next-generation cybersecurity</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -&nbsp;</strong>Introduction and Background of Guardz</p><p><strong>02:36 -&nbsp;</strong>Challenges for MSPs in Cybersecurity</p><p><strong>05:25 -&nbsp;</strong>The Unified Approach and Automation in Guards</p><p><strong>07:18 -&nbsp;</strong>Guardz' Focus on MSPs and Small Businesses</p><p><strong>08:14 -&nbsp;</strong>The Power of AI in Enhancing Guards' Offering</p><p><strong>11:30 -&nbsp;</strong>The Impact of Guards on the MSP Space</p><p><strong>13:21 -&nbsp;</strong>Securing Small Businesses and Compliance</p><p><strong>18:07 -&nbsp;</strong>Marketing Support and Bringing Business to MSPs</p><p><strong>19:02 -&nbsp;</strong>Conclusion and Call to Action</p>]]></description><content:encoded><![CDATA[<p>Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats.&nbsp;</p><p>Managed Service Providers (MSPs) are tasked with the daunting responsibility of safeguarding diverse client environments, each with its own unique set of platforms and security needs. Traditional security measures often fall short against the ever-evolving tactics of cyber adversaries, putting both MSPs and their clients at risk. The next generation of cybersecurity detection and response solutions offers a path forward. Leveraging artificial intelligence and machine learning, these advanced tools can predict, identify, and mitigate threats in real time. This provides robust protection against the most sophisticated cyber threats.</p><p>By adopting cutting-edge technologies like Guardz, MSPs can enhance their security posture, ensuring comprehensive protection for their clients and staying ahead of cyber adversaries. Guardz's advanced capabilities simplify the complexities of cybersecurity, making it accessible and effective even for SMBs with limited resources.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/dor-eisner-17067744/" rel="noopener noreferrer" target="_blank">Dor Eisner</a>, CEO and Co-founder of <a href="https://em360tech.com/solution-providers/guardz" rel="noopener noreferrer" target="_blank">Guardz</a>, to discuss:</p><ul><li>MSPs</li><li>Security Infrastructure&nbsp;</li><li>AI in security infrastructure</li><li>Next-generation cybersecurity</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -&nbsp;</strong>Introduction and Background of Guardz</p><p><strong>02:36 -&nbsp;</strong>Challenges for MSPs in Cybersecurity</p><p><strong>05:25 -&nbsp;</strong>The Unified Approach and Automation in Guards</p><p><strong>07:18 -&nbsp;</strong>Guardz' Focus on MSPs and Small Businesses</p><p><strong>08:14 -&nbsp;</strong>The Power of AI in Enhancing Guards' Offering</p><p><strong>11:30 -&nbsp;</strong>The Impact of Guards on the MSP Space</p><p><strong>13:21 -&nbsp;</strong>Securing Small Businesses and Compliance</p><p><strong>18:07 -&nbsp;</strong>Marketing Support and Bringing Business to MSPs</p><p><strong>19:02 -&nbsp;</strong>Conclusion and Call to Action</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">7d6682a0-9548-479b-bc54-187b2158766f</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 18 Jun 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b852ce7-565b-4751-980a-9ba38429bc18/EM360-PODCAST-Guardz-MASTER-1-converted.mp3" length="19037374" type="audio/mpeg"/><itunes:duration>19:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Trends and Threats: Rapid7&apos;s 2024 Cybersecurity Findings</title><itunes:title>Trends and Threats: Rapid7&apos;s 2024 Cybersecurity Findings</itunes:title><description><![CDATA[<p>The <a href="https://www.rapid7.com/research/report/2024-attack-intelligence-report/?utm_source=referral&amp;utm_medium=website&amp;utm_content=em360&amp;utm_campaign=global-pla-air-report-prospect-" rel="noopener noreferrer" target="_blank">2024 Attack Intelligence Report</a> thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&amp;CK framework, the report offers valuable insights into the evolving threat landscape, helping organisations understand the strategies and methods employed by malicious actors.</p><p>Understanding the findings of the 2024 Attack Intelligence Report is not just crucial; it's empowering for businesses aiming to bolster their cybersecurity defences. The detailed breakdown of adversary behaviours equips security teams to proactively identify vulnerabilities, implement effective countermeasures, and develop robust incident response strategies. By staying informed about the latest attack patterns and techniques, organizations can better protect their assets, data, and reputation in an increasingly complex cyber threat environment.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/jeremy-strozer/" rel="noopener noreferrer" target="_blank">Jeremy Strozer</a>, Geopolitical Strategist and Cyber Intelligence Analyst, speaks to&nbsp;<a href="https://www.linkedin.com/in/ccondon/" rel="noopener noreferrer" target="_blank">Caitlin Condon</a>, Director of Vulnerability Intelligence at&nbsp;<a href="https://em360tech.com/tech-index/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>, to discuss:&nbsp;</p><ul><li>2024 Attack Intelligence Report</li><li>zero-day exploits</li><li>mass compromise events</li><li>network edge devices</li><li>multi-factor authentication</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -&nbsp;</strong>Introduction and Background of the Report</p><p><strong>01:39 -&nbsp;</strong>Key Findings: Prevalence of Zero-Day Exploits</p><p><strong>06:15 -&nbsp;</strong>The Evolving Nature of Ransomware</p><p><strong>08:31 -&nbsp;</strong>Importance of Multi-Factor Authentication</p><p><strong>09:01 -&nbsp;</strong>Addressing Common Vulnerabilities for Better Security Practices</p><p><strong>11:21 -&nbsp;</strong>Tackling the Security and Human Root Causes of Cyber Threats</p><p><strong>13:13 -&nbsp;</strong>Conclusion and Call to Action</p>]]></description><content:encoded><![CDATA[<p>The <a href="https://www.rapid7.com/research/report/2024-attack-intelligence-report/?utm_source=referral&amp;utm_medium=website&amp;utm_content=em360&amp;utm_campaign=global-pla-air-report-prospect-" rel="noopener noreferrer" target="_blank">2024 Attack Intelligence Report</a> thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&amp;CK framework, the report offers valuable insights into the evolving threat landscape, helping organisations understand the strategies and methods employed by malicious actors.</p><p>Understanding the findings of the 2024 Attack Intelligence Report is not just crucial; it's empowering for businesses aiming to bolster their cybersecurity defences. The detailed breakdown of adversary behaviours equips security teams to proactively identify vulnerabilities, implement effective countermeasures, and develop robust incident response strategies. By staying informed about the latest attack patterns and techniques, organizations can better protect their assets, data, and reputation in an increasingly complex cyber threat environment.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/jeremy-strozer/" rel="noopener noreferrer" target="_blank">Jeremy Strozer</a>, Geopolitical Strategist and Cyber Intelligence Analyst, speaks to&nbsp;<a href="https://www.linkedin.com/in/ccondon/" rel="noopener noreferrer" target="_blank">Caitlin Condon</a>, Director of Vulnerability Intelligence at&nbsp;<a href="https://em360tech.com/tech-index/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>, to discuss:&nbsp;</p><ul><li>2024 Attack Intelligence Report</li><li>zero-day exploits</li><li>mass compromise events</li><li>network edge devices</li><li>multi-factor authentication</li></ul><br/><h2><strong>Chapters</strong></h2><p><strong>00:00 -&nbsp;</strong>Introduction and Background of the Report</p><p><strong>01:39 -&nbsp;</strong>Key Findings: Prevalence of Zero-Day Exploits</p><p><strong>06:15 -&nbsp;</strong>The Evolving Nature of Ransomware</p><p><strong>08:31 -&nbsp;</strong>Importance of Multi-Factor Authentication</p><p><strong>09:01 -&nbsp;</strong>Addressing Common Vulnerabilities for Better Security Practices</p><p><strong>11:21 -&nbsp;</strong>Tackling the Security and Human Root Causes of Cyber Threats</p><p><strong>13:13 -&nbsp;</strong>Conclusion and Call to Action</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6fe5251c-703a-46b8-8d69-530762e6baf4</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 17 Jun 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/08402123-ef75-40d0-bd9c-6a11b0db4aa1/EM360-PODCAST-Rapid7-MASTER-1-converted.mp3" length="13233567" type="audio/mpeg"/><itunes:duration>13:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives</title><itunes:title>Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives</itunes:title><description><![CDATA[<p>As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard security protocols. The potential consequences of Shadow AI are severe, introducing vulnerabilities, compromising data integrity, and leading to compliance breaches, posing significant threats to the organization's overall security framework.</p><p>For C-level executives, understanding the impact of Shadow AI is not just crucial, but it's your responsibility to safeguard your enterprise's AI investments. Unauthorized AI projects can undermine strategic initiatives and expose the company to significant risks. By implementing comprehensive governance policies, strict access controls, and continuous monitoring, you can mitigate these risks effectively. Foster a culture of security awareness and ensure regular audits to maintain compliance and protect data integrity. Proactively addressing Shadow AI not only secures your AI assets but also aligns them with your business objectives, enhancing your competitive edge and ensuring sustainable growth.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, VP of Research at EMA speaks to&nbsp;<a href="https://www.linkedin.com/in/shannonmurphycyber/" rel="noopener noreferrer" target="_blank">Shannon Murphy</a>, Global Security &amp; Risk Strategist at&nbsp;<a href="https://em360tech.com/tech-index/trend-micro" rel="noopener noreferrer" target="_blank">Trend Micro</a>, to discuss:</p><ul><li>Shadow AI</li><li>C-level execs</li><li>Zero Trust</li><li>AI risk</li><li>Security strategies</li></ul><br/><h2><strong>Chapters</strong></h2><p>00:00 - Introduction and Background</p><p>02:06 - Challenges of Shadow AI</p><p>03:00 - Visibility in Managing AI Risks</p><p>06:18 - Protecting Against AI-Driven Threats with Zero Trust</p><p>09:03 - Zero Trust as a Journey</p><p>13:17 - Talking to CISOs: Anecdotes Becoming Trends</p><p>19:14 - Emerging Use Cases for AI in SOC Teams</p><p>20:08 - Conclusion</p>]]></description><content:encoded><![CDATA[<p>As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard security protocols. The potential consequences of Shadow AI are severe, introducing vulnerabilities, compromising data integrity, and leading to compliance breaches, posing significant threats to the organization's overall security framework.</p><p>For C-level executives, understanding the impact of Shadow AI is not just crucial, but it's your responsibility to safeguard your enterprise's AI investments. Unauthorized AI projects can undermine strategic initiatives and expose the company to significant risks. By implementing comprehensive governance policies, strict access controls, and continuous monitoring, you can mitigate these risks effectively. Foster a culture of security awareness and ensure regular audits to maintain compliance and protect data integrity. Proactively addressing Shadow AI not only secures your AI assets but also aligns them with your business objectives, enhancing your competitive edge and ensuring sustainable growth.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>, VP of Research at EMA speaks to&nbsp;<a href="https://www.linkedin.com/in/shannonmurphycyber/" rel="noopener noreferrer" target="_blank">Shannon Murphy</a>, Global Security &amp; Risk Strategist at&nbsp;<a href="https://em360tech.com/tech-index/trend-micro" rel="noopener noreferrer" target="_blank">Trend Micro</a>, to discuss:</p><ul><li>Shadow AI</li><li>C-level execs</li><li>Zero Trust</li><li>AI risk</li><li>Security strategies</li></ul><br/><h2><strong>Chapters</strong></h2><p>00:00 - Introduction and Background</p><p>02:06 - Challenges of Shadow AI</p><p>03:00 - Visibility in Managing AI Risks</p><p>06:18 - Protecting Against AI-Driven Threats with Zero Trust</p><p>09:03 - Zero Trust as a Journey</p><p>13:17 - Talking to CISOs: Anecdotes Becoming Trends</p><p>19:14 - Emerging Use Cases for AI in SOC Teams</p><p>20:08 - Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">56e3046e-62b2-4882-bc0f-c7cd05bf7cb2</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 14 Jun 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a032b8c5-46d6-4429-966f-b841dd49f969/EM360-PODCAST-Trend-Micro-MASTER-0-converted.mp3" length="19758784" type="audio/mpeg"/><itunes:duration>20:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Tackling SOC Analyst Burnout</title><itunes:title>Tackling SOC Analyst Burnout</itunes:title><description><![CDATA[<p>Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead to serious burnout. This condition not only hampers analysts' performance and job satisfaction but also poses a threat to overall security.</p><p>Organisations must recognize the signs early to mitigate SOC analyst burnout and implement supportive measures. Consolidated platforms like XDR with precise use of machine learning can significantly alleviate the burden on SOC analysts.&nbsp;</p><p>Platforms can streamline operations by providing a unified interface and automating repetitive tasks, thereby reducing workload and enabling analysts to focus on more strategic activities. By leveraging these technologies, companies can create a more supportive work environment and maintain a resilient and effective cybersecurity team.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at Palo Alto Networks, to discuss:</p><ul><li>SOC Analyst burnout&nbsp;</li><li>SOC Platforms&nbsp;</li><li>Automation use cases</li><li>Machine learning in the SOC</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead to serious burnout. This condition not only hampers analysts' performance and job satisfaction but also poses a threat to overall security.</p><p>Organisations must recognize the signs early to mitigate SOC analyst burnout and implement supportive measures. Consolidated platforms like XDR with precise use of machine learning can significantly alleviate the burden on SOC analysts.&nbsp;</p><p>Platforms can streamline operations by providing a unified interface and automating repetitive tasks, thereby reducing workload and enabling analysts to focus on more strategic activities. By leveraging these technologies, companies can create a more supportive work environment and maintain a resilient and effective cybersecurity team.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at Palo Alto Networks, to discuss:</p><ul><li>SOC Analyst burnout&nbsp;</li><li>SOC Platforms&nbsp;</li><li>Automation use cases</li><li>Machine learning in the SOC</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">08e4550e-a00b-4431-8304-19a73b33c957</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 10 Jun 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4064c3bb-805b-4b27-9185-444fa722596f/EM360-PODCAST-Palo-Alto-2-MASTER-converted.mp3" length="28848550" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI</title><itunes:title>Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI</itunes:title><description><![CDATA[<p>The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses over the last decade. Unfortunately, these numbers will continue to rise with the proliferation of AI, and your email inboxes are your most likely target.</p><p>Abnormal Security takes a different approach to email security, understanding human behavior to protect human vulnerabilities. By baselining known behavior, the platform can understand when anomalous activity occurs and block attacks—even when these threats are text-based emails with no traditional indicators of compromise.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>&nbsp;VP of Research at EMA speaks to&nbsp;<a href="https://www.linkedin.com/in/mccounterhack/" rel="noopener noreferrer" target="_blank"> Leach</a>, Field CISO&nbsp;at&nbsp;<a href="https://em360tech.com/solution-providers/abnormal-security" rel="noopener noreferrer" target="_blank">Abnormal Security</a>, to discuss:</p><ul><li>AI&nbsp;</li><li>Social Engineering&nbsp;</li><li>Human behavior&nbsp;</li><li>Security Culture</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses over the last decade. Unfortunately, these numbers will continue to rise with the proliferation of AI, and your email inboxes are your most likely target.</p><p>Abnormal Security takes a different approach to email security, understanding human behavior to protect human vulnerabilities. By baselining known behavior, the platform can understand when anomalous activity occurs and block attacks—even when these threats are text-based emails with no traditional indicators of compromise.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a>&nbsp;VP of Research at EMA speaks to&nbsp;<a href="https://www.linkedin.com/in/mccounterhack/" rel="noopener noreferrer" target="_blank"> Leach</a>, Field CISO&nbsp;at&nbsp;<a href="https://em360tech.com/solution-providers/abnormal-security" rel="noopener noreferrer" target="_blank">Abnormal Security</a>, to discuss:</p><ul><li>AI&nbsp;</li><li>Social Engineering&nbsp;</li><li>Human behavior&nbsp;</li><li>Security Culture</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">cc7ec469-305f-40ff-899c-59c613b8009d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 28 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/43835873-caaf-4e7c-ac00-2d4004afa55c/EM360-PODCAST-Abnormal-Security-MASTER-1-converted.mp3" length="21815011" type="audio/mpeg"/><itunes:duration>22:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Bots Unleashed: How ChatGPT&apos;s Insights Fuel Automated Manipulation</title><itunes:title>Bots Unleashed: How ChatGPT&apos;s Insights Fuel Automated Manipulation</itunes:title><description><![CDATA[<p>Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the knowledge base through coordinated bot activity.&nbsp;</p><p>These sophisticated cybercriminals are not just using AI tools, they are leveraging them to streamline their attacks. By&nbsp;exploiting the model's natural language processing capabilities, they can craft convincing phishing emails, generate fake news articles, and even create highly realistic deepfake videos.&nbsp;</p><p>With the ability to mimic human speech patterns and convincingly generate text, these AI-enhanced attacks pose a significant and immediate challenge for cybersecurity professionals worldwide. As the arms race between hackers and defenders escalates, experts stress the urgent need for developing robust defences and staying vigilant against these evolving threats in the digital landscape.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank">Alejandro Leal</a>, Analyst at KuppingerCole speaks to&nbsp;<a href="http://www.linkedin.com/in/arik-atar/" rel="noopener noreferrer" target="_blank">Arik Atar</a>, Senior Threat Intelligence Researcher at&nbsp;<a href="http://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>, to discuss:&nbsp;</p><ul><li>Hacker infiltration&nbsp;</li><li>GPT Capabilities&nbsp;</li><li>Operational needs&nbsp;</li><li>Hacker skill development&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the knowledge base through coordinated bot activity.&nbsp;</p><p>These sophisticated cybercriminals are not just using AI tools, they are leveraging them to streamline their attacks. By&nbsp;exploiting the model's natural language processing capabilities, they can craft convincing phishing emails, generate fake news articles, and even create highly realistic deepfake videos.&nbsp;</p><p>With the ability to mimic human speech patterns and convincingly generate text, these AI-enhanced attacks pose a significant and immediate challenge for cybersecurity professionals worldwide. As the arms race between hackers and defenders escalates, experts stress the urgent need for developing robust defences and staying vigilant against these evolving threats in the digital landscape.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/alejandro-leal-a127bb153/" rel="noopener noreferrer" target="_blank">Alejandro Leal</a>, Analyst at KuppingerCole speaks to&nbsp;<a href="http://www.linkedin.com/in/arik-atar/" rel="noopener noreferrer" target="_blank">Arik Atar</a>, Senior Threat Intelligence Researcher at&nbsp;<a href="http://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>, to discuss:&nbsp;</p><ul><li>Hacker infiltration&nbsp;</li><li>GPT Capabilities&nbsp;</li><li>Operational needs&nbsp;</li><li>Hacker skill development&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a1cce6de-cea4-4680-8830-4c66430ed80d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 20 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f2d82e92-86e7-4bfa-aed3-cc533eae4e11/EM360-PODCAST-Radware-MASTER-1-converted.mp3" length="18712531" type="audio/mpeg"/><itunes:duration>19:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Palo Alto Networks: The State of SOC Platformization</title><itunes:title>Palo Alto Networks: The State of SOC Platformization</itunes:title><description><![CDATA[<p>The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach to managing and mitigating security threats. By consolidating various security tools, processes, and data sources into a unified platform, organizations can streamline operations, reduce complexity, and significantly enhance overall security outcomes.&nbsp;</p><p>Platformization, as demonstrated by solutions like Palo Alto's XDR platform, is a powerful tool for SOC teams. It enables them to efficiently correlate and analyse vast amounts of security data in real-time, leading to quicker detection and response to threats. With advanced analytics, machine learning, and automation seamlessly integrated, platforms like XDR empower SOC analysts to focus on higher-value tasks, such as proactive threat hunting and strategic decision-making.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at Palo Alto Networks, to discuss:</p><ul><li>Why security&nbsp;tool consolidation is happening now</li><li>Platformization for the SOC</li><li>How to approach onboarding a platform&nbsp;like Palo Alto Networks Cortex XDR'</li></ul><br/><p><em>Interested in learning more about XDR and Palo Alto Networks? You can find some additional resources below:</em></p><ul><li><a href="https://start.paloaltonetworks.com/cortex_xdr_endpoint_protection_leader.html" rel="noopener noreferrer" target="_blank"><em>Break free from legacy endpoint solutions</em></a></li><li><a href="https://start.paloaltonetworks.com/essential-guide-MITRE-R5" rel="noopener noreferrer" target="_blank"><em>A Comprehensive Guide to the 2023 MITRE Engenuity ATT&amp;CK Evaluations</em></a></li><li><a href="https://start.paloaltonetworks.com/gartner-epp-mq-2023.html" rel="noopener noreferrer" target="_blank"><em>Palo Alto Networks named a Leader by Gartner®&nbsp;for Cortex XDR.</em></a></li></ul><br/><h2><strong>Chapters</strong></h2><ul><li><strong>00:00 -&nbsp;</strong>Introduction</li><li><strong>01:39 -&nbsp;</strong>Defining Platformization and its Benefits</li><li><strong>08:16 -&nbsp;</strong>Downsides of Implementing Multiple Tools</li><li><strong>09:14 -&nbsp;</strong>Advantages of Platformization</li><li><strong>29:27 -&nbsp;</strong>Platformization as a Solution for Security Challenges</li><li><strong>31:24 -&nbsp;</strong>Conclusion</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach to managing and mitigating security threats. By consolidating various security tools, processes, and data sources into a unified platform, organizations can streamline operations, reduce complexity, and significantly enhance overall security outcomes.&nbsp;</p><p>Platformization, as demonstrated by solutions like Palo Alto's XDR platform, is a powerful tool for SOC teams. It enables them to efficiently correlate and analyse vast amounts of security data in real-time, leading to quicker detection and response to threats. With advanced analytics, machine learning, and automation seamlessly integrated, platforms like XDR empower SOC analysts to focus on higher-value tasks, such as proactive threat hunting and strategic decision-making.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/brad-laporte/" rel="noopener noreferrer" target="_blank">Brad LaPorte</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/danielpflaherty/" rel="noopener noreferrer" target="_blank">Dan Flaherty</a>, Senior Product Marketing Manager at Palo Alto Networks, to discuss:</p><ul><li>Why security&nbsp;tool consolidation is happening now</li><li>Platformization for the SOC</li><li>How to approach onboarding a platform&nbsp;like Palo Alto Networks Cortex XDR'</li></ul><br/><p><em>Interested in learning more about XDR and Palo Alto Networks? You can find some additional resources below:</em></p><ul><li><a href="https://start.paloaltonetworks.com/cortex_xdr_endpoint_protection_leader.html" rel="noopener noreferrer" target="_blank"><em>Break free from legacy endpoint solutions</em></a></li><li><a href="https://start.paloaltonetworks.com/essential-guide-MITRE-R5" rel="noopener noreferrer" target="_blank"><em>A Comprehensive Guide to the 2023 MITRE Engenuity ATT&amp;CK Evaluations</em></a></li><li><a href="https://start.paloaltonetworks.com/gartner-epp-mq-2023.html" rel="noopener noreferrer" target="_blank"><em>Palo Alto Networks named a Leader by Gartner®&nbsp;for Cortex XDR.</em></a></li></ul><br/><h2><strong>Chapters</strong></h2><ul><li><strong>00:00 -&nbsp;</strong>Introduction</li><li><strong>01:39 -&nbsp;</strong>Defining Platformization and its Benefits</li><li><strong>08:16 -&nbsp;</strong>Downsides of Implementing Multiple Tools</li><li><strong>09:14 -&nbsp;</strong>Advantages of Platformization</li><li><strong>29:27 -&nbsp;</strong>Platformization as a Solution for Security Challenges</li><li><strong>31:24 -&nbsp;</strong>Conclusion</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9c136759-8dd5-4b35-a2e6-eecbcf96bed2</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 17 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/beb32ef3-2587-4e27-99e6-4fdfd6c03309/EM360-PODCAST-Palo-Alto-MASTER-WITH-EDITS-v1-0.mp3" length="44625459" type="audio/mpeg"/><itunes:duration>30:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>HID Global: Leading Through Challenges of Hospital Worker Violence</title><itunes:title>HID Global: Leading Through Challenges of Hospital Worker Violence</itunes:title><description><![CDATA[<p>The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that proactive strategies are employed to safeguard the well-being of patients, visitors and staff.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/paulina-rios-maya/" rel="noopener noreferrer" target="_blank">Paulina Rios Maya</a> speaks to <a href="https://www.linkedin.com/in/sheila-montgomery-cook-b6ab1914a/" rel="noopener noreferrer" target="_blank">Sheila Cook</a>, Chief Experience Officer at the University of Illinois Hospital &amp; Health Science System and <a href="http://www.linkedin.com/in/cletebordeaux/" rel="noopener noreferrer" target="_blank">Clete Bourdeaux</a>, Healthcare Business Development Director for <a href="http://www.linkedin.com/company/hidglobal/" rel="noopener noreferrer" target="_blank">HID</a>’s workforce identity management unit, to discuss:&nbsp;</p><ul><li>Workplace violence</li><li>Evolution of security protocols within medical facilities</li><li>Healthcare security</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that proactive strategies are employed to safeguard the well-being of patients, visitors and staff.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/paulina-rios-maya/" rel="noopener noreferrer" target="_blank">Paulina Rios Maya</a> speaks to <a href="https://www.linkedin.com/in/sheila-montgomery-cook-b6ab1914a/" rel="noopener noreferrer" target="_blank">Sheila Cook</a>, Chief Experience Officer at the University of Illinois Hospital &amp; Health Science System and <a href="http://www.linkedin.com/in/cletebordeaux/" rel="noopener noreferrer" target="_blank">Clete Bourdeaux</a>, Healthcare Business Development Director for <a href="http://www.linkedin.com/company/hidglobal/" rel="noopener noreferrer" target="_blank">HID</a>’s workforce identity management unit, to discuss:&nbsp;</p><ul><li>Workplace violence</li><li>Evolution of security protocols within medical facilities</li><li>Healthcare security</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">9141ab51-21b2-4222-8f38-aff3f4c15956</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 10 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/571d4104-bef8-46b7-a8a8-79eb02e4b336/EM360-PODCAST-HID-Global-MASTER-1-converted.mp3" length="25450000" type="audio/mpeg"/><itunes:duration>26:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The Role of Generative AI in Red Canary&apos;s Security Evolution</title><itunes:title>The Role of Generative AI in Red Canary&apos;s Security Evolution</itunes:title><description><![CDATA[<p>GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours.&nbsp;</p><p>By harnessing the power of generative AI, security professionals can navigate complex datasets with enhanced efficiency and precision. The importance of continuously updating AI models with fresh data cannot be overstated. It is this constant evolution that ensures the relevance and efficacy of GenAI in the face of ever-changing security challenges. As GenAI continues to advance, it holds the promise of redefining the future of security operations, ushering in an era of proactive defence and adaptive strategies against emerging threats.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a> VP of Research at EMA speaks to <a href="https://www.linkedin.com/in/jimmy-astle/" rel="noopener noreferrer" target="_blank">Jimmy Astle</a>, Senior Director of Detection Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/red-canary" rel="noopener noreferrer" target="_blank">Red Canary</a>, to discuss:&nbsp;</p><ul><li>GenAI&nbsp;</li><li>Uses of GenAI&nbsp;</li><li>Training of AI&nbsp;</li><li>Automation in security operations</li></ul><br/>]]></description><content:encoded><![CDATA[<p>GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours.&nbsp;</p><p>By harnessing the power of generative AI, security professionals can navigate complex datasets with enhanced efficiency and precision. The importance of continuously updating AI models with fresh data cannot be overstated. It is this constant evolution that ensures the relevance and efficacy of GenAI in the face of ever-changing security challenges. As GenAI continues to advance, it holds the promise of redefining the future of security operations, ushering in an era of proactive defence and adaptive strategies against emerging threats.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a> VP of Research at EMA speaks to <a href="https://www.linkedin.com/in/jimmy-astle/" rel="noopener noreferrer" target="_blank">Jimmy Astle</a>, Senior Director of Detection Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/red-canary" rel="noopener noreferrer" target="_blank">Red Canary</a>, to discuss:&nbsp;</p><ul><li>GenAI&nbsp;</li><li>Uses of GenAI&nbsp;</li><li>Training of AI&nbsp;</li><li>Automation in security operations</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">02bf8e6e-ea72-4b80-9c30-dfad4f91340b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 09 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/563e6d8d-8ae2-4058-80b1-b35e488d1b93/EM360-PODCAST-Red-Canary-MASTER-1-converted.mp3" length="20438077" type="audio/mpeg"/><itunes:duration>21:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The Role of Generative AI in Red Canary&apos;s Security Evolution</title><itunes:title>The Role of Generative AI in Red Canary&apos;s Security Evolution</itunes:title><description><![CDATA[<p>GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours.&nbsp;</p><p>By harnessing the power of generative AI, security professionals can navigate complex datasets with enhanced efficiency and precision. The importance of continuously updating AI models with fresh data cannot be overstated. It is this constant evolution that ensures the relevance and efficacy of GenAI in the face of ever-changing security challenges. As GenAI continues to advance, it holds the promise of redefining the future of security operations, ushering in an era of proactive defence and adaptive strategies against emerging threats.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a> VP of Research at EMA speaks to <a href="https://www.linkedin.com/in/jimmy-astle/" rel="noopener noreferrer" target="_blank">Jimmy Astle</a>, Senior Director of Detection Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/red-canary" rel="noopener noreferrer" target="_blank">Red Canary</a>, to discuss:&nbsp;</p><ul><li>GenAI&nbsp;</li><li>Uses of GenAI&nbsp;</li><li>Training of AI&nbsp;</li><li>Automation in security operations</li></ul><br/>]]></description><content:encoded><![CDATA[<p>GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours.&nbsp;</p><p>By harnessing the power of generative AI, security professionals can navigate complex datasets with enhanced efficiency and precision. The importance of continuously updating AI models with fresh data cannot be overstated. It is this constant evolution that ensures the relevance and efficacy of GenAI in the face of ever-changing security challenges. As GenAI continues to advance, it holds the promise of redefining the future of security operations, ushering in an era of proactive defence and adaptive strategies against emerging threats.</p><p>In this episode of the EM360 Podcast, <a href="https://www.linkedin.com/in/chrissteffen/" rel="noopener noreferrer" target="_blank">Chris Steffen</a> VP of Research at EMA speaks to <a href="https://www.linkedin.com/in/jimmy-astle/" rel="noopener noreferrer" target="_blank">Jimmy Astle</a>, Senior Director of Detection Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/red-canary" rel="noopener noreferrer" target="_blank">Red Canary</a>, to discuss:&nbsp;</p><ul><li>GenAI&nbsp;</li><li>Uses of GenAI&nbsp;</li><li>Training of AI&nbsp;</li><li>Automation in security operations</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4f9122de-b64d-4d79-a8aa-947fc27e7695</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 09 May 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/b7aed079-de9d-4d01-85c8-5ba70e3708c6/EM360-PODCAST-Red-Canary-MASTER-converted.mp3" length="20438077" type="audio/mpeg"/><itunes:duration>21:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cyera: The Future of Data Security in the Age of Artificial Intelligence</title><itunes:title>Cyera: The Future of Data Security in the Age of Artificial Intelligence</itunes:title><description><![CDATA[<p>The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed decision-making. However, this abundance of data also brings with it formidable challenges, particularly concerning privacy, security, and ethical considerations.</p><p>Data is often described as new oil, so safeguarding its integrity and protecting it from unauthorised access or misuse has become paramount. Data breaches and cyberattacks have become all too common, underscoring the critical need for robust security measures and vigilant oversight. Organisations can benefit from leveraging advanced cybersecurity solutions offered by platforms like Cyera to address these challenges.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/eheath1/" rel="noopener noreferrer" target="_blank">Emily Heath</a>, General Partner of VC firm Cyberstarts and former CISO of United Airlines and DocuSign, to discuss:&nbsp;&nbsp;</p><ul><li>Data security&nbsp;</li><li>CISOs and compliance</li><li>Data classification practices&nbsp;</li><li>Data classification and AI&nbsp;</li><li>The future of data security with AI</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed decision-making. However, this abundance of data also brings with it formidable challenges, particularly concerning privacy, security, and ethical considerations.</p><p>Data is often described as new oil, so safeguarding its integrity and protecting it from unauthorised access or misuse has become paramount. Data breaches and cyberattacks have become all too common, underscoring the critical need for robust security measures and vigilant oversight. Organisations can benefit from leveraging advanced cybersecurity solutions offered by platforms like Cyera to address these challenges.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/eheath1/" rel="noopener noreferrer" target="_blank">Emily Heath</a>, General Partner of VC firm Cyberstarts and former CISO of United Airlines and DocuSign, to discuss:&nbsp;&nbsp;</p><ul><li>Data security&nbsp;</li><li>CISOs and compliance</li><li>Data classification practices&nbsp;</li><li>Data classification and AI&nbsp;</li><li>The future of data security with AI</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c9ab76aa-6af3-4a78-a296-3d357afcea35</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 11 Apr 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/830c4c65-0187-4592-ab97-f0ca1b9636bb/EM360-PODCAST-Cyera-MASTER-converted.mp3" length="18299701" type="audio/mpeg"/><itunes:duration>19:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Beyond the Firewall: How Censornet Secures the Modern Enterprise</title><itunes:title>Beyond the Firewall: How Censornet Secures the Modern Enterprise</itunes:title><description><![CDATA[<p>Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management.&nbsp;</p><p>Today, Censornet offers a comprehensive suite of tools designed to confront the dynamic challenges of the digital landscape, ensuring a safer and more secure online environment for all. This evolution stems from recognising that traditional threats are no longer the sole concern. With the proliferation of Shadow IT, unauthorised applications and devices, and the rise of insider threats, organisations face a complex array of risks.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/computercrime?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAADM7oBXrTFVbKx7DikiBkzbuKeAU0-xv0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BHJ%2FX9FPoTIWWCF5Llj784w%3D%3D" rel="noopener noreferrer" target="_blank">Jonathan Care</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/garethlockwood/" rel="noopener noreferrer" target="_blank">Gareth Lockwood</a>, VP of Product at&nbsp;<a href="https://em360tech.com/solution-providers/censornet" rel="noopener noreferrer" target="_blank">Censornet</a>, to discuss:</p><ul><li>Inspiration behind Censornet&nbsp;</li><li>Censornet’s Capabilities&nbsp;</li><li>Censornet’s Clients&nbsp;</li><li>Shadow-IT&nbsp;</li><li>Prevention of future vulnerabilities with AI and Censornet</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management.&nbsp;</p><p>Today, Censornet offers a comprehensive suite of tools designed to confront the dynamic challenges of the digital landscape, ensuring a safer and more secure online environment for all. This evolution stems from recognising that traditional threats are no longer the sole concern. With the proliferation of Shadow IT, unauthorised applications and devices, and the rise of insider threats, organisations face a complex array of risks.&nbsp;</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/computercrime?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAADM7oBXrTFVbKx7DikiBkzbuKeAU0-xv0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BHJ%2FX9FPoTIWWCF5Llj784w%3D%3D" rel="noopener noreferrer" target="_blank">Jonathan Care</a>, Advisor at Lionfish Tech Advisors, speaks to&nbsp;<a href="https://www.linkedin.com/in/garethlockwood/" rel="noopener noreferrer" target="_blank">Gareth Lockwood</a>, VP of Product at&nbsp;<a href="https://em360tech.com/solution-providers/censornet" rel="noopener noreferrer" target="_blank">Censornet</a>, to discuss:</p><ul><li>Inspiration behind Censornet&nbsp;</li><li>Censornet’s Capabilities&nbsp;</li><li>Censornet’s Clients&nbsp;</li><li>Shadow-IT&nbsp;</li><li>Prevention of future vulnerabilities with AI and Censornet</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6e63d206-5fca-464e-97e4-3f5f9cc07578</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 27 Mar 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c0770911-28a1-467e-a5c0-a7d4dec5e609/EM360-PODCAST-Censornet-MASTER-converted.mp3" length="26147641" type="audio/mpeg"/><itunes:duration>27:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation</title><itunes:title>Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation</itunes:title><description><![CDATA[<p>Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows, augment analyst capabilities, and significantly enhance the organisation's overall cybersecurity defences.&nbsp;</p><p>Palo Alto Networks offers comprehensive MDR services, leveraging its threat intelligence and cutting-edge technology expertise. Unit 42, its esteemed threat intelligence team, is crucial in providing valuable insights into emerging threats and trends, empowering organisations to stay ahead of malicious actors.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="https://my.captivate.fm/www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/ophir-karako-005855a4/" rel="noopener noreferrer" target="_blank">Ophir Karako</a>, Software Engineer (Unit 42) at <a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:&nbsp;</p><ul><li>Palo Alto’s MDR Services&nbsp;</li><li>Operational Automation&nbsp;</li><li>Data Enrichment</li><li>Threat Response&nbsp;</li><li>Job security for SOC Analysts&nbsp;</li></ul><br/><p><em>Interested in learning more about XSOAR and Palo Alto Networks? You can find some additional resources below:</em></p><ul><li><a href="https://www.paloaltonetworks.com/customers/enloe-medical-center-strengthens-its-security-posture-and-improves-efficiency-with-unit-42-mdr?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>Enloe Medical Center Strengthens Its Security Posture and Improves Efficiency With Unit 42 MDR</em></a></li><li><a href="https://www.paloaltonetworks.com/resources/datasheets/unit42-managed-detection-and-response?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>Unit 42 Managed Detection and Response Service Datasheet</em></a></li><li><a href="https://start.paloaltonetworks.com/practical-guide-secops-automation?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>A Practical Guide to Deploying SecOps Automation</em></a></li></ul><br/><h3>Chapters</h3><p>00:00 - Introduction and Background</p><p>00:57 - MDR Services at Palo Alto Networks</p><p>03:20 - Automation in Operations</p><p>04:16&nbsp; - Automating Data Enrichment</p><p>05:13&nbsp; - Intellectual Property Playbooks and Scripts</p><p>05:41 - Customized Reports for Customers</p><p>06:10 - Automated Threat Response</p><p>07:08 - Insights and Lessons Learned from Automation</p><p>07:37 - Benefits of Automation for SOC Analysts</p><p>08:06 - Collaboration with Product Experts</p><p>09:04 - Treating Automation as a CI/CD Process</p><p>10:01 - The Future of Automation in Cybersecurity</p><p>12:51&nbsp; - Automation and Job Security for SOC Analysts</p><p>14:20 - Cortex XSOAR: Security Orchestration, Automation, and Response Platform</p><p>15:46 - Unit 42 MDR Service</p><p>16:16 - Conclusion</p>]]></description><content:encoded><![CDATA[<p>Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows, augment analyst capabilities, and significantly enhance the organisation's overall cybersecurity defences.&nbsp;</p><p>Palo Alto Networks offers comprehensive MDR services, leveraging its threat intelligence and cutting-edge technology expertise. Unit 42, its esteemed threat intelligence team, is crucial in providing valuable insights into emerging threats and trends, empowering organisations to stay ahead of malicious actors.&nbsp;</p><p>In this episode of the EM360 Podcast, <a href="https://my.captivate.fm/www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, speaks to <a href="https://www.linkedin.com/in/ophir-karako-005855a4/" rel="noopener noreferrer" target="_blank">Ophir Karako</a>, Software Engineer (Unit 42) at <a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:&nbsp;</p><ul><li>Palo Alto’s MDR Services&nbsp;</li><li>Operational Automation&nbsp;</li><li>Data Enrichment</li><li>Threat Response&nbsp;</li><li>Job security for SOC Analysts&nbsp;</li></ul><br/><p><em>Interested in learning more about XSOAR and Palo Alto Networks? You can find some additional resources below:</em></p><ul><li><a href="https://www.paloaltonetworks.com/customers/enloe-medical-center-strengthens-its-security-posture-and-improves-efficiency-with-unit-42-mdr?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>Enloe Medical Center Strengthens Its Security Posture and Improves Efficiency With Unit 42 MDR</em></a></li><li><a href="https://www.paloaltonetworks.com/resources/datasheets/unit42-managed-detection-and-response?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>Unit 42 Managed Detection and Response Service Datasheet</em></a></li><li><a href="https://start.paloaltonetworks.com/practical-guide-secops-automation?utm_source=em360&amp;utm_medium=podcast" rel="noopener noreferrer" target="_blank"><em>A Practical Guide to Deploying SecOps Automation</em></a></li></ul><br/><h3>Chapters</h3><p>00:00 - Introduction and Background</p><p>00:57 - MDR Services at Palo Alto Networks</p><p>03:20 - Automation in Operations</p><p>04:16&nbsp; - Automating Data Enrichment</p><p>05:13&nbsp; - Intellectual Property Playbooks and Scripts</p><p>05:41 - Customized Reports for Customers</p><p>06:10 - Automated Threat Response</p><p>07:08 - Insights and Lessons Learned from Automation</p><p>07:37 - Benefits of Automation for SOC Analysts</p><p>08:06 - Collaboration with Product Experts</p><p>09:04 - Treating Automation as a CI/CD Process</p><p>10:01 - The Future of Automation in Cybersecurity</p><p>12:51&nbsp; - Automation and Job Security for SOC Analysts</p><p>14:20 - Cortex XSOAR: Security Orchestration, Automation, and Response Platform</p><p>15:46 - Unit 42 MDR Service</p><p>16:16 - Conclusion</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8b40cff3-03f8-4298-8590-d5a7cc63e103</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Sat, 23 Mar 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8bb49976-2f44-45ee-86c3-e4b0f5dd36c8/EM360-PODCAST-Palo-Alto-3-MASTER-With-Edits-v2.mp3" length="27793882" type="audio/mpeg"/><itunes:duration>14:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices</title><itunes:title>Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices</itunes:title><description><![CDATA[<p>The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world.&nbsp;</p><p>The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent breach adequately.&nbsp;</p><p>This lack of transparency raises crucial questions about accountability and risk management in the mobile app development&nbsp;landscape, pushing organisations to re-evaluate their DevSecOps practices and prioritise robust security measures throughout the entire development lifecycle.</p><p>In this episode of the EM360 Podcast, Head of Podcast Production&nbsp;<a href="https://www.linkedin.com/in/paulina-rios-maya/" rel="noopener noreferrer" target="_blank">Paulina Rios Maya</a> speaks to <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, and <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" rel="noopener noreferrer" target="_blank">Tom Tovar</a>, CEO and Co-Creator of <a href="https://em360tech.com/solution-providers/appdome" rel="noopener noreferrer" target="_blank">Appdome</a>, to discuss:&nbsp;</p><ul><li>The SolarWinds indictment&nbsp;</li><li>The U.S. SEC 4-day rule</li><li>The impact on DevSecOps practices</li><li>BYOD and VPN security&nbsp;</li><li>The evolving role of cybersecurity</li><li>Building cyber resilience&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world.&nbsp;</p><p>The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent breach adequately.&nbsp;</p><p>This lack of transparency raises crucial questions about accountability and risk management in the mobile app development&nbsp;landscape, pushing organisations to re-evaluate their DevSecOps practices and prioritise robust security measures throughout the entire development lifecycle.</p><p>In this episode of the EM360 Podcast, Head of Podcast Production&nbsp;<a href="https://www.linkedin.com/in/paulina-rios-maya/" rel="noopener noreferrer" target="_blank">Paulina Rios Maya</a> speaks to <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>, Chief Research Analyst at IT-Harvest, and <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" rel="noopener noreferrer" target="_blank">Tom Tovar</a>, CEO and Co-Creator of <a href="https://em360tech.com/solution-providers/appdome" rel="noopener noreferrer" target="_blank">Appdome</a>, to discuss:&nbsp;</p><ul><li>The SolarWinds indictment&nbsp;</li><li>The U.S. SEC 4-day rule</li><li>The impact on DevSecOps practices</li><li>BYOD and VPN security&nbsp;</li><li>The evolving role of cybersecurity</li><li>Building cyber resilience&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b5a51c7a-e16c-4e8d-891d-0bc07ef4940d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 18 Mar 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5b323a28-720a-448e-a0ed-2e5fcd8769f6/EM360-PODCAST-Appdome-MASTER-3-0-converted.mp3" length="27724318" type="audio/mpeg"/><itunes:duration>28:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Radware: Why You Need Advanced Threat Intelligence</title><itunes:title>Radware: Why You Need Advanced Threat Intelligence</itunes:title><description><![CDATA[<p>The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, financial ruin, and damaged reputations.</p><p>That's where Advanced Threat Intelligence (ATI) comes in – a game-changer in the cybersecurity arsenal. Unlike our old shields, ATI offers real-time intel on the latest threats, how attackers operate, and their ever-evolving tactics.&nbsp;</p><p>Recognising the limitations of traditional security solutions, Radware goes beyond basic shields. Imagine a high-powered watchtower constantly scanning the digital horizon, identifying threats before they strike.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/arik-atar/" rel="noopener noreferrer" target="_blank"><strong>Arik Atar</strong></a>, Senior Threat Intelligence Researcher at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank"><strong>Radware</strong></a>, to discuss:&nbsp;</p><ul><li>The Current Threat Landscape</li><li>Modern Attacker Tactics</li><li>Romance Scams &amp; Pig Butchering</li><li>The Radware Advantage&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, financial ruin, and damaged reputations.</p><p>That's where Advanced Threat Intelligence (ATI) comes in – a game-changer in the cybersecurity arsenal. Unlike our old shields, ATI offers real-time intel on the latest threats, how attackers operate, and their ever-evolving tactics.&nbsp;</p><p>Recognising the limitations of traditional security solutions, Radware goes beyond basic shields. Imagine a high-powered watchtower constantly scanning the digital horizon, identifying threats before they strike.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank"><strong>Jonathan Care</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/arik-atar/" rel="noopener noreferrer" target="_blank"><strong>Arik Atar</strong></a>, Senior Threat Intelligence Researcher at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank"><strong>Radware</strong></a>, to discuss:&nbsp;</p><ul><li>The Current Threat Landscape</li><li>Modern Attacker Tactics</li><li>Romance Scams &amp; Pig Butchering</li><li>The Radware Advantage&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">51ce129d-b7c8-4d90-849b-18e6bfef066f</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 15 Mar 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5139f362-55f0-4886-9221-12bbb98dffa3/EM360-PODCAST-Radware-MASTER-converted.mp3" length="24728590" type="audio/mpeg"/><itunes:duration>25:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Risky Business: Navigating Enterprise Cloud Complexities with Evolven&apos;s CEO</title><itunes:title>Risky Business: Navigating Enterprise Cloud Complexities with Evolven&apos;s CEO</itunes:title><description><![CDATA[<p>The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.</p><p>While digital transformation has brought significant benefits, the reality is that organisations now require innovative solutions to effectively&nbsp;navigate intricate, hybrid, multi-cloud environments.</p><p>Evolven Software, driven by a mission to simplify complexity and mitigate risk, empowers large organisations to overcome the challenges of governing extensive hybrid ecosystems. By harnessing the power of AI/ML, Evolven enables a more secure, streamlined, and efficient cloud journey with fewer outages or compliance gaps.</p><p>In this episode of the EM360 Podcast, industry veteran <a href="https://www.linkedin.com/in/tomcroll?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACB1YYBjBSIS7H3dbkqiDOnfQUyMg1VTww&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BoDzRWGCdQfy%2BJjtGAD%2Bnsg%3D%3D" rel="noopener noreferrer" target="_blank">Tom Croll</a>, advisor at <a href="https://www.linkedin.com/company/lionfish-tech-advisors/?lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3ByCUq%2FWlfTwmB9V%2Bjtaplow%3D%3D" rel="noopener noreferrer" target="_blank">Lionfish Tech Advisors</a>, speaks to <a href="https://www.linkedin.com/in/sashagilenson?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAALX3cBhvztzzKV9IYe9qc9WwAAl7VO2xQ&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BZmtWe3dgSxC%2FKVZXX4ZWSQ%3D%3D" rel="noopener noreferrer" target="_blank">Sasha Gilenson</a>, Founder and CEO of <a href="https://em360tech.com/solution-providers/evolven" rel="noopener noreferrer" target="_blank">Evolven Software</a>, to discuss:&nbsp;</p><ul><li>The current state of enterprise cloud architectures and the challenges in managing hybrid multi-cloud environments.</li><li>Why managing risk in hybrid multi-cloud environments demands a new paradigm.</li><li>The unique challenges large organizations face in maintaining visibility, control, and governance across their landscapes.</li><li>How Evolven's AI/ML-driven solution empowers enterprises to overcome this complexity, enhance security, and optimize performance.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.</p><p>While digital transformation has brought significant benefits, the reality is that organisations now require innovative solutions to effectively&nbsp;navigate intricate, hybrid, multi-cloud environments.</p><p>Evolven Software, driven by a mission to simplify complexity and mitigate risk, empowers large organisations to overcome the challenges of governing extensive hybrid ecosystems. By harnessing the power of AI/ML, Evolven enables a more secure, streamlined, and efficient cloud journey with fewer outages or compliance gaps.</p><p>In this episode of the EM360 Podcast, industry veteran <a href="https://www.linkedin.com/in/tomcroll?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACB1YYBjBSIS7H3dbkqiDOnfQUyMg1VTww&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BoDzRWGCdQfy%2BJjtGAD%2Bnsg%3D%3D" rel="noopener noreferrer" target="_blank">Tom Croll</a>, advisor at <a href="https://www.linkedin.com/company/lionfish-tech-advisors/?lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3ByCUq%2FWlfTwmB9V%2Bjtaplow%3D%3D" rel="noopener noreferrer" target="_blank">Lionfish Tech Advisors</a>, speaks to <a href="https://www.linkedin.com/in/sashagilenson?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAALX3cBhvztzzKV9IYe9qc9WwAAl7VO2xQ&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BZmtWe3dgSxC%2FKVZXX4ZWSQ%3D%3D" rel="noopener noreferrer" target="_blank">Sasha Gilenson</a>, Founder and CEO of <a href="https://em360tech.com/solution-providers/evolven" rel="noopener noreferrer" target="_blank">Evolven Software</a>, to discuss:&nbsp;</p><ul><li>The current state of enterprise cloud architectures and the challenges in managing hybrid multi-cloud environments.</li><li>Why managing risk in hybrid multi-cloud environments demands a new paradigm.</li><li>The unique challenges large organizations face in maintaining visibility, control, and governance across their landscapes.</li><li>How Evolven's AI/ML-driven solution empowers enterprises to overcome this complexity, enhance security, and optimize performance.</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">17bb8cf7-dc83-496b-9789-fdc5cccec975</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 12 Mar 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e5ffa7c-7074-432b-bb6e-40837fa2486c/EM360-PODCAST-Evolven-MASTER-converted.mp3" length="29142535" type="audio/mpeg"/><itunes:duration>30:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Pentera: Automated Security Validation and Empowering Pen Testing Teams</title><itunes:title>Pentera: Automated Security Validation and Empowering Pen Testing Teams</itunes:title><description><![CDATA[<p>Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation.&nbsp;</p><p>But how does this implementation of automation really work to empower human expertise? How does all of this relate to compliance? And what words of wisdom can be given for those looking to level up their security strategy in 2024?</p><p>In this episode of the EM360 Podcast, Analyst <a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a> speaks to <a href="https://www.linkedin.com/in/thomaspore/" rel="noopener noreferrer" target="_blank">Thomas Pore</a>, Director of Product Marketing at <a href="https://em360tech.com/solution-providers/pentera" rel="noopener noreferrer" target="_blank">Pentera</a>, as they discuss:</p><ul><li>The pen-testing landscape</li><li>&nbsp;How important testing and validating are</li><li>Empowering human expertise and remaining compliant</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation.&nbsp;</p><p>But how does this implementation of automation really work to empower human expertise? How does all of this relate to compliance? And what words of wisdom can be given for those looking to level up their security strategy in 2024?</p><p>In this episode of the EM360 Podcast, Analyst <a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a> speaks to <a href="https://www.linkedin.com/in/thomaspore/" rel="noopener noreferrer" target="_blank">Thomas Pore</a>, Director of Product Marketing at <a href="https://em360tech.com/solution-providers/pentera" rel="noopener noreferrer" target="_blank">Pentera</a>, as they discuss:</p><ul><li>The pen-testing landscape</li><li>&nbsp;How important testing and validating are</li><li>Empowering human expertise and remaining compliant</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f12d2c30-bccd-48e1-98a7-1376941003a6</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 19 Feb 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/9b392167-bdf9-487f-b345-4976675c4094/EM360-PODCAST-Pentera-MASTER-converted.mp3" length="16910674" type="audio/mpeg"/><itunes:duration>17:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Zero Networks: The Problem with VPNs</title><itunes:title>Zero Networks: The Problem with VPNs</itunes:title><description><![CDATA[<p>It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks.&nbsp;</p><p>This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities, as well as Cisco when they admitted last year that Akira Ransomware was specifically targeting their VPNs.</p><p>But what is the real problem with VPNs - and are they vulnerable by design? How do they fit into wider security architectures and strategies?&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/bennyl/" rel="noopener noreferrer" target="_blank">Benny Lakunishok</a>, Co-Founder and CEO of <a href="https://em360tech.com/solution-providers/zero-networks" rel="noopener noreferrer" target="_blank">Zero Networks</a>,&nbsp;to discuss:</p><ul><li>The problem with VPNs</li><li>‘Insecure by default’?</li><li>ZTNA and remote access solutions</li></ul><br/>]]></description><content:encoded><![CDATA[<p>It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks.&nbsp;</p><p>This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities, as well as Cisco when they admitted last year that Akira Ransomware was specifically targeting their VPNs.</p><p>But what is the real problem with VPNs - and are they vulnerable by design? How do they fit into wider security architectures and strategies?&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst <a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/bennyl/" rel="noopener noreferrer" target="_blank">Benny Lakunishok</a>, Co-Founder and CEO of <a href="https://em360tech.com/solution-providers/zero-networks" rel="noopener noreferrer" target="_blank">Zero Networks</a>,&nbsp;to discuss:</p><ul><li>The problem with VPNs</li><li>‘Insecure by default’?</li><li>ZTNA and remote access solutions</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">97a0d4b2-0b3a-46f3-a33f-99d8378231dd</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 14 Feb 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f4254325-4325-48e8-a59f-2c47810f0da6/EM360-PODCAST-Zero-Networks-2-MASTER-1-converted.mp3" length="13379934" type="audio/mpeg"/><itunes:duration>13:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options</title><itunes:title>Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options</itunes:title><description><![CDATA[<p>Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response is an important part of any security strategy.&nbsp;</p><p>With the rise and innovation we see in the automation space right now, how could automation be implemented into a security strategy to level up the efficacy of rapid breach response?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/devin-johnstone/" rel="noopener noreferrer" target="_blank"><strong>Devin Johnstone</strong></a>, Security Operations Specialist at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank"><strong>Palo Alto Networks</strong></a>, to discuss:&nbsp;</p><ul><li>Demystifying rapid breach response</li><li>Implementing and leveraging automation in RBR</li><li>Advice for SOC teams and shifting mindset</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response is an important part of any security strategy.&nbsp;</p><p>With the rise and innovation we see in the automation space right now, how could automation be implemented into a security strategy to level up the efficacy of rapid breach response?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/devin-johnstone/" rel="noopener noreferrer" target="_blank"><strong>Devin Johnstone</strong></a>, Security Operations Specialist at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank"><strong>Palo Alto Networks</strong></a>, to discuss:&nbsp;</p><ul><li>Demystifying rapid breach response</li><li>Implementing and leveraging automation in RBR</li><li>Advice for SOC teams and shifting mindset</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">94d5e1bb-6579-4dcc-9f0d-20beb7348dc0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 06 Feb 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/49d564bb-6ca1-46cf-bf8e-60dbbd8ba11b/PAN-2-v2-mixdown.mp3" length="27389646" type="audio/mpeg"/><itunes:duration>19:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Thoropass: Fixing the Broken Audit Process</title><itunes:title>Thoropass: Fixing the Broken Audit Process</itunes:title><description><![CDATA[<p>The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately needs updating.&nbsp;</p><p>But how can technology be leveraged to streamline or even transform that auditing process? And what does the future of infosecurity compliance look like?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/leithk/" rel="noopener noreferrer" target="_blank"><strong>Leith Khanafseh</strong></a>, Managing Director of Assurance and Compliance Products at&nbsp;<a href="https://em360tech.com/solution-providers/thoropass" rel="noopener noreferrer" target="_blank"><strong>Thoropass</strong></a>&nbsp;as they discuss:</p><ul><li>The old audit landscape</li><li>Challenges for CISOs and CTOs</li><li>Multiframeworks and the future of compliance</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately needs updating.&nbsp;</p><p>But how can technology be leveraged to streamline or even transform that auditing process? And what does the future of infosecurity compliance look like?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/leithk/" rel="noopener noreferrer" target="_blank"><strong>Leith Khanafseh</strong></a>, Managing Director of Assurance and Compliance Products at&nbsp;<a href="https://em360tech.com/solution-providers/thoropass" rel="noopener noreferrer" target="_blank"><strong>Thoropass</strong></a>&nbsp;as they discuss:</p><ul><li>The old audit landscape</li><li>Challenges for CISOs and CTOs</li><li>Multiframeworks and the future of compliance</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">7d4cc7f9-eb3c-41b3-a3b5-5b72014f62c4</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 31 Jan 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e93b3d49-2049-4809-807b-7405908472db/thoropass-v3.mp3" length="22247702" type="audio/mpeg"/><itunes:duration>15:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>CloudSEK: The Future of Software Supply Chain Security</title><itunes:title>CloudSEK: The Future of Software Supply Chain Security</itunes:title><description><![CDATA[<p>In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security.</p><p>When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations’ data safe.&nbsp;&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/fb1h2s/" rel="noopener noreferrer" target="_blank">Rahul Sasi</a>, Co-Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/cloudsek" rel="noopener noreferrer" target="_blank">CloudSEK</a>, to discuss:&nbsp;</p><ul><li>Current state of cloud computing security</li><li>Common vulnerabilities in the software supply chain</li><li>Remote work, cloud reliance and mitigating risk</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security.</p><p>When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations’ data safe.&nbsp;&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/fb1h2s/" rel="noopener noreferrer" target="_blank">Rahul Sasi</a>, Co-Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/cloudsek" rel="noopener noreferrer" target="_blank">CloudSEK</a>, to discuss:&nbsp;</p><ul><li>Current state of cloud computing security</li><li>Common vulnerabilities in the software supply chain</li><li>Remote work, cloud reliance and mitigating risk</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3e60579d-8bb6-4fd2-9d9f-ba138b8dac46</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 30 Jan 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/93424c04-fb63-43ac-8338-8f10b5040814/EM360-PODCAST-CloudSEK-MASTER-converted.mp3" length="13575507" type="audio/mpeg"/><itunes:duration>14:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Radware: Moving From Responsive Protection to Proactive Protection</title><itunes:title>Radware: Moving From Responsive Protection to Proactive Protection</itunes:title><description><![CDATA[<p>In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one.&nbsp;</p><p>This shift isn’t just a technological upgrade - it’s a fundamental change in mindset that can cause ripples throughout the business.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAwL390Bpf3rN4WUiIDcznkHNvxlPF51T3Q&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWjlhRypRveFTP2zEzw%2BDQ%3D%3D" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>&nbsp;as they&nbsp;discuss:</p><ul><li>AI-powered attacks</li><li>Responsive protection vs proactive protection</li><li>How proactivity works in practice</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one.&nbsp;</p><p>This shift isn’t just a technological upgrade - it’s a fundamental change in mindset that can cause ripples throughout the business.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAwL390Bpf3rN4WUiIDcznkHNvxlPF51T3Q&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWjlhRypRveFTP2zEzw%2BDQ%3D%3D" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>&nbsp;as they&nbsp;discuss:</p><ul><li>AI-powered attacks</li><li>Responsive protection vs proactive protection</li><li>How proactivity works in practice</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">08f09857-9811-425a-9950-b2e3019d6293</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 24 Jan 2024 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0b8b523-02be-40f6-8a14-6945ef42bd1e/EM360-PODCAST-Radware-2-MASTER-converted.mp3" length="17564113" type="audio/mpeg"/><itunes:duration>18:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation</title><itunes:title>Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation</itunes:title><description><![CDATA[<p>Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats.&nbsp;</p><p>By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potential incidents.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/priyankaricha/" rel="noopener noreferrer" target="_blank">Richa Priyanka</a>, Solutions Architect at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:</p><ul><li>Role of threat hunting in SOC</li><li>Typical threat intelligence feeds for incident investigation</li><li>The future of threat hunting</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats.&nbsp;</p><p>By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potential incidents.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/priyankaricha/" rel="noopener noreferrer" target="_blank">Richa Priyanka</a>, Solutions Architect at&nbsp;<a href="https://em360tech.com/solution-providers/palo-alto-networks" rel="noopener noreferrer" target="_blank">Palo Alto Networks</a>, to discuss:</p><ul><li>Role of threat hunting in SOC</li><li>Typical threat intelligence feeds for incident investigation</li><li>The future of threat hunting</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ecd6683b-8723-40dc-a1b0-8cb42343395e</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 30 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8c7afebe-a909-4118-a704-5de4bdc56a57/EM360-PODCAST-Palo-Alto-1-MASTER-converted.mp3" length="21031468" type="audio/mpeg"/><itunes:duration>21:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Radware: 360 Application Protection and Why Companies Need It</title><itunes:title>Radware: 360 Application Protection and Why Companies Need It</itunes:title><description><![CDATA[<p>Application security is a complex, wide-ranging field.&nbsp;</p><p>With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAwL390Bpf3rN4WUiIDcznkHNvxlPF51T3Q&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWjlhRypRveFTP2zEzw%2BDQ%3D%3D" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>, to discuss:</h2><ul><li>Main challenges in protecting applications</li><li>Growing threat landscape</li><li>Consistent security across multi-cloud and hybrid environments</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Application security is a complex, wide-ranging field.&nbsp;</p><p>With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/computercrime/" rel="noopener noreferrer" target="_blank">Jonathan Care</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAwL390Bpf3rN4WUiIDcznkHNvxlPF51T3Q&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWjlhRypRveFTP2zEzw%2BDQ%3D%3D" rel="noopener noreferrer" target="_blank">Uri Dorot</a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank">Radware</a>, to discuss:</h2><ul><li>Main challenges in protecting applications</li><li>Growing threat landscape</li><li>Consistent security across multi-cloud and hybrid environments</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e668ffa0-083c-4e08-97d3-c17238a97111</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 15 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/578f74e9-c32d-4f27-8d37-b209406c22de/EM360-PODCAST-Radware-1-MASTER-1-0-converted.mp3" length="35277022" type="audio/mpeg"/><itunes:duration>36:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Huntress: Doing More With Less in Your Cybersecurity Strategy</title><itunes:title>Huntress: Doing More With Less in Your Cybersecurity Strategy</itunes:title><description><![CDATA[<p>Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats.&nbsp;</p><p>From assessing and prioritising assets to utilising open source tools, understaffed and overstretched cybersecurity teams are looking at ways to maximise what they’re able to do.&nbsp;</p><p>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://www.linkedin.com/in/matt-harris-269bb7177/" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/chrishvm/" rel="noopener noreferrer" target="_blank">Chris Cochran</a>, Advisory CISO and Chief Evangelist at&nbsp;<a href="https://em360tech.com/solution-providers/huntress" rel="noopener noreferrer" target="_blank">Huntress</a>, to discuss:</p><ul><li>Doing more with less - and why that’s necessary</li><li>Equipping teams to be proactive&nbsp;</li><li>Cybersecurity challenges specific to healthcare industry</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats.&nbsp;</p><p>From assessing and prioritising assets to utilising open source tools, understaffed and overstretched cybersecurity teams are looking at ways to maximise what they’re able to do.&nbsp;</p><p>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://www.linkedin.com/in/matt-harris-269bb7177/" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/chrishvm/" rel="noopener noreferrer" target="_blank">Chris Cochran</a>, Advisory CISO and Chief Evangelist at&nbsp;<a href="https://em360tech.com/solution-providers/huntress" rel="noopener noreferrer" target="_blank">Huntress</a>, to discuss:</p><ul><li>Doing more with less - and why that’s necessary</li><li>Equipping teams to be proactive&nbsp;</li><li>Cybersecurity challenges specific to healthcare industry</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">8b933bcd-b7f3-4c5a-ba27-0ddfb1611735</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 14 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/780ac4cc-c375-4b4e-9ab9-442a49ac1690/EM360-PODCAST-Huntress-editor-MASTER-converted.mp3" length="14814831" type="audio/mpeg"/><itunes:duration>15:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Savvy: SaaS Identity Discovery and Visibility</title><itunes:title>Savvy: SaaS Identity Discovery and Visibility</itunes:title><description><![CDATA[<p>Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service.</p><p>From data encryption and identity management to network security and a solid incident response plan, there are some crucial things to consider when employing SaaS as a part of your workflow.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/guyguzner/" rel="noopener noreferrer" target="_blank">Guy Guzner</a>, CEO and Co-Founder of&nbsp;<a href="https://em360tech.com/solution-providers/savvy" rel="noopener noreferrer" target="_blank">Savvy Security</a>, to discuss:</p><ul><li>Security challenges with SaaS</li><li>Key worries from CISOs and CIOs</li><li>The problem with existing solutions today</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service.</p><p>From data encryption and identity management to network security and a solid incident response plan, there are some crucial things to consider when employing SaaS as a part of your workflow.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/guyguzner/" rel="noopener noreferrer" target="_blank">Guy Guzner</a>, CEO and Co-Founder of&nbsp;<a href="https://em360tech.com/solution-providers/savvy" rel="noopener noreferrer" target="_blank">Savvy Security</a>, to discuss:</p><ul><li>Security challenges with SaaS</li><li>Key worries from CISOs and CIOs</li><li>The problem with existing solutions today</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b2b29c83-a059-488f-aae7-7a7e42da6d37</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 13 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/dac0cf05-1817-47ba-9294-a81a7efc932a/EM360-PODCAST-Savvy-MASTER-converted.mp3" length="22802050" type="audio/mpeg"/><itunes:duration>23:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cyera: Why Data Defence is so Difficult in the TikTok Era</title><itunes:title>Cyera: Why Data Defence is so Difficult in the TikTok Era</itunes:title><description><![CDATA[<p>Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries.&nbsp;</p><p>However, data security has long relied on legacy architectures and outdated approaches that were developed to protect data on-premises.&nbsp;</p><p>By harnessing artificial intelligence and machine learning to automatically learn and holistically protect a company's unique data, new AI-powered data security platforms are revolutionising data security for the cloud era.</p><p>In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Roland Cloutier, the former Global Chief Security Officer of TikTok &amp; ByteDance, to discuss:&nbsp;</p><ul><li>Social media and data privacy conversation&nbsp;</li><li>Balancing leveraging data with preventing breaches</li><li>Intelligently harnessing AI and ML for your data strategy</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries.&nbsp;</p><p>However, data security has long relied on legacy architectures and outdated approaches that were developed to protect data on-premises.&nbsp;</p><p>By harnessing artificial intelligence and machine learning to automatically learn and holistically protect a company's unique data, new AI-powered data security platforms are revolutionising data security for the cloud era.</p><p>In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Roland Cloutier, the former Global Chief Security Officer of TikTok &amp; ByteDance, to discuss:&nbsp;</p><ul><li>Social media and data privacy conversation&nbsp;</li><li>Balancing leveraging data with preventing breaches</li><li>Intelligently harnessing AI and ML for your data strategy</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">87f79836-34dc-4b0a-b9a7-ac840c4b5d6d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 09 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/3f3cf484-92d3-49dc-bdf6-2a96779d4287/EM360-PODCAST-Cyera-2-MASTER-converted.mp3" length="20580274" type="audio/mpeg"/><itunes:duration>21:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cyera: How Generative AI is Driving Investments in Data Security</title><itunes:title>Cyera: How Generative AI is Driving Investments in Data Security</itunes:title><description><![CDATA[<p>No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact.&nbsp;</p><p>But there are many questions, including whether open source models perform as well as proprietary research? Will data compliance continue to be the main challenge the industry faces? What does the right to be forgotten mean in a world where gen AI exists?&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/philippebotteri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAIuikBSw2u4x1LEG6Qi1E0cqeVfOvj8q4&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWK9%2BAjsQfuJLVbC0twYJA%3D%3D" rel="noopener noreferrer" target="_blank">Philippe Botteri</a>, Partner at&nbsp;<a href="https://www.linkedin.com/company/accel-vc/" rel="noopener noreferrer" target="_blank">Accel</a>, discuss:</p><ul><li>The world of data security</li><li>Open source models vs proprietary research</li><li>Data compliance today</li></ul><br/><p><em>Accel</em>&nbsp;is a proud partner of&nbsp;<em>Cyera</em>, read more below about how they're addressing the most pressing problems in cloud security.</p>]]></description><content:encoded><![CDATA[<p>No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact.&nbsp;</p><p>But there are many questions, including whether open source models perform as well as proprietary research? Will data compliance continue to be the main challenge the industry faces? What does the right to be forgotten mean in a world where gen AI exists?&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/philippebotteri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAIuikBSw2u4x1LEG6Qi1E0cqeVfOvj8q4&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BvWK9%2BAjsQfuJLVbC0twYJA%3D%3D" rel="noopener noreferrer" target="_blank">Philippe Botteri</a>, Partner at&nbsp;<a href="https://www.linkedin.com/company/accel-vc/" rel="noopener noreferrer" target="_blank">Accel</a>, discuss:</p><ul><li>The world of data security</li><li>Open source models vs proprietary research</li><li>Data compliance today</li></ul><br/><p><em>Accel</em>&nbsp;is a proud partner of&nbsp;<em>Cyera</em>, read more below about how they're addressing the most pressing problems in cloud security.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4a32e4dc-a451-4f69-b9b3-f81d5a10a4e1</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 06 Nov 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/cb349b21-0329-42da-82bd-bdd6212b0317/EM360-PODCAST-Cyera-3-Phillipe-Botteri-MASTER-1-converted.mp3" length="21740785" type="audio/mpeg"/><itunes:duration>22:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Zero Networks: We’re Sick of Zero Trust Too!</title><itunes:title>Zero Networks: We’re Sick of Zero Trust Too!</itunes:title><description><![CDATA[<p>Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network.&nbsp;</p><p>Traditionally, network security models operated under the assumption that everything inside the corporate network could be trusted and that once someone gained access to the network, they could be trusted to access various resources.</p><p>This is no longer viable in 2023 and beyond - with the increase of sophisticated cyber attacks, denying by default has become the norm for companies looking to secure their sensitive data.</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/bennyl/" rel="noopener noreferrer" target="_blank">Benny Lakunishok</a>, Co-Founder and CEO of&nbsp;<a href="https://em360tech.com/solution-providers/zero-networks" rel="noopener noreferrer" target="_blank">Zero Networks</a>&nbsp;to discuss:</h2><ul><li>What it means to have a true zero trust strategy</li><li>Zero trust challenges</li><li>MFA and the future of network security</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network.&nbsp;</p><p>Traditionally, network security models operated under the assumption that everything inside the corporate network could be trusted and that once someone gained access to the network, they could be trusted to access various resources.</p><p>This is no longer viable in 2023 and beyond - with the increase of sophisticated cyber attacks, denying by default has become the norm for companies looking to secure their sensitive data.</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/bennyl/" rel="noopener noreferrer" target="_blank">Benny Lakunishok</a>, Co-Founder and CEO of&nbsp;<a href="https://em360tech.com/solution-providers/zero-networks" rel="noopener noreferrer" target="_blank">Zero Networks</a>&nbsp;to discuss:</h2><ul><li>What it means to have a true zero trust strategy</li><li>Zero trust challenges</li><li>MFA and the future of network security</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ee4ff209-049e-4aa6-a003-823e8aa8c409</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 31 Oct 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e10a988f-d6fd-4989-b7b6-a8efb3e8a797/EM360-PODCAST-Zero-Networks-1-MASTER-converted.mp3" length="19727509" type="audio/mpeg"/><itunes:duration>20:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Blumira: Choosing the Right XDR Strategy In The Financial Industry</title><itunes:title>Blumira: Choosing the Right XDR Strategy In The Financial Industry</itunes:title><description><![CDATA[<p>XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and reducing response time to safeguard against data breaches.</p><p>Starting from a solid foundation of centralized logs, organizations can use XDR as part of their cybersecurity strategy to detect breaches across many different sources of data.&nbsp;</p><p>If we look specifically at the financial industry, XDR can be key in stopping attacks rapidly before they cause too much damage. Through reducing complexity and providing stack-wide visibility, SMBs within the banking sector can solve common challenges like understaffed teams and daunting compliance requirements.</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://www.linkedin.com/in/matt-harris-269bb7177/" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewowenwarner/" rel="noopener noreferrer" target="_blank"><strong>Matthew Warner</strong></a>, CTO and Co-founder of&nbsp;<a href="https://em360tech.com/solution-providers/blumira" rel="noopener noreferrer" target="_blank"><strong>Blumira</strong></a>, to discuss:&nbsp;</h2><ul><li>Security pain points in the BFSI space</li><li>The difference between EDR and XDR</li><li>Choosing the right XDR strategy for your business</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and reducing response time to safeguard against data breaches.</p><p>Starting from a solid foundation of centralized logs, organizations can use XDR as part of their cybersecurity strategy to detect breaches across many different sources of data.&nbsp;</p><p>If we look specifically at the financial industry, XDR can be key in stopping attacks rapidly before they cause too much damage. Through reducing complexity and providing stack-wide visibility, SMBs within the banking sector can solve common challenges like understaffed teams and daunting compliance requirements.</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://www.linkedin.com/in/matt-harris-269bb7177/" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewowenwarner/" rel="noopener noreferrer" target="_blank"><strong>Matthew Warner</strong></a>, CTO and Co-founder of&nbsp;<a href="https://em360tech.com/solution-providers/blumira" rel="noopener noreferrer" target="_blank"><strong>Blumira</strong></a>, to discuss:&nbsp;</h2><ul><li>Security pain points in the BFSI space</li><li>The difference between EDR and XDR</li><li>Choosing the right XDR strategy for your business</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0c1218e8-5959-4298-b152-0e4324779fcf</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 26 Oct 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/ff62071f-c938-4d25-9a15-f7d72705d1d4/EM360-PODCAST-Blumira-MASTER-converted.mp3" length="17196736" type="audio/mpeg"/><itunes:duration>17:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Huntress: The Future of Cybersecurity Leadership</title><itunes:title>Huntress: The Future of Cybersecurity Leadership</itunes:title><description><![CDATA[<p>It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity leaders across the globe.&nbsp;</p><p>The unique challenges in the security space have been forcing industry leaders to switch up the ways they operate, specifically in the MSP space.</p><p>What does it mean to be a cybersecurity leader today? How have cyber attackers been changing their approach?&nbsp;</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/chrishvm/" rel="noopener noreferrer" target="_blank"><strong>Chris Cochran</strong></a>, Advisory CISO and Chief Evangelist at&nbsp;<a href="https://em360tech.com/solution-providers/huntress" rel="noopener noreferrer" target="_blank"><strong>Huntress</strong></a>, to discuss:</h2><ul><li>Current state of cybersecurity leadership</li><li>Challenges faced by CISOs and IT Directors are facing</li><li>Cybersecurity horror stories</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity leaders across the globe.&nbsp;</p><p>The unique challenges in the security space have been forcing industry leaders to switch up the ways they operate, specifically in the MSP space.</p><p>What does it mean to be a cybersecurity leader today? How have cyber attackers been changing their approach?&nbsp;</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/chrishvm/" rel="noopener noreferrer" target="_blank"><strong>Chris Cochran</strong></a>, Advisory CISO and Chief Evangelist at&nbsp;<a href="https://em360tech.com/solution-providers/huntress" rel="noopener noreferrer" target="_blank"><strong>Huntress</strong></a>, to discuss:</h2><ul><li>Current state of cybersecurity leadership</li><li>Challenges faced by CISOs and IT Directors are facing</li><li>Cybersecurity horror stories</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0db852ea-8837-4707-a3e5-bf9d8bafa4e0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 25 Oct 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5620410e-2778-4672-bdf7-e32d9186fbb8/EM360-PODCAST-Huntress-MASTER-converted.mp3" length="19985215" type="audio/mpeg"/><itunes:duration>20:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cyera: Revolutionising Data Security for the Cloud Era</title><itunes:title>Cyera: Revolutionising Data Security for the Cloud Era</itunes:title><description><![CDATA[<p>Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."&nbsp;</p><p>The ability to leverage data for day-to-day activities improves decision making, and fosters better innovation, collaboration, and communication.&nbsp;</p><p>With deep insight into the data they have, and the confidence that their data is secure, Cyera is enabling enterprises to leverage data to create truly differentiated customer and employee experiences.</p><p>In today’s episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/yotam-segev/" rel="noopener noreferrer" target="_blank">Yotam Segev</a>, CEO and Co-Founder at&nbsp;<a href="https://em360tech.com/solution-providers/cyera" rel="noopener noreferrer" target="_blank">Cyera</a>, to discuss:</p><ul><li>Data security&nbsp;</li><li>Why this is still a challenge</li><li>Striking a balance between creating new steams&nbsp;</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."&nbsp;</p><p>The ability to leverage data for day-to-day activities improves decision making, and fosters better innovation, collaboration, and communication.&nbsp;</p><p>With deep insight into the data they have, and the confidence that their data is secure, Cyera is enabling enterprises to leverage data to create truly differentiated customer and employee experiences.</p><p>In today’s episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/yotam-segev/" rel="noopener noreferrer" target="_blank">Yotam Segev</a>, CEO and Co-Founder at&nbsp;<a href="https://em360tech.com/solution-providers/cyera" rel="noopener noreferrer" target="_blank">Cyera</a>, to discuss:</p><ul><li>Data security&nbsp;</li><li>Why this is still a challenge</li><li>Striking a balance between creating new steams&nbsp;</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4272b6b1-63f1-42f9-9fda-110ed4a3f43c</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 10 Oct 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/222d8aa2-0afa-44ea-98ad-53b12418cedf/EM360-PODCAST-Cyera-1-MASTER-converted.mp3" length="16144645" type="audio/mpeg"/><itunes:duration>16:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence</title><itunes:title>CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence</itunes:title><description><![CDATA[<p>Monitoring cyber risk is essential in today's interconnected landscape.&nbsp;</p><p>Involving continuous assessment of vulnerabilities, threat detection, and response readiness, companies should be looking at the best way to protect themselves.</p><p>But is offence really the best defence? Does a proactive stance provide more of a formidable cybersecurity posture than a reactive stance? And how are the brightest minds in security mastering the art of minimising damage and downtime?</p><p>In today’s episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/ericcole1/" rel="noopener noreferrer" target="_blank">Dr. Eric Cole</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/michael-quattrochi-6b51611/" rel="noopener noreferrer" target="_blank">Michael Quattrochi</a>, SVP of Defensive Security at&nbsp;<a href="https://em360tech.com/solution-providers/cybermaxx" rel="noopener noreferrer" target="_blank">CyberMaxx</a>, to discuss:</p><ul><li>Offence fueling defence</li><li>Monitoring cyber risk</li><li>Common exploitation trends</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Monitoring cyber risk is essential in today's interconnected landscape.&nbsp;</p><p>Involving continuous assessment of vulnerabilities, threat detection, and response readiness, companies should be looking at the best way to protect themselves.</p><p>But is offence really the best defence? Does a proactive stance provide more of a formidable cybersecurity posture than a reactive stance? And how are the brightest minds in security mastering the art of minimising damage and downtime?</p><p>In today’s episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/ericcole1/" rel="noopener noreferrer" target="_blank">Dr. Eric Cole</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/michael-quattrochi-6b51611/" rel="noopener noreferrer" target="_blank">Michael Quattrochi</a>, SVP of Defensive Security at&nbsp;<a href="https://em360tech.com/solution-providers/cybermaxx" rel="noopener noreferrer" target="_blank">CyberMaxx</a>, to discuss:</p><ul><li>Offence fueling defence</li><li>Monitoring cyber risk</li><li>Common exploitation trends</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6f8a4680-31f2-405c-aed8-5dc2a1e2289c</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 21 Aug 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/dc23d892-e8fd-40e9-8671-71f29f460799/EM360-PODCAST-CyberMaxx-MASTER-converted.mp3" length="18129982" type="audio/mpeg"/><itunes:duration>18:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>TrustArc: The Evolution of Privacy Laws</title><itunes:title>TrustArc: The Evolution of Privacy Laws</itunes:title><description><![CDATA[<p>Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals.&nbsp;</p><p>Designed to govern the collection, use, storage, and sharing of personal data by businesses, the primary objectives of privacy laws are to ensure that individuals have control over their personal information and to prevent its misuse.</p><p>But how have these laws developed over time? And between website friction to removal requests, what complications arise with privacy law compliance and how can these be more efficiently navigated?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQy%2FKJYOBSy2Mdaq%2FmPH3MA%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/meaghan-mccluskey-6703488a/" rel="noopener noreferrer" target="_blank">Meaghan McCluskey</a>, Associate General Counsel at&nbsp;<a href="https://em360tech.com/solution-providers/trustarc" rel="noopener noreferrer" target="_blank">TrustArc</a>, about:</p><ul><li>Where privacy laws came from, and how they got to where they are now</li><li>Penalties for non-compliance</li><li>Downsides of privacy law compliance</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals.&nbsp;</p><p>Designed to govern the collection, use, storage, and sharing of personal data by businesses, the primary objectives of privacy laws are to ensure that individuals have control over their personal information and to prevent its misuse.</p><p>But how have these laws developed over time? And between website friction to removal requests, what complications arise with privacy law compliance and how can these be more efficiently navigated?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQy%2FKJYOBSy2Mdaq%2FmPH3MA%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/meaghan-mccluskey-6703488a/" rel="noopener noreferrer" target="_blank">Meaghan McCluskey</a>, Associate General Counsel at&nbsp;<a href="https://em360tech.com/solution-providers/trustarc" rel="noopener noreferrer" target="_blank">TrustArc</a>, about:</p><ul><li>Where privacy laws came from, and how they got to where they are now</li><li>Penalties for non-compliance</li><li>Downsides of privacy law compliance</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">86063e8e-65af-4a16-aa0b-fdb34ee80a17</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 04 Aug 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c01ce140-8550-4b6a-b9d7-292a4241ec1f/EM360-PODCAST-TrustArc-2-MASTER-1-converted.mp3" length="20718301" type="audio/mpeg"/><itunes:duration>21:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Salvador Technologies: The Art of Cyber Attack Recovery</title><itunes:title>Salvador Technologies: The Art of Cyber Attack Recovery</itunes:title><description><![CDATA[<p>The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences.&nbsp;</p><p>The extent of the impact will depend on the nature and severity of the attack, the level of preparedness of the business, and how quickly they can respond and recover.</p><p>But how can you recover from these cyber attacks? How are critical infrastructures being targeted? And what further complications can arise when systems are downed for extended periods of time?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQy%2FKJYOBSy2Mdaq%2FmPH3MA%3D%3D" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/alex-yevtushenko-92171269/" rel="noopener noreferrer" target="_blank"><strong>Alex Yevtushenko</strong></a>, CEO at&nbsp;<a href="https://em360tech.com/solution-providers/salvador-technologies" rel="noopener noreferrer" target="_blank"><strong>Salvador Technologies</strong></a>, to discuss:</p><ul><li>The aftermath of a cyber attack</li><li>How critical infrastructures are being targeted</li><li>Consequences of long downtimes</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences.&nbsp;</p><p>The extent of the impact will depend on the nature and severity of the attack, the level of preparedness of the business, and how quickly they can respond and recover.</p><p>But how can you recover from these cyber attacks? How are critical infrastructures being targeted? And what further complications can arise when systems are downed for extended periods of time?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="http://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQy%2FKJYOBSy2Mdaq%2FmPH3MA%3D%3D" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/alex-yevtushenko-92171269/" rel="noopener noreferrer" target="_blank"><strong>Alex Yevtushenko</strong></a>, CEO at&nbsp;<a href="https://em360tech.com/solution-providers/salvador-technologies" rel="noopener noreferrer" target="_blank"><strong>Salvador Technologies</strong></a>, to discuss:</p><ul><li>The aftermath of a cyber attack</li><li>How critical infrastructures are being targeted</li><li>Consequences of long downtimes</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">64f5f0b7-6ed8-431e-85c4-ad184a5e976a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 04 Aug 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/420f793e-aafd-4ff9-9bd6-8cd206291ccd/EM360-PODCAST-Salvador-Technologies-MASTER-converted.mp3" length="21652798" type="audio/mpeg"/><itunes:duration>22:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Red Sift: Brand Protection is Key for Your Security Strategy</title><itunes:title>Red Sift: Brand Protection is Key for Your Security Strategy</itunes:title><description><![CDATA[<p>A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer from a breach.&nbsp;</p><p>With the objective of CTEM being the achievement of a consistent, actionable security posture, why should you bring that into your brand protection strategy? Should a proactive approach be prioritised over&nbsp;a reactive approach? And how can CISOs implement this while ensuring they’re compliant with incoming regulations such&nbsp;as DORA?</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/jorgemontiel/?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAFSUvIBsAjiEjS_fKVbKm_0KRXoW2jk1w8" rel="noopener noreferrer" target="_blank"><strong>Jorge Montiel</strong></a>, Head of Pre-Sales EMEA at&nbsp;<a href="https://em360tech.com/solution-providers/red-sift" rel="noopener noreferrer" target="_blank"><strong>Red Sift</strong></a>, to discuss:&nbsp;</h2><ul><li>Continuous threat exposure management&nbsp;</li><li>How CISOs should approach compliance&nbsp;</li><li>Proactive approach vs reactive approach</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer from a breach.&nbsp;</p><p>With the objective of CTEM being the achievement of a consistent, actionable security posture, why should you bring that into your brand protection strategy? Should a proactive approach be prioritised over&nbsp;a reactive approach? And how can CISOs implement this while ensuring they’re compliant with incoming regulations such&nbsp;as DORA?</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/jorgemontiel/?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAFSUvIBsAjiEjS_fKVbKm_0KRXoW2jk1w8" rel="noopener noreferrer" target="_blank"><strong>Jorge Montiel</strong></a>, Head of Pre-Sales EMEA at&nbsp;<a href="https://em360tech.com/solution-providers/red-sift" rel="noopener noreferrer" target="_blank"><strong>Red Sift</strong></a>, to discuss:&nbsp;</h2><ul><li>Continuous threat exposure management&nbsp;</li><li>How CISOs should approach compliance&nbsp;</li><li>Proactive approach vs reactive approach</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">24c9feee-7b81-42e3-9982-a51c533f63aa</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 29 Jun 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e918aa1f-0289-4228-834c-d94e5527a14b/EM360-PODCAST-RedSift-MASTER-converted.mp3" length="18455242" type="audio/mpeg"/><itunes:duration>19:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity</title><itunes:title>ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity</itunes:title><description><![CDATA[<p>From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ever before.&nbsp;</p><p>Getting one step ahead of cyber attacks and becoming proactive with your cybersecurity is essential to keeping your company secure, and one way to do that is adopting a deny-by-default philosophy.&nbsp;</p><p>But what is deny-by-default? What are CISOs worrying about most in this current landscape? And what lessons can be learned from assuming your enterprise has already been breached?</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rob-allen-a625562/" rel="noopener noreferrer" target="_blank">Rob Allen</a>, VP of Operations EMEA at&nbsp;<a href="https://em360tech.com/solution-providers/threatlocker" rel="noopener noreferrer" target="_blank">Threatlocker</a>, about:</h2><ul><li>Zero Trust and a deny-by-default philosophy</li><li>Assuming that the attackers are already in</li><li>Dangers of data exfiltration</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ever before.&nbsp;</p><p>Getting one step ahead of cyber attacks and becoming proactive with your cybersecurity is essential to keeping your company secure, and one way to do that is adopting a deny-by-default philosophy.&nbsp;</p><p>But what is deny-by-default? What are CISOs worrying about most in this current landscape? And what lessons can be learned from assuming your enterprise has already been breached?</p><h2>In this episode of the EM360 Podcast, Head of Content&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rob-allen-a625562/" rel="noopener noreferrer" target="_blank">Rob Allen</a>, VP of Operations EMEA at&nbsp;<a href="https://em360tech.com/solution-providers/threatlocker" rel="noopener noreferrer" target="_blank">Threatlocker</a>, about:</h2><ul><li>Zero Trust and a deny-by-default philosophy</li><li>Assuming that the attackers are already in</li><li>Dangers of data exfiltration</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">13af0dad-0df4-4b33-9a7e-3b2e4880b990</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 08 Jun 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d65ab2be-9389-49e3-b14c-f791f4aa245f/EM360-PODCAST-Threatlocker-MASTER-converted.mp3" length="17369374" type="audio/mpeg"/><itunes:duration>18:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success</title><itunes:title>Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success</itunes:title><description><![CDATA[<p>Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-on-year.&nbsp;</p><p>Visibility is critical when it comes to cybersecurity, and a programmatic approach to that visibility should include CTEM in some capacity, according to SecurityIntelligence.</p><p>But how does CTEM actually work? What problems does it solve? And how can it be seamlessly brought into to an enterprise to helps CISOs prioritise initiatives and measure progress?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rogierfischer/" rel="noopener noreferrer" target="_blank">Rogier Fischer</a>, Co-Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/hadrian" rel="noopener noreferrer" target="_blank">Hadrian</a>, as they explore:</h2><ul><li>Continuous threat exposure management</li><li>Benchmarking an organisation's security posture&nbsp;</li><li>Solving the challenges that most CISOs face</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-on-year.&nbsp;</p><p>Visibility is critical when it comes to cybersecurity, and a programmatic approach to that visibility should include CTEM in some capacity, according to SecurityIntelligence.</p><p>But how does CTEM actually work? What problems does it solve? And how can it be seamlessly brought into to an enterprise to helps CISOs prioritise initiatives and measure progress?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rogierfischer/" rel="noopener noreferrer" target="_blank">Rogier Fischer</a>, Co-Founder and CEO at&nbsp;<a href="https://em360tech.com/solution-providers/hadrian" rel="noopener noreferrer" target="_blank">Hadrian</a>, as they explore:</h2><ul><li>Continuous threat exposure management</li><li>Benchmarking an organisation's security posture&nbsp;</li><li>Solving the challenges that most CISOs face</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">96100ed4-62c3-4fde-8a03-4921666bfab2</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 06 Jun 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e898fb68-4dd3-42ea-943c-909f36b89600/EM360-Hadrian-converted.mp3" length="38080056" type="audio/mpeg"/><itunes:duration>22:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Rapid7: Scaling Cybersecurity Into a Business Process</title><itunes:title>Rapid7: Scaling Cybersecurity Into a Business Process</itunes:title><description><![CDATA[<p>In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measures has become paramount and the role of Chief Information Security Officer is under more scrutiny than ever before.&nbsp;&nbsp;</p><p>And with many CISOs dealing with fragmented vendors, lack of talent to pace with a dynamic environment and even an inability to be seen as a driver of value to the business, how can a cybersecurity strategy be scaled into something which actively promotes the survival and success of your business?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3Bt5shYasZRHW0YymywFe7%2Bg%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/hartjason?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABGufoBuCfoun3dDMIHQccIma8CeqwsU5E&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BaPSmYRJSTzKryv452X5kTQ%3D%3D" rel="noopener noreferrer" target="_blank">Jason Hart</a>, CTO at&nbsp;<a href="https://em360tech.com/tech-index/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>, to discuss:</h2><ul><li>What makes an effective cybersecurity program</li><li>Accelerating risk landscapes requiring prioritisation</li><li>A good operating model for cybersecurity</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measures has become paramount and the role of Chief Information Security Officer is under more scrutiny than ever before.&nbsp;&nbsp;</p><p>And with many CISOs dealing with fragmented vendors, lack of talent to pace with a dynamic environment and even an inability to be seen as a driver of value to the business, how can a cybersecurity strategy be scaled into something which actively promotes the survival and success of your business?</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3Bt5shYasZRHW0YymywFe7%2Bg%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/hartjason?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABGufoBuCfoun3dDMIHQccIma8CeqwsU5E&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BaPSmYRJSTzKryv452X5kTQ%3D%3D" rel="noopener noreferrer" target="_blank">Jason Hart</a>, CTO at&nbsp;<a href="https://em360tech.com/tech-index/rapid7" rel="noopener noreferrer" target="_blank">Rapid7</a>, to discuss:</h2><ul><li>What makes an effective cybersecurity program</li><li>Accelerating risk landscapes requiring prioritisation</li><li>A good operating model for cybersecurity</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">d7d69a30-1500-4826-b15d-90fe187d963b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 31 May 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e97562d-ecad-4345-a421-4868845b928b/EM360-Rapid7-1-converted.mp3" length="29729112" type="audio/mpeg"/><itunes:duration>17:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>BlackFog: DLP is Dead - Long Live Data Exfiltration!</title><itunes:title>BlackFog: DLP is Dead - Long Live Data Exfiltration!</itunes:title><description><![CDATA[<p>Data exfiltration has become a serious issue for companies in today’s world.</p><p>The unauthorised removal and theft of company data are becoming more commonplace as cybercriminals become more sophisticated in their attacks.&nbsp;</p><p>A good Data Loss Prevention, or DLP, strategy used to be enough to help protect the enterprise from malicious attacks, but has this changed? Is DLP dead?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/darrenwwilliams/" rel="noopener noreferrer" target="_blank">Darren Williams</a>, CEO and Founder at&nbsp;<a href="https://em360tech.com/solution-providers/blackfog" rel="noopener noreferrer" target="_blank">Blackfog</a>, as they discuss:</p><ul><li>The current state of cybersecurity</li><li>How companies are struggling to protect their data</li><li>Differences between anti&nbsp;data exfiltration and DLP</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Data exfiltration has become a serious issue for companies in today’s world.</p><p>The unauthorised removal and theft of company data are becoming more commonplace as cybercriminals become more sophisticated in their attacks.&nbsp;</p><p>A good Data Loss Prevention, or DLP, strategy used to be enough to help protect the enterprise from malicious attacks, but has this changed? Is DLP dead?</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon/" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/darrenwwilliams/" rel="noopener noreferrer" target="_blank">Darren Williams</a>, CEO and Founder at&nbsp;<a href="https://em360tech.com/solution-providers/blackfog" rel="noopener noreferrer" target="_blank">Blackfog</a>, as they discuss:</p><ul><li>The current state of cybersecurity</li><li>How companies are struggling to protect their data</li><li>Differences between anti&nbsp;data exfiltration and DLP</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">5db00b7c-ecf5-4e1b-aea9-8d8b3acaee50</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 31 May 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d7d827ef-eae5-47ba-9abb-d0da402afbc8/EM360-PODCAST-Blackfog-MASTER-converted.mp3" length="15821469" type="audio/mpeg"/><itunes:duration>16:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>HID Global: Physical Identity Challenges in the Healthcare Industry</title><itunes:title>HID Global: Physical Identity Challenges in the Healthcare Industry</itunes:title><description><![CDATA[<p>Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprint reading, physical identity is used to verify who a person is.&nbsp;</p><p>The use of physical identity is becoming more and more prevalent in public places, particularly in healthcare where patient safety and security is paramount.&nbsp;</p><p>In this episode of the EM60 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3626" rel="noopener noreferrer" target="_blank"><strong>Dr. Eric Cole</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/cletebordeaux/" rel="noopener noreferrer" target="_blank"><strong>Clete Bordeaux</strong></a>, Director of Healthcare Business Development at&nbsp;<a href="https://www.linkedin.com/company/hidglobal/" rel="noopener noreferrer" target="_blank"><strong>HID Global</strong></a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/michael-ramstack/" rel="noopener noreferrer" target="_blank"><strong>Michael Ramstack</strong></a>, System Senior Director of Security from&nbsp;<a href="https://www.linkedin.com/company/essentia-health/" rel="noopener noreferrer" target="_blank"><strong>Essentia Health</strong></a>, about:</p><ul><li>Security challenges in the healthcare industry</li><li>Physical identity priorities</li><li>Why visitor management works best as part of a multi-pronged approach</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprint reading, physical identity is used to verify who a person is.&nbsp;</p><p>The use of physical identity is becoming more and more prevalent in public places, particularly in healthcare where patient safety and security is paramount.&nbsp;</p><p>In this episode of the EM60 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3626" rel="noopener noreferrer" target="_blank"><strong>Dr. Eric Cole</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/cletebordeaux/" rel="noopener noreferrer" target="_blank"><strong>Clete Bordeaux</strong></a>, Director of Healthcare Business Development at&nbsp;<a href="https://www.linkedin.com/company/hidglobal/" rel="noopener noreferrer" target="_blank"><strong>HID Global</strong></a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/michael-ramstack/" rel="noopener noreferrer" target="_blank"><strong>Michael Ramstack</strong></a>, System Senior Director of Security from&nbsp;<a href="https://www.linkedin.com/company/essentia-health/" rel="noopener noreferrer" target="_blank"><strong>Essentia Health</strong></a>, about:</p><ul><li>Security challenges in the healthcare industry</li><li>Physical identity priorities</li><li>Why visitor management works best as part of a multi-pronged approach</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/hid-global-physical-identity-challenges-healthcare-industry]]></link><guid isPermaLink="false">44a381d4-7511-4931-b6de-f141e8b6d09b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 09 May 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a438e4b1-1341-4073-9e2f-6ed747bf3118/EM360-HID-Global-0305-converted.mp3" length="40566187" type="audio/mpeg"/><itunes:duration>24:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>TrustArc: Effectively Managing Third-Party Risk</title><itunes:title>TrustArc: Effectively Managing Third-Party Risk</itunes:title><description><![CDATA[<p>Effectively managing third-party risk has become crucial for companies.</p><p>Not only is it key to helping protect a company's reputation, which is crucial for maintaining customer trust and loyalty, but many industries are subject to regulatory requirements that mandate compliance with specific standards and guidelines, and companies must ensure that their third-party vendors also comply with these regulations to avoid legal and financial penalties.&nbsp;</p><p>Not only this, but poor third-party management can result in financial losses due to fraud and breaches, not to mention the delaying of core operations.&nbsp;</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BBYQcaTIUQWuE%2BaDzPvrvZw%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;talks to&nbsp;<a href="https://www.linkedin.com/in/paul-iagnocco/" rel="noopener noreferrer" target="_blank">Paul Iagnocco</a>, Head of Customer Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/trustarc" rel="noopener noreferrer" target="_blank">TrustArc</a>, about:</h2><ul><li>Managing third-party risk</li><li>Is privacy the biggest factor?</li><li>Emerging trends and technologies</li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Effectively managing third-party risk has become crucial for companies.</p><p>Not only is it key to helping protect a company's reputation, which is crucial for maintaining customer trust and loyalty, but many industries are subject to regulatory requirements that mandate compliance with specific standards and guidelines, and companies must ensure that their third-party vendors also comply with these regulations to avoid legal and financial penalties.&nbsp;</p><p>Not only this, but poor third-party management can result in financial losses due to fraud and breaches, not to mention the delaying of core operations.&nbsp;</p><h2>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BBYQcaTIUQWuE%2BaDzPvrvZw%3D%3D" rel="noopener noreferrer" target="_blank">Richard Stiennon</a>&nbsp;talks to&nbsp;<a href="https://www.linkedin.com/in/paul-iagnocco/" rel="noopener noreferrer" target="_blank">Paul Iagnocco</a>, Head of Customer Enablement at&nbsp;<a href="https://em360tech.com/solution-providers/trustarc" rel="noopener noreferrer" target="_blank">TrustArc</a>, about:</h2><ul><li>Managing third-party risk</li><li>Is privacy the biggest factor?</li><li>Emerging trends and technologies</li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/trustarc-effectively-managing-third-party-risk]]></link><guid isPermaLink="false">ff570d11-e05b-41ab-bbae-7b189b4ad9f6</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 21 Apr 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e5d983e1-1709-4228-9d11-c811702190ed/EM360-TrustArc-converted.mp3" length="34077100" type="audio/mpeg"/><itunes:duration>20:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Blumira: Difficulties SMEs Face with Cybersecurity</title><itunes:title>Blumira: Difficulties SMEs Face with Cybersecurity</itunes:title><description><![CDATA[<p>Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity.&nbsp;</p><p>One of the most significant challenges is the lack of resources, including budget and personnel, to invest in robust cybersecurity measures. This often leaves SMEs vulnerable to cyber threats, such as phishing attacks, ransomware, and data breaches.&nbsp;</p><p>Additionally, SMEs may not have the expertise to effectively implement and manage cybersecurity solutions, leaving them susceptible to cyber-attacks.</p><p>This lack of attention to cybersecurity can lead to devastating consequences for SMEs, including financial losses, reputational damage, and legal liabilities.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BNBqkgVjQReqbRsBfTyAUdQ%3D%3D" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewowenwarner/" rel="noopener noreferrer" target="_blank"><strong>Matthew Warner</strong></a>, CTO and Co-founder at&nbsp;<a href="https://em360tech.com/solution-providers/blumira" rel="noopener noreferrer" target="_blank"><strong>Blumira</strong></a>, to discuss:</p><ul><li>Common cybersecurity threats that SMEs face</li><li>How these threats differ from those faced by larger companies</li><li>Implementing effective cybersecurity measures</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity.&nbsp;</p><p>One of the most significant challenges is the lack of resources, including budget and personnel, to invest in robust cybersecurity measures. This often leaves SMEs vulnerable to cyber threats, such as phishing attacks, ransomware, and data breaches.&nbsp;</p><p>Additionally, SMEs may not have the expertise to effectively implement and manage cybersecurity solutions, leaving them susceptible to cyber-attacks.</p><p>This lack of attention to cybersecurity can lead to devastating consequences for SMEs, including financial losses, reputational damage, and legal liabilities.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://www.linkedin.com/in/stiennon?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAABUc4B5h5-LcyWbBxWL5XmadYai3MIG4o&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BNBqkgVjQReqbRsBfTyAUdQ%3D%3D" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewowenwarner/" rel="noopener noreferrer" target="_blank"><strong>Matthew Warner</strong></a>, CTO and Co-founder at&nbsp;<a href="https://em360tech.com/solution-providers/blumira" rel="noopener noreferrer" target="_blank"><strong>Blumira</strong></a>, to discuss:</p><ul><li>Common cybersecurity threats that SMEs face</li><li>How these threats differ from those faced by larger companies</li><li>Implementing effective cybersecurity measures</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/blumira-difficulties-smes-face-cybersecurity]]></link><guid isPermaLink="false">bc5be40b-60cc-4d4b-9880-25c8d237c9ec</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 21 Apr 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4d22304-d50f-4385-afbc-f6c4b2d18d80/EM360-Blumira-converted.mp3" length="31004707" type="audio/mpeg"/><itunes:duration>18:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Radware: Understanding Supply Chain Attacks and Client Side Protection</title><itunes:title>Radware: Understanding Supply Chain Attacks and Client Side Protection</itunes:title><description><![CDATA[<p>Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. </p><p>To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.</p><p>In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:</p><p>Supply chain attacks from the client side</p><p>Traditional WAF vs server protections vs client side protections</p><p>Deployment experiences</p>]]></description><content:encoded><![CDATA[<p>Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. </p><p>To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.</p><p>In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:</p><p>Supply chain attacks from the client side</p><p>Traditional WAF vs server protections vs client side protections</p><p>Deployment experiences</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/radware-understanding-supply-chain-attacks-and-client-side-protection]]></link><guid isPermaLink="false">300becd7-6fa8-48a3-996c-0fd68988cad7</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 20 Mar 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/8b93d38c-b0b7-43fa-9a23-04871df7c5f6/Radware-Richard-Stiennon-Uri-Dorot-Edit-v1.mp3" length="21885709" type="audio/mpeg"/><itunes:duration>15:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Honeycomb: Measuring the Success of an Incident Response Program</title><itunes:title>Honeycomb: Measuring the Success of an Incident Response Program</itunes:title><description><![CDATA[<p>Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the&nbsp;ultimate goal of minimising damage and restoring normal business functionality as quickly as possible.&nbsp;</p><p>A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their customers and stakeholders, but how specifically can the efficacy of an incident response program be assessed?</p><p>In this episode of the EM360 Podcast, RedMonk analyst&nbsp;<a href="https://www.linkedin.com/in/kateholterhoff?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAI8uqwBEii3zC3FsNNV5ZG6Kj5aHgwKuw8&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3Bcb8wMXKFSmuzv5Y6tImcFQ%3D%3D" rel="noopener noreferrer" target="_blank">Kate Holterhoff</a>&nbsp;spoke to&nbsp;<a href="https://www.linkedin.com/in/fredth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAQZqZMBOCoUVxldUN1pqM7n7OE-bWEg_4w&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3B1CYwcgqZSyeq916AIQZ7zA%3D%3D" rel="noopener noreferrer" target="_blank">Fred Hebert</a>, Staff Site Reliability Engineer at&nbsp;<a href="https://em360tech.com/solution-providers/honeycombio" rel="noopener noreferrer" target="_blank">Honeycomb</a>, as they explore:</p><ul><li>Why some metrics are better than others</li><li>Lessons we learn from fighting forest fires</li><li>Incident response methodology</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the&nbsp;ultimate goal of minimising damage and restoring normal business functionality as quickly as possible.&nbsp;</p><p>A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their customers and stakeholders, but how specifically can the efficacy of an incident response program be assessed?</p><p>In this episode of the EM360 Podcast, RedMonk analyst&nbsp;<a href="https://www.linkedin.com/in/kateholterhoff?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAI8uqwBEii3zC3FsNNV5ZG6Kj5aHgwKuw8&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3Bcb8wMXKFSmuzv5Y6tImcFQ%3D%3D" rel="noopener noreferrer" target="_blank">Kate Holterhoff</a>&nbsp;spoke to&nbsp;<a href="https://www.linkedin.com/in/fredth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAQZqZMBOCoUVxldUN1pqM7n7OE-bWEg_4w&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3B1CYwcgqZSyeq916AIQZ7zA%3D%3D" rel="noopener noreferrer" target="_blank">Fred Hebert</a>, Staff Site Reliability Engineer at&nbsp;<a href="https://em360tech.com/solution-providers/honeycombio" rel="noopener noreferrer" target="_blank">Honeycomb</a>, as they explore:</p><ul><li>Why some metrics are better than others</li><li>Lessons we learn from fighting forest fires</li><li>Incident response methodology</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/honeycomb-measuring-success-incident-response-program]]></link><guid isPermaLink="false">420782d1-fade-461d-8e1b-d0f73a2e43c8</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 02 Mar 2023 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4689f47e-8069-4b0e-8606-5ad016011213/EM360-Honeycomb.mp3" length="33254725" type="audio/mpeg"/><itunes:duration>19:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Keyfactor: Why You Need to Care About Machine Identity</title><itunes:title>Keyfactor: Why You Need to Care About Machine Identity</itunes:title><description><![CDATA[<p>Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity.&nbsp;</p><p>The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise.&nbsp;</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/chrishickman613/" rel="noopener noreferrer" target="_blank"><strong>Chris Hickman</strong></a>, Chief Security Officer at&nbsp;<a href="https://em360tech.com/solution-providers/keyfactor" rel="noopener noreferrer" target="_blank"><strong>Keyfactor</strong></a>, to discuss:</p><ul><li>Where machine identity trends are heading</li><li>Why companies are paying more attention to machine identity</li><li>Identity as a single thread</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity.&nbsp;</p><p>The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise.&nbsp;</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/chrishickman613/" rel="noopener noreferrer" target="_blank"><strong>Chris Hickman</strong></a>, Chief Security Officer at&nbsp;<a href="https://em360tech.com/solution-providers/keyfactor" rel="noopener noreferrer" target="_blank"><strong>Keyfactor</strong></a>, to discuss:</p><ul><li>Where machine identity trends are heading</li><li>Why companies are paying more attention to machine identity</li><li>Identity as a single thread</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/keyfactor-why-you-need-care-about-machine-identity]]></link><guid isPermaLink="false">e2321da2-9ad4-46e4-9fd6-543d62630850</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 21 Nov 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/548c6eee-1a98-4a19-869e-f1eaaf89b335/EM360-20Keyfactor-converted.mp3" length="27466650" type="audio/mpeg"/><itunes:duration>16:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Radware: Bot Mitigation is Key for Application Protection</title><itunes:title>Radware: Bot Mitigation is Key for Application Protection</itunes:title><description><![CDATA[<p>Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.</p><p>And with half of all internet traffic coming from bots (both good ones and bad ones), managing that bot traffic is critical.&nbsp;</p><p>Financial institutions, ticket-selling sites and shopping sites are among the hardest hit, with cybercriminals employing ML and AI in these bots to scale the size of their crimes and ambitions.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657/" rel="noopener noreferrer" target="_blank"><strong>Uri Dorot</strong></a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank"><strong>Radware</strong></a>, to discuss:</p><ul><li>The world of application protection</li><li>Why companies are underequipped to deal with bot attacks</li><li>Dedicated bot mitigation solutions</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.</p><p>And with half of all internet traffic coming from bots (both good ones and bad ones), managing that bot traffic is critical.&nbsp;</p><p>Financial institutions, ticket-selling sites and shopping sites are among the hardest hit, with cybercriminals employing ML and AI in these bots to scale the size of their crimes and ambitions.</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/uri-dorot-96582657/" rel="noopener noreferrer" target="_blank"><strong>Uri Dorot</strong></a>, Senior Product Marketing Manager at&nbsp;<a href="https://em360tech.com/solution-providers/radware" rel="noopener noreferrer" target="_blank"><strong>Radware</strong></a>, to discuss:</p><ul><li>The world of application protection</li><li>Why companies are underequipped to deal with bot attacks</li><li>Dedicated bot mitigation solutions</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/radware-bot-mitigation-key-application-protection]]></link><guid isPermaLink="false">a5de6f67-3797-4ed7-99b3-933ccf9dd271</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 14 Nov 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/7650ca48-b2d2-462b-bdfb-d4b3f5750ace/EM360-20Radware1-converted.mp3" length="37839039" type="audio/mpeg"/><itunes:duration>22:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Egnyte: Keeping Up With The Next Generation of Data Privacy</title><itunes:title>Egnyte: Keeping Up With The Next Generation of Data Privacy</itunes:title><description><![CDATA[<p>Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated.&nbsp;</p><p>So what’s happening in politics right now that could affect ¾ of the world’s data privacy rights? How are consumers reacting to all this? And why are customers struggling so much with compliance?</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/neilkentjones?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAF_qwQBn7MMrVCmHZygyh-W2l9qeLIDnmk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BGNhzmhF0QJWdfxRAV9A5Uw%3D%3D" rel="noopener noreferrer" target="_blank">Neil Jones</a>, Director of Cybersecurity Evangelism at&nbsp;<a href="https://em360tech.com/solution-providers/egnyte" rel="noopener noreferrer" target="_blank">Egnyte</a>, to discuss:&nbsp;</p><ul><li>Data privacy in US vs. UK</li><li>How current events affect companies</li><li>How the landscape will look in 10 years' time</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated.&nbsp;</p><p>So what’s happening in politics right now that could affect ¾ of the world’s data privacy rights? How are consumers reacting to all this? And why are customers struggling so much with compliance?</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank">Matt Harris</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/neilkentjones?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAF_qwQBn7MMrVCmHZygyh-W2l9qeLIDnmk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BGNhzmhF0QJWdfxRAV9A5Uw%3D%3D" rel="noopener noreferrer" target="_blank">Neil Jones</a>, Director of Cybersecurity Evangelism at&nbsp;<a href="https://em360tech.com/solution-providers/egnyte" rel="noopener noreferrer" target="_blank">Egnyte</a>, to discuss:&nbsp;</p><ul><li>Data privacy in US vs. UK</li><li>How current events affect companies</li><li>How the landscape will look in 10 years' time</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/egnyte-keeping-next-generation-data-privacy]]></link><guid isPermaLink="false">3e4c46d0-9264-47a5-a1f7-919a8186fa26</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 27 Oct 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f3dfba59-cdb4-4649-8836-c666588f4ca3/egnyte-20editor-20podcast-mixdown.mp3" length="27524518" type="audio/mpeg"/><itunes:duration>19:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Beyond Identity: Software Supply Chain Attacks and the Best Defence</title><itunes:title>Beyond Identity: Software Supply Chain Attacks and the Best Defence</itunes:title><description><![CDATA[<p>A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data.&nbsp;</p><p>Recent high-profile supply chain attacks, most notably SolarWinds, has this type of attack into the public eye, and it’s clear that with more suppliers handling sensitive data than ever before, the attack surface of a typical enterprise has been changed dramatically.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/suresh-bhandarkar-36277895/" rel="noopener noreferrer" target="_blank"><strong>Suresh Bhandarkar</strong></a>, Director of Product Solution Architecture at&nbsp;<a href="https://em360tech.com/solution-providers/beyond-identity" rel="noopener noreferrer" target="_blank"><strong>Beyond Identity</strong></a>, to discuss:</p><ul><li>Software supply chain attacks</li><li>Weaknesses in the CI/CD pipeline</li><li>The issue of software code provenance</li></ul><br/><p><em>Beyond Identity cuts through the anonymity of to provide a secure, scalable way for development and GitOps teams to immutably sign and verify the author of every commit. Their author verification API in proves that what you’ve shipped is what your developers actually built—and that nothing else got added.</em></p>]]></description><content:encoded><![CDATA[<p>A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data.&nbsp;</p><p>Recent high-profile supply chain attacks, most notably SolarWinds, has this type of attack into the public eye, and it’s clear that with more suppliers handling sensitive data than ever before, the attack surface of a typical enterprise has been changed dramatically.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/suresh-bhandarkar-36277895/" rel="noopener noreferrer" target="_blank"><strong>Suresh Bhandarkar</strong></a>, Director of Product Solution Architecture at&nbsp;<a href="https://em360tech.com/solution-providers/beyond-identity" rel="noopener noreferrer" target="_blank"><strong>Beyond Identity</strong></a>, to discuss:</p><ul><li>Software supply chain attacks</li><li>Weaknesses in the CI/CD pipeline</li><li>The issue of software code provenance</li></ul><br/><p><em>Beyond Identity cuts through the anonymity of to provide a secure, scalable way for development and GitOps teams to immutably sign and verify the author of every commit. Their author verification API in proves that what you’ve shipped is what your developers actually built—and that nothing else got added.</em></p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/beyond-identity-software-supply-chain-attacks-and-best-defence?utm_source=sendinblue&utm_campaign=New%20editor%20Beyond%20Identity%20Software%20Supply%20Chain%20Attacks%20and%20the%20Best%20Defence&utm_medium=email]]></link><guid isPermaLink="false">d06e2ffd-c3cc-4200-8d55-f4742e645647</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 06 Oct 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/85bce142-977b-4d59-95c6-79094986f0ca/EM360-20Beyond-20Identity-202-converted.mp3" length="40652845" type="audio/mpeg"/><itunes:duration>24:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust</title><itunes:title>Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust</itunes:title><description><![CDATA[<p>As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbsp;</p><p>Organisations across the globe are beginning to implement Zero Trust solutions to protect their files, data, devices, and networks. Zero Trust is a concept that operates on the idea that nothing can be trusted, and everything is a threat until it has been properly verified. This process helps to mitigate and manage new and emerging cyber threats.&nbsp;</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;welcomes&nbsp;<a href="https://www.linkedin.com/in/ben-jenkins-/" rel="noopener noreferrer" target="_blank"><strong>Ben Jenkins</strong></a>, Director of Cybersecurity at&nbsp;<a href="https://em360tech.com/solution-providers/threatlocker" rel="noopener noreferrer" target="_blank"><strong>Threatlocker</strong></a>, to discuss:</p><ul><li>What is Zero trust, and why do businesses need it?</li><li>How are cyberattacks evolving?</li><li>Common cyber threats and how to better protect your business against them&nbsp;</li><li>And more!</li></ul><br/>]]></description><content:encoded><![CDATA[<p>As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbsp;</p><p>Organisations across the globe are beginning to implement Zero Trust solutions to protect their files, data, devices, and networks. Zero Trust is a concept that operates on the idea that nothing can be trusted, and everything is a threat until it has been properly verified. This process helps to mitigate and manage new and emerging cyber threats.&nbsp;</p><p>In this episode of the EM360 Podcast, Editor&nbsp;<a href="https://em360tech.com/user/3673" rel="noopener noreferrer" target="_blank"><strong>Matt Harris</strong></a>&nbsp;welcomes&nbsp;<a href="https://www.linkedin.com/in/ben-jenkins-/" rel="noopener noreferrer" target="_blank"><strong>Ben Jenkins</strong></a>, Director of Cybersecurity at&nbsp;<a href="https://em360tech.com/solution-providers/threatlocker" rel="noopener noreferrer" target="_blank"><strong>Threatlocker</strong></a>, to discuss:</p><ul><li>What is Zero trust, and why do businesses need it?</li><li>How are cyberattacks evolving?</li><li>Common cyber threats and how to better protect your business against them&nbsp;</li><li>And more!</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/threatlocker-stay-ahead-changing-attack-landscape-using-zero-trust]]></link><guid isPermaLink="false">8485f7f3-c9b3-44a3-b081-e46ddbcbf452</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 23 Sep 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/6161ab2b-0630-41a6-9e47-b082ada574d2/EM360-20-Threatlocker-converted.mp3" length="56456925" type="audio/mpeg"/><itunes:duration>23:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Omada: The Pitfalls of IGA Deployments</title><itunes:title>Omada: The Pitfalls of IGA Deployments</itunes:title><description><![CDATA[<p>Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy.&nbsp;</p><p>For companies that need functionalities like role-based access and automated approval, IGA systems can be essential in ensuring that the right people are getting access to the right things.&nbsp;</p><p>Sounds easy enough, but issues with adoption, sponsorship and employee access speak to the fact that plenty of things can derail a deployment.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rodlsimmons/" rel="noopener noreferrer" target="_blank"><strong>Rod Simmons</strong></a>, VP of Product Strategy at&nbsp;<a href="https://em360tech.com/tech-index/omada" rel="noopener noreferrer" target="_blank"><strong>Omada</strong></a>, about:</p><ul><li>Automating already broken processes</li><li>Disconnect between IGA goals and business goals</li><li>Testing, testing, testing</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy.&nbsp;</p><p>For companies that need functionalities like role-based access and automated approval, IGA systems can be essential in ensuring that the right people are getting access to the right things.&nbsp;</p><p>Sounds easy enough, but issues with adoption, sponsorship and employee access speak to the fact that plenty of things can derail a deployment.&nbsp;</p><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="https://em360tech.com/user/3627" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/rodlsimmons/" rel="noopener noreferrer" target="_blank"><strong>Rod Simmons</strong></a>, VP of Product Strategy at&nbsp;<a href="https://em360tech.com/tech-index/omada" rel="noopener noreferrer" target="_blank"><strong>Omada</strong></a>, about:</p><ul><li>Automating already broken processes</li><li>Disconnect between IGA goals and business goals</li><li>Testing, testing, testing</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/omada-pitfalls-iga-deployments]]></link><guid isPermaLink="false">41545541-2a9a-4c65-bc21-9731091fa87d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 23 Sep 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f9b2ed5b-9fd1-464d-ac9f-3c8dd6af637c/EM360-20Omada-converted.mp3" length="42635747" type="audio/mpeg"/><itunes:duration>25:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>HID Global: Why Authentication is Still Such an Issue</title><itunes:title>HID Global: Why Authentication is Still Such an Issue</itunes:title><description><![CDATA[<h2>Authentication is the art of determining whether something is what it says it is.&nbsp;</h2><p>Passwords provide a great way for customers and consumers to access their personal information but when it comes to the enterprise, newer concepts like two-factor authentication (2FA) and zero trust network access (ZTNA) may be required.&nbsp;</p><p>It’s been part of computing since its inception two decades ago - yet IT teams and businesses are still putting a lot of time into it.</p><h3>So why is authentication still such an issue?</h3><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="mailto:richard@it-harvest.com" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewlewis33/" rel="noopener noreferrer" target="_blank"><strong>Matthew Lewis</strong></a>, Director of Product Marketing at&nbsp;<a href="https://em360tech.com/solution-providers/hid-global" rel="noopener noreferrer" target="_blank"><strong>HID Global</strong></a>, to explore:</p><ul><li>How the work from home movement impacted employee authentication</li><li>“Passwordless” vs client-side certificates</li><li>Adaptive authentication</li></ul><br/>]]></description><content:encoded><![CDATA[<h2>Authentication is the art of determining whether something is what it says it is.&nbsp;</h2><p>Passwords provide a great way for customers and consumers to access their personal information but when it comes to the enterprise, newer concepts like two-factor authentication (2FA) and zero trust network access (ZTNA) may be required.&nbsp;</p><p>It’s been part of computing since its inception two decades ago - yet IT teams and businesses are still putting a lot of time into it.</p><h3>So why is authentication still such an issue?</h3><p>In this episode of the EM360 Podcast, Analyst&nbsp;<a href="mailto:richard@it-harvest.com" rel="noopener noreferrer" target="_blank"><strong>Richard Stiennon</strong></a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/matthewlewis33/" rel="noopener noreferrer" target="_blank"><strong>Matthew Lewis</strong></a>, Director of Product Marketing at&nbsp;<a href="https://em360tech.com/solution-providers/hid-global" rel="noopener noreferrer" target="_blank"><strong>HID Global</strong></a>, to explore:</p><ul><li>How the work from home movement impacted employee authentication</li><li>“Passwordless” vs client-side certificates</li><li>Adaptive authentication</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/hid-global-why-authentication-still-such-issue]]></link><guid isPermaLink="false">42637625-bf7b-41ef-b6a2-15e538a8598d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 02 Aug 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/9af005aa-3c28-44a4-8317-739a68ead279/EM360-20HID-20Global-converted.mp3" length="25806097" type="audio/mpeg"/><itunes:duration>17:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Anomali: Building a Secure Framework with XDR and MITRE ATTACK</title><itunes:title>Anomali: Building a Secure Framework with XDR and MITRE ATTACK</itunes:title><description><![CDATA[<p>In this podcast,&nbsp;Chris Steffen,&nbsp;Research Director at Enterprise Management Associates (EMA),&nbsp;joins&nbsp;Mark Alba, Chief Product and Strategy Officer at Anomali, to explore&nbsp;the ins and outs of&nbsp;extended detection and response (XDR) and MITRE ATT&amp;CK framework, including how it integrates with threat intelligence and enterprise security strategies.</p>]]></description><content:encoded><![CDATA[<p>In this podcast,&nbsp;Chris Steffen,&nbsp;Research Director at Enterprise Management Associates (EMA),&nbsp;joins&nbsp;Mark Alba, Chief Product and Strategy Officer at Anomali, to explore&nbsp;the ins and outs of&nbsp;extended detection and response (XDR) and MITRE ATT&amp;CK framework, including how it integrates with threat intelligence and enterprise security strategies.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts-series-episode/anomali-security-framework]]></link><guid isPermaLink="false">ad2561c8-97a7-42c5-84d3-72d6894d0856</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 08 Jul 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/023047c2-4c62-46fc-aaed-ad1386c8517d/EM360-20Anomali.mp3" length="46510606" type="audio/mpeg"/><itunes:duration>27:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Censys: The World of Attack Surface Management</title><itunes:title>Censys: The World of Attack Surface Management</itunes:title><description><![CDATA[<p>Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.</p><p>It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective.</p><p>The security of an enterprise's surface is paramount in the current era of cloud - but how can companies manage their cloud security posture management and tackle basic misconfigurations?</p><p>In this episode of the EM360 Podcast, Chief Research Analyst at IT-Harvest Richard Stiennon speaks to David SooHoo, Director of Product Management at Censys, as the pair discuss:&nbsp;</p><ul><li>Attack surface management vs asset management</li><li>The shift of the cloud</li><li>Zero-day attacks and how to mitigate them</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.</p><p>It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective.</p><p>The security of an enterprise's surface is paramount in the current era of cloud - but how can companies manage their cloud security posture management and tackle basic misconfigurations?</p><p>In this episode of the EM360 Podcast, Chief Research Analyst at IT-Harvest Richard Stiennon speaks to David SooHoo, Director of Product Management at Censys, as the pair discuss:&nbsp;</p><ul><li>Attack surface management vs asset management</li><li>The shift of the cloud</li><li>Zero-day attacks and how to mitigate them</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/censys-attack-surface-management]]></link><guid isPermaLink="false">5f24ea19-5823-46be-854d-02aebfe8fca1</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 30 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0bf9c139-f182-41fd-82dd-b738abb3d2bb/EM360-20Censys.mp3" length="30937382" type="audio/mpeg"/><itunes:duration>18:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Calamu: The Next Generation of Data Protection</title><itunes:title>Calamu: The Next Generation of Data Protection</itunes:title><description><![CDATA[<p>Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/dr-eric-cole-92a164211/" rel="noopener noreferrer" target="_blank">Dr. Eric Cole</a>, CEO and Founder at&nbsp;<a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/paul-lewis-17ba987/" rel="noopener noreferrer" target="_blank">Paul Lewis</a>, CEO of&nbsp;<a href="https://calamu.com/" rel="noopener noreferrer" target="_blank">Calamu</a>, about:</p><ul><li>Today’s biggest threats to data</li><li>The problem of data exfiltration</li><li>How a data-first security approach provides next-generation protection</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack.</p><p>In this episode of the EM360 Podcast,&nbsp;<a href="https://www.linkedin.com/in/dr-eric-cole-92a164211/" rel="noopener noreferrer" target="_blank">Dr. Eric Cole</a>, CEO and Founder at&nbsp;<a href="https://secure-anchor.com/" rel="noopener noreferrer" target="_blank">Secure Anchor Consulting</a>&nbsp;speaks to&nbsp;<a href="https://www.linkedin.com/in/paul-lewis-17ba987/" rel="noopener noreferrer" target="_blank">Paul Lewis</a>, CEO of&nbsp;<a href="https://calamu.com/" rel="noopener noreferrer" target="_blank">Calamu</a>, about:</p><ul><li>Today’s biggest threats to data</li><li>The problem of data exfiltration</li><li>How a data-first security approach provides next-generation protection</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/calamu-next-generation-data-protection]]></link><guid isPermaLink="false">b4aeb465-7bee-4e75-946e-696f8c50b07a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 27 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c6ff2504-670d-4767-96b2-92faee6756c4/EM360-20Calamu.mp3" length="44403133" type="audio/mpeg"/><itunes:duration>26:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Darktrace: The Fast and Furious Nature of Cybersecurity</title><itunes:title>Darktrace: The Fast and Furious Nature of Cybersecurity</itunes:title><description><![CDATA[<p>The  Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents.</p><p>Are IT teams capable of keeping up, or are we leading towards cyber doomsday?</p><p>In this episode of the EM360 podcast, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Mariana Periera, Director of Email Security Products at Darktrace, to explore:</p><ul><li>How businesses can come back stronger following a threat</li><li>The email supply chain and how attackers are using legitimate credentials to attack</li><li>Core capabilities and the importance of augmenting with AI</li><li>The true changing nature of cybersecurity</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The  Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents.</p><p>Are IT teams capable of keeping up, or are we leading towards cyber doomsday?</p><p>In this episode of the EM360 podcast, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Mariana Periera, Director of Email Security Products at Darktrace, to explore:</p><ul><li>How businesses can come back stronger following a threat</li><li>The email supply chain and how attackers are using legitimate credentials to attack</li><li>Core capabilities and the importance of augmenting with AI</li><li>The true changing nature of cybersecurity</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/darktrace-nature-cybersecurity]]></link><guid isPermaLink="false">a00fd131-0273-4ecb-a4dd-6902c7eda11b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Thu, 19 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0c372cda-1c1c-4f69-b279-f3d4e68fb4c4/EM360-20Darktrace.mp3" length="30039714" type="audio/mpeg"/><itunes:duration>17:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Rapid7: How to Swiftly Respond to Modern Cyber Threats</title><itunes:title>Rapid7: How to Swiftly Respond to Modern Cyber Threats</itunes:title><description><![CDATA[<p>In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available.&nbsp;</p><p>With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats?</p><p>In this episode of the EM360 podcast, Content Producer Matt Harris talks to Caitlin Condon, Vulnerability Research Manager at Rapid7, as they explore:&nbsp;</p><ul><li>How security teams can respond to threats more swiftly and effectively</li><li>Remote working’s effect on company weakpoints</li><li>How enterprises can better understand and remediate high-priority threats</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available.&nbsp;</p><p>With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats?</p><p>In this episode of the EM360 podcast, Content Producer Matt Harris talks to Caitlin Condon, Vulnerability Research Manager at Rapid7, as they explore:&nbsp;</p><ul><li>How security teams can respond to threats more swiftly and effectively</li><li>Remote working’s effect on company weakpoints</li><li>How enterprises can better understand and remediate high-priority threats</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/rapid7-how-swiftly-respond-modern-cyber-threats]]></link><guid isPermaLink="false">4bc7d70d-e1c7-4d75-a025-9d55037fc34a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 18 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/00109f6f-94de-46a5-b5e3-22185237c3ad/EM360-20Caitlin-20Condon.mp3" length="26987789" type="audio/mpeg"/><itunes:duration>16:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain</title><itunes:title>Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain</itunes:title><description><![CDATA[<p>When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities.&nbsp;</p><p>This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people.&nbsp;</p><p>Using a variety of means both online and offline, unsuspecting users can be conned into compromising their security, releasing sensitive information or even transferring money.&nbsp;</p><p>Secureworks Adversary Group, a security consulting department within Secureworks, walk-us through various social engineering scenarios used during their attack simulations.</p><p>In the third episode of this three-part podcast with Secureworks, our host Dr Eric Cole the Founder and CEO of Secure Anchor Consulting will be talking with Ben Jacob, Technical Lead at Secureworks, about: </p><ul><li>Social engineering attack techniques and their lifecycle</li><li>How phishing, vishing, and spear-phishing impact industries from a social engineering standpoint</li><li>What can companies offer from a training and education standpoint to help mitigate these risks</li><li>Value of XDR in detecting suspicious user behaviour</li></ul><br/>]]></description><content:encoded><![CDATA[<p>When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities.&nbsp;</p><p>This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people.&nbsp;</p><p>Using a variety of means both online and offline, unsuspecting users can be conned into compromising their security, releasing sensitive information or even transferring money.&nbsp;</p><p>Secureworks Adversary Group, a security consulting department within Secureworks, walk-us through various social engineering scenarios used during their attack simulations.</p><p>In the third episode of this three-part podcast with Secureworks, our host Dr Eric Cole the Founder and CEO of Secure Anchor Consulting will be talking with Ben Jacob, Technical Lead at Secureworks, about: </p><ul><li>Social engineering attack techniques and their lifecycle</li><li>How phishing, vishing, and spear-phishing impact industries from a social engineering standpoint</li><li>What can companies offer from a training and education standpoint to help mitigate these risks</li><li>Value of XDR in detecting suspicious user behaviour</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/secureworks-combining-social-engineering-attacks-cyber-kill-chain]]></link><guid isPermaLink="false">b01a562a-a798-4f56-b095-2c68c7282405</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 17 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/e132d408-ce20-48c4-b77f-d0a86e3291c0/EM360-20Secureworks-203003.mp3" length="43365113" type="audio/mpeg"/><itunes:duration>25:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Sophos: The World of Cyber Insurance</title><itunes:title>Sophos: The World of Cyber Insurance</itunes:title><description><![CDATA[<p>Cyber insurance helps to provide critical cover for those who need protection against digital threats.</p><p>While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens.</p><p>This includes the costs of investigating a cybercrime, recovering lost data and restoring of the systems. It can even recoup the loss of income, manage reputation, and notification costs if required to notify a third party.</p><p>In this third episode of a three-part series with Sophos, Senior Director Nicholas Cramer talks to Dr Eric Cole CEO and Founder of Secure Anchor Consulting about:</p><ul><li>The current state of cyber insurance</li><li>Difficulty in getting policies</li><li>How to better position your EDR and MDR</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Cyber insurance helps to provide critical cover for those who need protection against digital threats.</p><p>While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens.</p><p>This includes the costs of investigating a cybercrime, recovering lost data and restoring of the systems. It can even recoup the loss of income, manage reputation, and notification costs if required to notify a third party.</p><p>In this third episode of a three-part series with Sophos, Senior Director Nicholas Cramer talks to Dr Eric Cole CEO and Founder of Secure Anchor Consulting about:</p><ul><li>The current state of cyber insurance</li><li>Difficulty in getting policies</li><li>How to better position your EDR and MDR</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/sophos-world-cyber-insurance]]></link><guid isPermaLink="false">42aa3201-e543-49e3-8686-59da15476363</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 10 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/89e032b7-1c7f-4242-84e7-3a7941eb218c/EM360-20Sophos-20-20Nicolas-20Cramer.mp3" length="40594222" type="audio/mpeg"/><itunes:duration>28:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange</title><itunes:title>CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange</itunes:title><description><![CDATA[<p>Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. </p><p>Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop security strategies and aid in identifying threats and opportunities. </p><p>In the episode of the EM360 podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Caitlin Gruenberg Director, Risk Solutions Engineer at CyberGRX as the pair explore: </p><ul><li>Third-party cyber risk management vs self-assessments</li><li>Cyber risk intelligence in the wake of huge, high-profile breaches</li><li>The meaning of a true risk exchange</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. </p><p>Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop security strategies and aid in identifying threats and opportunities. </p><p>In the episode of the EM360 podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Caitlin Gruenberg Director, Risk Solutions Engineer at CyberGRX as the pair explore: </p><ul><li>Third-party cyber risk management vs self-assessments</li><li>Cyber risk intelligence in the wake of huge, high-profile breaches</li><li>The meaning of a true risk exchange</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcast/cybergrx-cyber-risk-intelligence-and-meaning-true-risk-exchange]]></link><guid isPermaLink="false">536a4e9d-c376-479d-a4d0-a1e0c69e3435</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 03 May 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ac4b339-e3dc-4a5f-a057-538019c446fb/EM360-20CyberGRX.mp3" length="27465132" type="audio/mpeg"/><itunes:duration>16:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction</title><itunes:title>Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction</itunes:title><description><![CDATA[<p>CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services. </p><p>Usually providing a variety of features including customer registration, self-service account management, and 2FA/MFA, the best CIAM solutions ensure a secure and seamless customer experience. </p><p>But how can enterprises hit a balance between security and customer friction?</p><p>In the first of two EM360 analyst podcasts with Beyond Identity, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Jing Gu, Senior Product Marketing Manager, about the role CIAMs play when it comes to managing end-user activities.</p>]]></description><content:encoded><![CDATA[<p>CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services. </p><p>Usually providing a variety of features including customer registration, self-service account management, and 2FA/MFA, the best CIAM solutions ensure a secure and seamless customer experience. </p><p>But how can enterprises hit a balance between security and customer friction?</p><p>In the first of two EM360 analyst podcasts with Beyond Identity, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Jing Gu, Senior Product Marketing Manager, about the role CIAMs play when it comes to managing end-user activities.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">2cc43abc-3600-4b98-ae20-2c062d004e92</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 13 Apr 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0f7ef8a6-e222-475e-83cf-6ae251636417/Beyond-20Identity-201-20final.mp3" length="35351774" type="audio/mpeg"/><itunes:duration>24:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Technimove: The Science Behind Cyber Security &amp; Cyber Resilience</title><itunes:title>Technimove: The Science Behind Cyber Security &amp; Cyber Resilience</itunes:title><description><![CDATA[<p>Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security &amp; Cyber Resiliency Periodic Table and how enterprises can fully understand the digital threat landscape</p>]]></description><content:encoded><![CDATA[<p>Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security &amp; Cyber Resiliency Periodic Table and how enterprises can fully understand the digital threat landscape</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts-series-episode/technimove-cybersecurity-periodic-table?utm_source=sendinblue&utm_campaign=Technimove%20The%20Science%20Behind%20Cyber%20Security%20%20Cyber%20Resilience&utm_medium=email]]></link><guid isPermaLink="false">cd01a2fc-b1a1-4453-bccc-8a9358648120</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Mon, 28 Mar 2022 07:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/80dce370-84c2-4ebb-9b15-2e0cf6e07676/EM360-Technimove.mp3" length="51767227" type="audio/mpeg"/><itunes:duration>30:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>GitGuardian: Secrets in the Source Code Need Protection</title><itunes:title>GitGuardian: Secrets in the Source Code Need Protection</itunes:title><description><![CDATA[<p>In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,</p><p>to explore Secrets Sprawl or the phenomenon of (unwanted) secrets distribution across Git repositories and DevOps tools.</p>]]></description><content:encoded><![CDATA[<p>In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,</p><p>to explore Secrets Sprawl or the phenomenon of (unwanted) secrets distribution across Git repositories and DevOps tools.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts-series-episode/gitguardian-secrets-source-code-protection?utm_source=sendinblue&utm_campaign=GitGuardian%20Secrets%20in%20the%20Source%20Code%20Need%20Protection&utm_medium=email]]></link><guid isPermaLink="false">34dedd08-13d2-475b-8ef3-26d32bc56af9</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 25 Mar 2022 07:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/9807eb08-6327-47a2-9b36-731d911aabb2/EM360-GitGuardian.mp3" length="33419127" type="audio/mpeg"/><itunes:duration>19:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Testing Application Security Challenges in 2022</title><itunes:title>Testing Application Security Challenges in 2022</itunes:title><description><![CDATA[<p>Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations are still unable to identify the key challenges within their infrastructure. As with most facets of life, many organisations are still rooted in traditional attitudes; they previously invested in one approach to security and they are skeptical of rocking the formula.&nbsp;</p><p>IT environments have, however, evolved dramatically over the last decade and organisations have moved beyond cloud migration programs and are now overhauling their applications in cloud-native ecosystems. These changes have led to strives in innovation, while also leaving space for vulnerabilities. This is where organisations need to start testing application security and building a more robust framework to protect their applications.</p><p>In this podcast, Head of Content Max Kurton talks to Andreas Lehofer, Chief Product Officer at Dynatrace. Andreas runs us through:</p><ul><li>How to get a transparent view of application security</li><li>How to avoid consistent, distracting security alerts</li><li>The rate of evolution of IT environments in 2022.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations are still unable to identify the key challenges within their infrastructure. As with most facets of life, many organisations are still rooted in traditional attitudes; they previously invested in one approach to security and they are skeptical of rocking the formula.&nbsp;</p><p>IT environments have, however, evolved dramatically over the last decade and organisations have moved beyond cloud migration programs and are now overhauling their applications in cloud-native ecosystems. These changes have led to strives in innovation, while also leaving space for vulnerabilities. This is where organisations need to start testing application security and building a more robust framework to protect their applications.</p><p>In this podcast, Head of Content Max Kurton talks to Andreas Lehofer, Chief Product Officer at Dynatrace. Andreas runs us through:</p><ul><li>How to get a transparent view of application security</li><li>How to avoid consistent, distracting security alerts</li><li>The rate of evolution of IT environments in 2022.</li></ul><br/>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">7de2a82e-c065-424c-9823-5d32898f0801</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 02 Feb 2022 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/76ce73ff-c39b-4755-859a-532df85ff8e0/em360-andreas-lehofer.mp3" length="38604841" type="audio/mpeg"/><itunes:duration>22:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Quality Automotive Products in an Age of Cyber Crime</title><itunes:title>Quality Automotive Products in an Age of Cyber Crime</itunes:title><description><![CDATA[<p>Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be compromised within the supply chain. Regardless of where you sit within an organisation, with the increase of hybrid working and remote work, risks of ransomware still remain at large.</p><p>CyberAngel recently released a report that stated that there are vulnerabilities in Ford, Volkswagen, and Tesla Advanced Driver Systems. Furthermore, a semiconductor shortage has made profit tighter and production more difficult. If that's the case, how can we know that the products are truly reflective of quality automotive standard? What vulnerabilities in their supply chains will end up affecting the consumer and how stable are the companies that are producing quality automotive vehicles?</p><p>According to this same report, 1 in 10 employees have exposed publicly accessible credentials available online. Joining us on this episode of The Next Phase of Cybersecurity is Pauline Losson, Cyber Operations Director at CybelAngel. In this episode, we will be exploring topics such as:</p><ul><li>Why automotive industries in particular are vulnerable to leaked credentials</li><li>How you can ensure a strong cybersecurity strategy within your organisation</li><li>The best way to prevent credentials from being leaked online</li><li>The trends across North America and Western Europe.</li></ul><br/><p>You can also find this podcast on Spotify and Apple Podcasts under "The Next Phase of Cybersecurity."</p>]]></description><content:encoded><![CDATA[<p>Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be compromised within the supply chain. Regardless of where you sit within an organisation, with the increase of hybrid working and remote work, risks of ransomware still remain at large.</p><p>CyberAngel recently released a report that stated that there are vulnerabilities in Ford, Volkswagen, and Tesla Advanced Driver Systems. Furthermore, a semiconductor shortage has made profit tighter and production more difficult. If that's the case, how can we know that the products are truly reflective of quality automotive standard? What vulnerabilities in their supply chains will end up affecting the consumer and how stable are the companies that are producing quality automotive vehicles?</p><p>According to this same report, 1 in 10 employees have exposed publicly accessible credentials available online. Joining us on this episode of The Next Phase of Cybersecurity is Pauline Losson, Cyber Operations Director at CybelAngel. In this episode, we will be exploring topics such as:</p><ul><li>Why automotive industries in particular are vulnerable to leaked credentials</li><li>How you can ensure a strong cybersecurity strategy within your organisation</li><li>The best way to prevent credentials from being leaked online</li><li>The trends across North America and Western Europe.</li></ul><br/><p>You can also find this podcast on Spotify and Apple Podcasts under "The Next Phase of Cybersecurity."</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">38bef67b-99a8-425f-9584-73c374fbbc1a</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 24 Nov 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/9dc2ca75-41bf-447e-acc9-4f5b390b5158/em360-npcs-pauline-losson.mp3" length="29000963" type="audio/mpeg"/><itunes:duration>17:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e6b25dfc-34b5-4c93-94c2-a045d969b708/index.html" type="text/html"/></item><item><title>Intercepting Attackers with Deceptive Technology</title><itunes:title>Intercepting Attackers with Deceptive Technology</itunes:title><description><![CDATA[<p>Year on year, cybercriminals are&nbsp;expanding their attack toolkits and coming up with different&nbsp;ways to cause disruption across&nbsp;the enterprise. However,&nbsp;according to cybersecurity experts, deceptive technology can be used&nbsp;to effectively intercept these crimes.&nbsp;</p><p>Investigating this destructive attack vector in this week's episode of the Next Phase of Cybersecurity is Carolyn Crandall, Chief Security Advocate at Attivo Networks. Carolyn was first featured on the EM360 Podcast to talk about deception technology and its ability to turn the table on attackers. This time, she is here to set out how to disrupt attackers' toolkits and ultimately render them powerless.</p>]]></description><content:encoded><![CDATA[<p>Year on year, cybercriminals are&nbsp;expanding their attack toolkits and coming up with different&nbsp;ways to cause disruption across&nbsp;the enterprise. However,&nbsp;according to cybersecurity experts, deceptive technology can be used&nbsp;to effectively intercept these crimes.&nbsp;</p><p>Investigating this destructive attack vector in this week's episode of the Next Phase of Cybersecurity is Carolyn Crandall, Chief Security Advocate at Attivo Networks. Carolyn was first featured on the EM360 Podcast to talk about deception technology and its ability to turn the table on attackers. This time, she is here to set out how to disrupt attackers' toolkits and ultimately render them powerless.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e6d55b53-203d-4e61-a364-44ac6b730b7d</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 03 Nov 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/d219d772-317a-46b6-a70b-3b248f5de208/em360-npcs-attivo.mp3" length="45612207" type="audio/mpeg"/><itunes:duration>27:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cybersecurity: The Orchestration and Automation of Processes</title><itunes:title>Cybersecurity: The Orchestration and Automation of Processes</itunes:title><description><![CDATA[<p>Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes the&nbsp;<em>cookie.&nbsp;</em>The adoption of automation has certainly been widespread, with 95% of correspondents stating that they have automated some of their processes,&nbsp;but it always comes with challenges.</p><p>According to a report by ThreatQuotient, only 8% of correspondents had&nbsp;<strong>not</strong>&nbsp;encountered any problems when automating their cybersecurity processes. If cybersecurity automation is proving to be so flawed, why should organisations adopt it as a methodology?</p><h2>Improving the Automation of Processes Within Cybersecurity</h2><p>Within cybersecurity,&nbsp;the automation of processes provides technologies with a mind of their own, allowing them to intercept problems without having to rely on the variables that humans are usually compromised by. Beyond this, adversaries themselves often use automation as a way to hack into endpoints. In order to keep up with the pace of adversarial technologies and approaches, organisations are going to have to fight fire with fire.&nbsp;When you adjust your cybersecurity approach to include the automation of processes, cybersecurity technologies ramp up&nbsp;<em>their speed</em>&nbsp;in dealing with these issues. Becoming faster, and inevitably <em>more furious</em>, is ultimately the primary goal of threat interception.</p><h3>How do senior-level professionals feel about cybersecurity automation?</h3><p>While the vast majority of senior-level security professionals (77%) believe that automation is important, that same 23% are still struggling to see the benefits it would bring. This makes the automation of processes a rather difficult task for many entry-mid-level employees that have a stronger understanding of what will benefit their business. That said, the vast majority of&nbsp; experts who are automating have strategic reasons for doing so. 34% of correspondents, for instance, stating that automation was essential for improving or maintaining security standards while 31% implemented it to improve efficiency and productivity.&nbsp;</p><p>In this episode of The Next Phase of Cybersecurity, Leon Ward, VP of Product Management at&nbsp;ThreatQuotient, walks us through the best way to overcome the technological challenges of implementing automation, the types of processes that are being automated in 2021 and why there is a lack of trust in STEM in the current digital landscape.</p>]]></description><content:encoded><![CDATA[<p>Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes the&nbsp;<em>cookie.&nbsp;</em>The adoption of automation has certainly been widespread, with 95% of correspondents stating that they have automated some of their processes,&nbsp;but it always comes with challenges.</p><p>According to a report by ThreatQuotient, only 8% of correspondents had&nbsp;<strong>not</strong>&nbsp;encountered any problems when automating their cybersecurity processes. If cybersecurity automation is proving to be so flawed, why should organisations adopt it as a methodology?</p><h2>Improving the Automation of Processes Within Cybersecurity</h2><p>Within cybersecurity,&nbsp;the automation of processes provides technologies with a mind of their own, allowing them to intercept problems without having to rely on the variables that humans are usually compromised by. Beyond this, adversaries themselves often use automation as a way to hack into endpoints. In order to keep up with the pace of adversarial technologies and approaches, organisations are going to have to fight fire with fire.&nbsp;When you adjust your cybersecurity approach to include the automation of processes, cybersecurity technologies ramp up&nbsp;<em>their speed</em>&nbsp;in dealing with these issues. Becoming faster, and inevitably <em>more furious</em>, is ultimately the primary goal of threat interception.</p><h3>How do senior-level professionals feel about cybersecurity automation?</h3><p>While the vast majority of senior-level security professionals (77%) believe that automation is important, that same 23% are still struggling to see the benefits it would bring. This makes the automation of processes a rather difficult task for many entry-mid-level employees that have a stronger understanding of what will benefit their business. That said, the vast majority of&nbsp; experts who are automating have strategic reasons for doing so. 34% of correspondents, for instance, stating that automation was essential for improving or maintaining security standards while 31% implemented it to improve efficiency and productivity.&nbsp;</p><p>In this episode of The Next Phase of Cybersecurity, Leon Ward, VP of Product Management at&nbsp;ThreatQuotient, walks us through the best way to overcome the technological challenges of implementing automation, the types of processes that are being automated in 2021 and why there is a lack of trust in STEM in the current digital landscape.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">0b5f7849-5066-43b6-a014-0d2eb7e9a023</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 20 Oct 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/a3bab2b0-e407-4dac-aed4-1d996479085b/em360-npcs-leon-ward.mp3" length="34992239" type="audio/mpeg"/><itunes:duration>20:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Building Connections in Your Cybersecurity Job</title><itunes:title>Building Connections in Your Cybersecurity Job</itunes:title><description><![CDATA[<p>Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people cite that the career can&nbsp;often result in low pay based on the amount of labour that's put in, while others find the career attractive but are unsure at what level to start with. One of the biggest problems facing organisations today is the lack of cybersecurity professionals available, and it absolutely could be to do with the drawbacks of having a cybersecurity job.&nbsp;There are other arguments to be made, however, most notably that&nbsp;the cybersecurity field changes with every month. New adversarial technologies and approaches plague organisations, and having someone that is fully equipped and trained to deal with these challenges is a nightmare.&nbsp;</p><p>According to&nbsp;The New York Times, there will be over 3.5 million unfilled cybersecurity jobs by the end of 2021, so what can be done about it? Joining us in this podcast are&nbsp;Samantha Humphries, Head of EMEA Marketing and Security Strategy at&nbsp;Exabeam, and&nbsp;Phil Jackman, Director of Dynamo North East. They will be exploring the necessities of networking for cybersecurity professionals, the steps that need to be taken to encourage more cybersecurity professionals and the difficulties facing the career today.</p>]]></description><content:encoded><![CDATA[<p>Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people cite that the career can&nbsp;often result in low pay based on the amount of labour that's put in, while others find the career attractive but are unsure at what level to start with. One of the biggest problems facing organisations today is the lack of cybersecurity professionals available, and it absolutely could be to do with the drawbacks of having a cybersecurity job.&nbsp;There are other arguments to be made, however, most notably that&nbsp;the cybersecurity field changes with every month. New adversarial technologies and approaches plague organisations, and having someone that is fully equipped and trained to deal with these challenges is a nightmare.&nbsp;</p><p>According to&nbsp;The New York Times, there will be over 3.5 million unfilled cybersecurity jobs by the end of 2021, so what can be done about it? Joining us in this podcast are&nbsp;Samantha Humphries, Head of EMEA Marketing and Security Strategy at&nbsp;Exabeam, and&nbsp;Phil Jackman, Director of Dynamo North East. They will be exploring the necessities of networking for cybersecurity professionals, the steps that need to be taken to encourage more cybersecurity professionals and the difficulties facing the career today.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">942cc8eb-66f7-438a-97eb-aecc9b6bf910</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 08 Sep 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0cd7925a-1e76-451d-b2bf-4e033cd7dfc3/em360-npcs-samantha-humphries-phil-jackman.mp3" length="26436606" type="audio/mpeg"/><itunes:duration>18:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Best Software Security Practices for 2021</title><itunes:title>Best Software Security Practices for 2021</itunes:title><description><![CDATA[<p>Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that all seem to be&nbsp;promising the same thing. For many application developers, the use of open-source libraries grants them greater freedom when developing their apps but simultaneously leaves them vulnerable. Application security remains a corner stone of the app development world, but so few developers take it as seriously as they should.&nbsp;</p><p>In a recent open-source edition of Veracode's&nbsp;State of Software Security Report,&nbsp;it was revealed that a shocking 70% of applications have a security flaw in an open source library on initial scan. Beyond this being a flaw within some open source software, one of the most striking statistics is that ‘79% of the time, developers never update third-party libraries after including them in a codebase'. This calls for stronger security within application security, but what steps can developers take in order to ensure the longevity of application security?</p><p>In this podcast, we speak to&nbsp;John Smith, Manager, Solutions Architect, EMEA and APAC at&nbsp;Veracode.&nbsp;John takes us through some of the findings from this report, the vulnerabilities within open source software, the needed steps to improve application security and what awaits in the future.</p>]]></description><content:encoded><![CDATA[<p>Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that all seem to be&nbsp;promising the same thing. For many application developers, the use of open-source libraries grants them greater freedom when developing their apps but simultaneously leaves them vulnerable. Application security remains a corner stone of the app development world, but so few developers take it as seriously as they should.&nbsp;</p><p>In a recent open-source edition of Veracode's&nbsp;State of Software Security Report,&nbsp;it was revealed that a shocking 70% of applications have a security flaw in an open source library on initial scan. Beyond this being a flaw within some open source software, one of the most striking statistics is that ‘79% of the time, developers never update third-party libraries after including them in a codebase'. This calls for stronger security within application security, but what steps can developers take in order to ensure the longevity of application security?</p><p>In this podcast, we speak to&nbsp;John Smith, Manager, Solutions Architect, EMEA and APAC at&nbsp;Veracode.&nbsp;John takes us through some of the findings from this report, the vulnerabilities within open source software, the needed steps to improve application security and what awaits in the future.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">bc2c7d4d-f335-4397-9258-55b185167b57</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 18 Aug 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/151d44dc-a6e8-4d64-95e1-a4200f6a2372/em360-npcs-john-smith-1.mp3" length="29358774" type="audio/mpeg"/><itunes:duration>20:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Top Enterprises are Normalising Data Leaks</title><itunes:title>Top Enterprises are Normalising Data Leaks</itunes:title><description><![CDATA[<p>Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it no longer makes the headlines. In fact, even in 2021 Facebook faced scrutiny for a&nbsp;data leak that revealed over 530 million people's private information, in some cases including phone numbers. Of course, legal action has been taken by individual bodies&nbsp;but, as many experts point out, tech giants such as&nbsp;Facebook&nbsp;and Google&nbsp;have the monetary capacity to hire complex legal teams that allow them to navigate around GDPR and other data violations. Data leaks are now being normalised, which causes more risk to both individuals and even organisations. The latest development comes under the bracket of 'data scraping'; a controversial topic in the technology industry.</p><p>Data scraping is, in its essence, a technique that&nbsp;allows a computer to extract data from an output&nbsp;that's generated by&nbsp;another program. Now, data scraping in its core form is not necessarily harmful&nbsp;but the risk of leaks that occur from data scraping, or the purpose of data scraping, raises a lot of questions. Joining us in this episode of The Next Phase of Cybersecurity is&nbsp;Derek Taylor,&nbsp;Lead Principal Security Consultant at&nbsp;Trustwave. In this podcast, we explore some of the reasons why data scraping is so alarming to cybersecurity experts, how user's privacy calculus around data disclosure decisions are being manipulated, the 'privacy paradox' and reversing the normalisation of data leaks.</p>]]></description><content:encoded><![CDATA[<p>Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it no longer makes the headlines. In fact, even in 2021 Facebook faced scrutiny for a&nbsp;data leak that revealed over 530 million people's private information, in some cases including phone numbers. Of course, legal action has been taken by individual bodies&nbsp;but, as many experts point out, tech giants such as&nbsp;Facebook&nbsp;and Google&nbsp;have the monetary capacity to hire complex legal teams that allow them to navigate around GDPR and other data violations. Data leaks are now being normalised, which causes more risk to both individuals and even organisations. The latest development comes under the bracket of 'data scraping'; a controversial topic in the technology industry.</p><p>Data scraping is, in its essence, a technique that&nbsp;allows a computer to extract data from an output&nbsp;that's generated by&nbsp;another program. Now, data scraping in its core form is not necessarily harmful&nbsp;but the risk of leaks that occur from data scraping, or the purpose of data scraping, raises a lot of questions. Joining us in this episode of The Next Phase of Cybersecurity is&nbsp;Derek Taylor,&nbsp;Lead Principal Security Consultant at&nbsp;Trustwave. In this podcast, we explore some of the reasons why data scraping is so alarming to cybersecurity experts, how user's privacy calculus around data disclosure decisions are being manipulated, the 'privacy paradox' and reversing the normalisation of data leaks.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a1366998-5f16-4c71-9088-eb2cc7663b23</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 21 Jul 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/943860db-5a92-4db9-a19e-6ebf1e9cb270/derek-taylor-final.mp3" length="47622268" type="audio/mpeg"/><itunes:duration>19:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Analysing the Top Indicators of Behaviour</title><itunes:title>Analysing the Top Indicators of Behaviour</itunes:title><description><![CDATA[<p>Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "Indicators of Compromise" remain prevalent to this day. Relying on&nbsp;the top indicators of compromise, or IOC, depends upon finding threats as and when they appear. New methodologies incorporate a slightly more anticipatory model, however; Indicators of Behaviour, or IOB, work to understand the common signs that could potentially lead an organisation to be struck by a cyber attack.</p><p>Having a firm understanding of these topics is essential for any CISO or anyone involved in the security field, however it can be time consuming. That's why, on this episode of The Next Phase of Cybersecurity, we have interviewed&nbsp;<a href="https://www.linkedin.com/in/richardwuk/" rel="noopener noreferrer" target="_blank">Richard Walters,</a>&nbsp;CTO at&nbsp;<a href="https://www.censornet.com/" rel="noopener noreferrer" target="_blank">Censornet</a>. Using his expertise, Richard walks us through the detailed differences between IOB and IOC, the ROI organisations could see from implementing an IOB based approach and how to implement the switch from IOC to IOB.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "Indicators of Compromise" remain prevalent to this day. Relying on&nbsp;the top indicators of compromise, or IOC, depends upon finding threats as and when they appear. New methodologies incorporate a slightly more anticipatory model, however; Indicators of Behaviour, or IOB, work to understand the common signs that could potentially lead an organisation to be struck by a cyber attack.</p><p>Having a firm understanding of these topics is essential for any CISO or anyone involved in the security field, however it can be time consuming. That's why, on this episode of The Next Phase of Cybersecurity, we have interviewed&nbsp;<a href="https://www.linkedin.com/in/richardwuk/" rel="noopener noreferrer" target="_blank">Richard Walters,</a>&nbsp;CTO at&nbsp;<a href="https://www.censornet.com/" rel="noopener noreferrer" target="_blank">Censornet</a>. Using his expertise, Richard walks us through the detailed differences between IOB and IOC, the ROI organisations could see from implementing an IOB based approach and how to implement the switch from IOC to IOB.&nbsp;</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">cb563d72-732a-4e5e-af3c-ba4953ec22c8</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 02 Jul 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/562ef25d-9116-4098-863f-18d47ffacb77/em360-npcs-richard-walters.mp3" length="30593872" type="audio/mpeg"/><itunes:duration>21:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>What Cybersecurity Experts Get Wrong</title><itunes:title>What Cybersecurity Experts Get Wrong</itunes:title><description><![CDATA[<p>When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are starting to realise, however, is that technology by itself has limitations; the perfect combination actually comes from having&nbsp;good technology and skilled professionals who know how to use it. Many security&nbsp;technologies rely on an alert basis; a method that notifies&nbsp;professionals to investigate problems as and when they appear. The problem with this is that, according to Arctic Wolf, 44% of security alerts are actually not investigated.&nbsp;</p><p>What cybersecurity solutions do I need to know about?</p><p>Threat hunting is, as our guest today points out, the method of "proactively identifying malicious activities or security concerns within an organisation." This means that malicious activities&nbsp;could have previously been detected&nbsp;or maybe the hunter is looking for threats before they have even made their first appearance. In fact, the method of being anticipatory when it comes to cybersecurity has always proved to be more effective than being reactionary.&nbsp;</p><p>Our guest today is Christopher Fielder, Director of Product Marketing at Arctic Wolf.&nbsp;Christopher takes us through the steps of incorporating threat detection in your organisation, what the fundamental misconceptions are about threat hunting and how it can save your business more than it costs.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are starting to realise, however, is that technology by itself has limitations; the perfect combination actually comes from having&nbsp;good technology and skilled professionals who know how to use it. Many security&nbsp;technologies rely on an alert basis; a method that notifies&nbsp;professionals to investigate problems as and when they appear. The problem with this is that, according to Arctic Wolf, 44% of security alerts are actually not investigated.&nbsp;</p><p>What cybersecurity solutions do I need to know about?</p><p>Threat hunting is, as our guest today points out, the method of "proactively identifying malicious activities or security concerns within an organisation." This means that malicious activities&nbsp;could have previously been detected&nbsp;or maybe the hunter is looking for threats before they have even made their first appearance. In fact, the method of being anticipatory when it comes to cybersecurity has always proved to be more effective than being reactionary.&nbsp;</p><p>Our guest today is Christopher Fielder, Director of Product Marketing at Arctic Wolf.&nbsp;Christopher takes us through the steps of incorporating threat detection in your organisation, what the fundamental misconceptions are about threat hunting and how it can save your business more than it costs.&nbsp;</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c9d845f2-92c6-40d0-8bcc-24aa8c1dc4d9</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Wed, 16 Jun 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/90d23b27-be46-4019-b561-8ed665db30b5/em360-npcs-christopher-fielder.mp3" length="29760666" type="audio/mpeg"/><itunes:duration>20:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Social Engineering: Psychological Warfare in the Cyberspace</title><itunes:title>Social Engineering: Psychological Warfare in the Cyberspace</itunes:title><description><![CDATA[<p>From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recognising the fact that as much as you train and prepare your organisation, adversaries will also continue to advance can be anxiety inducing.&nbsp;Yes,&nbsp;organisations lose billions every year to fraud&nbsp;and the beginning of 2021 was met with a&nbsp;huge influx in cybercrime, but it's the methods&nbsp;that the adversaries are using that is truly concerning.&nbsp;</p><p><br></p><p>Social engineering is a method used by adversaries in the cyberspace that works by gaining the trust of their target. By impersonating a colleague, bribing or blackmailing the victim&nbsp;or even just assuming the voice of an authoritative figure, adversaries are coercing employees into cooperating and, potentially, into wiring money to them. It's psychological warfare and it's not slowing down;&nbsp;social engineering attacks make up 98% of attacks&nbsp;every year, so what can you do to prevent it?</p><p><br></p><p>Educating us in this episode of&nbsp;The Next Phase of Cybersecurity&nbsp;is Greg Hancell, Senior Manager Fraud Consultancy a&nbsp;OneSpan.&nbsp;Greg details to us the use of automation in fraud operations, how AI is saving banks and what current methods an adversary might use in conducting a social engineering attack.</p>]]></description><content:encoded><![CDATA[<p>From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recognising the fact that as much as you train and prepare your organisation, adversaries will also continue to advance can be anxiety inducing.&nbsp;Yes,&nbsp;organisations lose billions every year to fraud&nbsp;and the beginning of 2021 was met with a&nbsp;huge influx in cybercrime, but it's the methods&nbsp;that the adversaries are using that is truly concerning.&nbsp;</p><p><br></p><p>Social engineering is a method used by adversaries in the cyberspace that works by gaining the trust of their target. By impersonating a colleague, bribing or blackmailing the victim&nbsp;or even just assuming the voice of an authoritative figure, adversaries are coercing employees into cooperating and, potentially, into wiring money to them. It's psychological warfare and it's not slowing down;&nbsp;social engineering attacks make up 98% of attacks&nbsp;every year, so what can you do to prevent it?</p><p><br></p><p>Educating us in this episode of&nbsp;The Next Phase of Cybersecurity&nbsp;is Greg Hancell, Senior Manager Fraud Consultancy a&nbsp;OneSpan.&nbsp;Greg details to us the use of automation in fraud operations, how AI is saving banks and what current methods an adversary might use in conducting a social engineering attack.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">78680c6c-b119-4567-ab63-f90e869483e0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 18 May 2021 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/b94d6fc8-f8f9-48e9-8b65-0fd5bd27fc58/em360-npcs-greg-hancell.mp3" length="38418872" type="audio/mpeg"/><itunes:duration>26:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Building resiliency through disruption with RSA Security</title><itunes:title>Building resiliency through disruption with RSA Security</itunes:title><description><![CDATA[<p>As businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT functions, and third-party relationships. These factors can be hard to coordinate across departments and this lack of visibility makes it difficult to prove and report that continuity and recovery plans are in place and will work as intended. Resiliency programs allow for a proactive approach in order to address and mitigate resiliency risk to your organisation. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid any negative impacts of disruption.</p><p>In this podcast,&nbsp;Ben Tuckwell, UK District Director at&nbsp;RSA Security&nbsp;talks about building business resiliency. To begin with, Ben&nbsp;explains how organisations can ensure they have optimal business continuity and processes in place. Furthermore,&nbsp;he explains how organisations should approach a business impact analysis to understand what is happening. Also, Ben&nbsp;outlines how to monitor third party ecosystems to manage related security, access, compliance, and resiliency risks. Finally, he talks about how to conduct risk assessments for understanding a vendor’s residual risk and reducing it.</p>]]></description><content:encoded><![CDATA[<p>As businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT functions, and third-party relationships. These factors can be hard to coordinate across departments and this lack of visibility makes it difficult to prove and report that continuity and recovery plans are in place and will work as intended. Resiliency programs allow for a proactive approach in order to address and mitigate resiliency risk to your organisation. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid any negative impacts of disruption.</p><p>In this podcast,&nbsp;Ben Tuckwell, UK District Director at&nbsp;RSA Security&nbsp;talks about building business resiliency. To begin with, Ben&nbsp;explains how organisations can ensure they have optimal business continuity and processes in place. Furthermore,&nbsp;he explains how organisations should approach a business impact analysis to understand what is happening. Also, Ben&nbsp;outlines how to monitor third party ecosystems to manage related security, access, compliance, and resiliency risks. Finally, he talks about how to conduct risk assessments for understanding a vendor’s residual risk and reducing it.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">c5e657a0-0875-4eef-a934-3a49f48e1ed0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 16 Feb 2021 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/3438ed2e-f3a9-434b-ac49-2d0f0f88eec3/rsa-podcast-may.mp3" length="26573671" type="audio/mpeg"/><itunes:duration>18:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Secure remote working practices with Menlo Security</title><itunes:title>Secure remote working practices with Menlo Security</itunes:title><description><![CDATA[<p>The need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decades has been on a spectrum from highly supportive – as much flexibility as possible – to highly conservative – the risks are too great. These risks, that have held many businesses back, include the loss of control over what employees are doing and who they are interacting with, to the danger of corporate and controlled personal data getting into the wrong hands. Since the forced lockdown even the most conservative businesses have recognised the benefits of homeworking for both employees and employers.</p><p>In this podcast, Bob Tarzey speaks to Kowsik Guruswamy, Chief Technology Officer at Menlo Security about the challenges related to remote working and the technology options available to support it. Kowsik explains the main risks that arise with increased home working especially for businesses who have not adopted it previously. He also explains how homeworkers can have an experience that is as secure as office workers. Finally, he outlines how to improve performance and security for home workers.</p>]]></description><content:encoded><![CDATA[<p>The need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decades has been on a spectrum from highly supportive – as much flexibility as possible – to highly conservative – the risks are too great. These risks, that have held many businesses back, include the loss of control over what employees are doing and who they are interacting with, to the danger of corporate and controlled personal data getting into the wrong hands. Since the forced lockdown even the most conservative businesses have recognised the benefits of homeworking for both employees and employers.</p><p>In this podcast, Bob Tarzey speaks to Kowsik Guruswamy, Chief Technology Officer at Menlo Security about the challenges related to remote working and the technology options available to support it. Kowsik explains the main risks that arise with increased home working especially for businesses who have not adopted it previously. He also explains how homeworkers can have an experience that is as secure as office workers. Finally, he outlines how to improve performance and security for home workers.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">1b7867bd-71e7-4e14-8b9c-f0309a238b81</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 02 Feb 2021 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/86f942ce-268e-4028-8151-e3b35cc2a7de/menlo-security-podcast-1.mp3" length="30538159" type="audio/mpeg"/><itunes:duration>21:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>How inbox defence protects against increasingly sophisticated attacks with Barracuda</title><itunes:title>How inbox defence protects against increasingly sophisticated attacks with Barracuda</itunes:title><description><![CDATA[<p>The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand reputations, and trust within the organisation. Traditional email security solutions aren’t enough to protect businesses anymore. Processes need to be in place to actively defend against sophisticated email threats. These threats are often able to bypass defences by using numerous backdoor techniques.</p><p>In this podcast, Olesia Klevchuk, Senior Product Marketing Manager at Barracuda explores different email threat types and what measures can be taken to protect organisations. To begin with, Olesia explains some of the thirteen threats we’re currently seeing and the impact of these on organisations. Then, she outlines what gateway protection is and how this can be beneficial. Further to this, she explains how API-based inbox defence is implemented and what attacks it can block. Finally, Olesia showcases the strategies that organisations can implement to stay on top of rising risks.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand reputations, and trust within the organisation. Traditional email security solutions aren’t enough to protect businesses anymore. Processes need to be in place to actively defend against sophisticated email threats. These threats are often able to bypass defences by using numerous backdoor techniques.</p><p>In this podcast, Olesia Klevchuk, Senior Product Marketing Manager at Barracuda explores different email threat types and what measures can be taken to protect organisations. To begin with, Olesia explains some of the thirteen threats we’re currently seeing and the impact of these on organisations. Then, she outlines what gateway protection is and how this can be beneficial. Further to this, she explains how API-based inbox defence is implemented and what attacks it can block. Finally, Olesia showcases the strategies that organisations can implement to stay on top of rising risks.&nbsp;</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f7d61542-79cf-47b2-a1ad-cd9ae123486c</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 19 Jan 2021 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/085849b1-f62a-4d40-aeed-6db081e3a9f2/baracuda-networks-podcast.mp3" length="38096502" type="audio/mpeg"/><itunes:duration>26:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Navigating a crisis and the benefits of Zero Trust with Infoblox</title><itunes:title>Navigating a crisis and the benefits of Zero Trust with Infoblox</itunes:title><description><![CDATA[<p>The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new challenges for organisations to overcome. One of these challenges has been how we secure remote users and maintain security control for the organisation. The concept of Zero Trust is emerging as the preferred remedy for addressing remote work security challenges. The fundamental goal is to avoid reliance on trusted networks and to treat every system as an untrusted host.</p><p>In this podcast, Chris Steffen speaks to Krupa Srivatsan, Director of Product Marketing at Infoblox. Firstly, Krupa outlines the new trends they have seen customers face around security problems and adapting to this new form of working. Then she offers advice for security professionals dealing with remote working challenges. Also, Krupa outlines her views on Zero Trust and how it affects remote workers in relation to improving security. Finally, she explains how Zero Trust can help with compliance-related challenges.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new challenges for organisations to overcome. One of these challenges has been how we secure remote users and maintain security control for the organisation. The concept of Zero Trust is emerging as the preferred remedy for addressing remote work security challenges. The fundamental goal is to avoid reliance on trusted networks and to treat every system as an untrusted host.</p><p>In this podcast, Chris Steffen speaks to Krupa Srivatsan, Director of Product Marketing at Infoblox. Firstly, Krupa outlines the new trends they have seen customers face around security problems and adapting to this new form of working. Then she offers advice for security professionals dealing with remote working challenges. Also, Krupa outlines her views on Zero Trust and how it affects remote workers in relation to improving security. Finally, she explains how Zero Trust can help with compliance-related challenges.&nbsp;</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">2342d5a4-4b85-4a2e-8a8b-db825ef71a21</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 05 Jan 2021 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/1e5c698c-627a-447a-ac29-e30be7b70c89/infoblox-podcast.mp3" length="35981228" type="audio/mpeg"/><itunes:duration>24:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The Business Balancing Act – User Experience and Security with Auth0</title><itunes:title>The Business Balancing Act – User Experience and Security with Auth0</itunes:title><description><![CDATA[<p>For organisations that want to ensure safe,&nbsp;scalable,&nbsp;and efficient access to their services, effective identity and access management solutions are essential. However, ensuring maximum security and maintaining a smooth user experience is a challenge. The more we move into the digital environment, the more each company must focus on these aspects and construct the&nbsp;identity and access management (IAM)&nbsp;programs with the&nbsp;users&nbsp;in mind.</p><p>In this podcast,&nbsp;Kris Imbrechts, Regional Director Northern &amp; Southern Europe at Auth0 explains the business balancing act between user experience and security. To begin with, Kris&nbsp;explains the current state of IAM solutions in the market and how organisations are approaching implementation.&nbsp;Further to this, he outlines the build vs buy strategy and the importance of a seamless and almost invisible IAM solution.&nbsp;Finally, Kris looks at maintaining trust in users and the considerations needed for longevity and safety when implementing apps.</p>]]></description><content:encoded><![CDATA[<p>For organisations that want to ensure safe,&nbsp;scalable,&nbsp;and efficient access to their services, effective identity and access management solutions are essential. However, ensuring maximum security and maintaining a smooth user experience is a challenge. The more we move into the digital environment, the more each company must focus on these aspects and construct the&nbsp;identity and access management (IAM)&nbsp;programs with the&nbsp;users&nbsp;in mind.</p><p>In this podcast,&nbsp;Kris Imbrechts, Regional Director Northern &amp; Southern Europe at Auth0 explains the business balancing act between user experience and security. To begin with, Kris&nbsp;explains the current state of IAM solutions in the market and how organisations are approaching implementation.&nbsp;Further to this, he outlines the build vs buy strategy and the importance of a seamless and almost invisible IAM solution.&nbsp;Finally, Kris looks at maintaining trust in users and the considerations needed for longevity and safety when implementing apps.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4b2bdbff-d680-4446-81a2-d474c3f8c896</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 22 Dec 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/78c52a9c-9912-45dd-ae4b-45a81226eb88/auth0-podcast.mp3" length="30183292" type="audio/mpeg"/><itunes:duration>20:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The use of external threat intelligence for proactive IT security with IntSights</title><itunes:title>The use of external threat intelligence for proactive IT security with IntSights</itunes:title><description><![CDATA[<p>Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software vulnerabilities. Intelligence is also required about what is happening in cyberspace that may represent a specific threat to your business. The deepest recesses of the web need probing to gathering this intelligence. Not just the clear web, the websites that we all use on a day-to-day basis, but also the dark and, where possible, deep web.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/cwillhoite/" rel="noopener noreferrer" target="_blank">Charity Wright</a>, Cyber Threat Intelligence Advisor and&nbsp;<a href="https://www.linkedin.com/in/etaymaor/" rel="noopener noreferrer" target="_blank">Etay Maor</a>, Chief Security Officer at&nbsp;<a href="https://intsights.com/" rel="noopener noreferrer" target="_blank">IntSights</a>.&nbsp;Firstly, they outline some use cases for external threat intelligence and the types of risks that can be mitigated. Then, they discuss how to probe the dark web in terms of identifying threats but also using analysis effectively. Finally, they explore how IntSights uses this analysis for mitigating threats.</p>]]></description><content:encoded><![CDATA[<p>Keeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software vulnerabilities. Intelligence is also required about what is happening in cyberspace that may represent a specific threat to your business. The deepest recesses of the web need probing to gathering this intelligence. Not just the clear web, the websites that we all use on a day-to-day basis, but also the dark and, where possible, deep web.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/cwillhoite/" rel="noopener noreferrer" target="_blank">Charity Wright</a>, Cyber Threat Intelligence Advisor and&nbsp;<a href="https://www.linkedin.com/in/etaymaor/" rel="noopener noreferrer" target="_blank">Etay Maor</a>, Chief Security Officer at&nbsp;<a href="https://intsights.com/" rel="noopener noreferrer" target="_blank">IntSights</a>.&nbsp;Firstly, they outline some use cases for external threat intelligence and the types of risks that can be mitigated. Then, they discuss how to probe the dark web in terms of identifying threats but also using analysis effectively. Finally, they explore how IntSights uses this analysis for mitigating threats.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">80a80451-41ac-48e4-a770-b42677a49fc5</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 08 Dec 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/0116fe60-78ad-44bb-af6a-7fd01c27ab16/insights-podcast.mp3" length="36013772" type="audio/mpeg"/><itunes:duration>25:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Understanding the current state of SOAR and its future with Swimlane</title><itunes:title>Understanding the current state of SOAR and its future with Swimlane</itunes:title><description><![CDATA[<p>Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep up with the growing volume of alerts. SOAR solutions combine automated data gathering, security automation, case management and analytics to provide organisations the ability to speed up the incident response process.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/codycornell/" rel="noopener noreferrer" target="_blank">Cody Cornell</a>, Co-founder and CEO at&nbsp;<a href="https://swimlane.com/" rel="noopener noreferrer" target="_blank">Swimlane</a>, a U.S. based independent SOAR solution provider. Cody introduces how businesses are adopting SOAR tools and explains the ease in which they are deployed. He also provides some use cases for the type of workflows that SOAR enables that were previously hard to achieve. Finally,&nbsp;Cody details how different sized enterprises can access and use SOAR effectively and how he sees Swimlane evolving and contributing to the industry over the coming years.</p>]]></description><content:encoded><![CDATA[<p>Manual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep up with the growing volume of alerts. SOAR solutions combine automated data gathering, security automation, case management and analytics to provide organisations the ability to speed up the incident response process.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/codycornell/" rel="noopener noreferrer" target="_blank">Cody Cornell</a>, Co-founder and CEO at&nbsp;<a href="https://swimlane.com/" rel="noopener noreferrer" target="_blank">Swimlane</a>, a U.S. based independent SOAR solution provider. Cody introduces how businesses are adopting SOAR tools and explains the ease in which they are deployed. He also provides some use cases for the type of workflows that SOAR enables that were previously hard to achieve. Finally,&nbsp;Cody details how different sized enterprises can access and use SOAR effectively and how he sees Swimlane evolving and contributing to the industry over the coming years.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b9793a6e-4323-4fcc-bbe7-7e26db21c0f1</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 24 Nov 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5fc5d106-7470-4f24-baa0-28f50ca1854c/swimlane-podcast.mp3" length="26259410" type="audio/mpeg"/><itunes:duration>18:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>IT Security Policy Management and Automation with FireMon</title><itunes:title>IT Security Policy Management and Automation with FireMon</itunes:title><description><![CDATA[<p>As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across all relevant security devices regardless of function and supplier. Given the sheer volume, a manual approach would be too impractical. Thus, organisations must turn to specialist products that harness automation as a means to cover more diverse security requirements and enhance security analytics and intelligence.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/lintell/" rel="noopener noreferrer" target="_blank">Andrew Lintell</a>, Vice President and Managing Director, EMEA at&nbsp;<a href="https://www.firemon.com/" rel="noopener noreferrer" target="_blank">FireMon</a>. Andrew introduces the FireMon brand and how diverse the devices are that such vendors cater for. He also details the role that vendors like FireMon play in SecDevOps. As well as this, Andrew explains how FireMon helps in ensuring that organisations’ security systems are compliant and how it can prove this to the relevant regulatory bodies.</p>]]></description><content:encoded><![CDATA[<p>As security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across all relevant security devices regardless of function and supplier. Given the sheer volume, a manual approach would be too impractical. Thus, organisations must turn to specialist products that harness automation as a means to cover more diverse security requirements and enhance security analytics and intelligence.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with&nbsp;<a href="https://www.linkedin.com/in/lintell/" rel="noopener noreferrer" target="_blank">Andrew Lintell</a>, Vice President and Managing Director, EMEA at&nbsp;<a href="https://www.firemon.com/" rel="noopener noreferrer" target="_blank">FireMon</a>. Andrew introduces the FireMon brand and how diverse the devices are that such vendors cater for. He also details the role that vendors like FireMon play in SecDevOps. As well as this, Andrew explains how FireMon helps in ensuring that organisations’ security systems are compliant and how it can prove this to the relevant regulatory bodies.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">1f1df611-0392-4c25-8430-79290a47cfbb</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 10 Nov 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/743b248e-33be-4407-be5e-c92683389d1b/firemon-podcast.mp3" length="56536357" type="audio/mpeg"/><itunes:duration>23:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Application Security in the age of DevSecOps with WhiteSource</title><itunes:title>Application Security in the age of DevSecOps with WhiteSource</itunes:title><description><![CDATA[<p>The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for Development &amp; DevOps teams, particularly in regard to applications. On the one hand, apps are a modern necessity to drive business success. However, on the other hand, they come with a host of security problems that need special attention, necessitating DevSecOps in turn.</p><p>Joining us to lend his expertise on this matter is Jeff Martin, Senior Director of Product at WhiteSource. Firstly, Jeff explains whose responsibility AppSec actually is and how organisations ultimately create DevSecOps. He then demonstrates what the typical ‘DevSecOps’ workflow should look like. Finally, he outlines the benefits of open source tools and how important security procedures are for businesses and their DevOps efforts.</p>]]></description><content:encoded><![CDATA[<p>The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for Development &amp; DevOps teams, particularly in regard to applications. On the one hand, apps are a modern necessity to drive business success. However, on the other hand, they come with a host of security problems that need special attention, necessitating DevSecOps in turn.</p><p>Joining us to lend his expertise on this matter is Jeff Martin, Senior Director of Product at WhiteSource. Firstly, Jeff explains whose responsibility AppSec actually is and how organisations ultimately create DevSecOps. He then demonstrates what the typical ‘DevSecOps’ workflow should look like. Finally, he outlines the benefits of open source tools and how important security procedures are for businesses and their DevOps efforts.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6e459541-3c89-4109-88d6-555fa126a308</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 27 Oct 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/fdc59821-00dc-441c-91e4-eb3e5e4dd032/whitesource-podcast.mp3" length="33657556" type="audio/mpeg"/><itunes:duration>23:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Optimising Application Security with Contrast Security</title><itunes:title>Optimising Application Security with Contrast Security</itunes:title><description><![CDATA[<p>Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they come with a host of security problems that need special attention.</p><p>Joining&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;to outline the considerations specific to application security is&nbsp;<a href="https://www.linkedin.com/in/planetlevel/" rel="noopener noreferrer" target="_blank">Jeff Williams</a>, Co-Founder and CTO at&nbsp;<a href="https://www.contrastsecurity.com/" rel="noopener noreferrer" target="_blank">Contrast Security</a>. In particular, Jeff details the threat posed by the fact that we simply aren’t very good at writing vulnerability-free software, and why this is the case. As well as this, they discuss the role of DevOps, and specifically, DevSecOps, in software development. Finally, Jeff delves into self-protecting software and how it works.</p>]]></description><content:encoded><![CDATA[<p>Applications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they come with a host of security problems that need special attention.</p><p>Joining&nbsp;<a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;to outline the considerations specific to application security is&nbsp;<a href="https://www.linkedin.com/in/planetlevel/" rel="noopener noreferrer" target="_blank">Jeff Williams</a>, Co-Founder and CTO at&nbsp;<a href="https://www.contrastsecurity.com/" rel="noopener noreferrer" target="_blank">Contrast Security</a>. In particular, Jeff details the threat posed by the fact that we simply aren’t very good at writing vulnerability-free software, and why this is the case. As well as this, they discuss the role of DevOps, and specifically, DevSecOps, in software development. Finally, Jeff delves into self-protecting software and how it works.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">bf08a017-a621-478c-9132-8a0d1e754c89</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Tue, 13 Oct 2020 00:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c18c7a8-69da-4fff-aa72-731334018e61/contrast-security-mixdown-1.mp3" length="66716290" type="audio/mpeg"/><itunes:duration>27:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Preventing Credential Stuffing Attacks with Shape Security</title><itunes:title>Preventing Credential Stuffing Attacks with Shape Security</itunes:title><description><![CDATA[<p>Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generation of threats that they need to worry about. Organisations must also consider the threats that have stood the test of time. In particular, credential stuffing is one that has persisted over the years. Unfortunately, the misunderstandings surrounding it makes it all-the-more difficult to mitigate.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/shumans/" rel="noopener noreferrer" target="_blank">Shuman Ghosemajumder</a>, CTO at <a href="https://www.shapesecurity.com/" rel="noopener noreferrer" target="_blank">Shape Security</a>, lends his expertise on the matter of credential stuffing. Firstly, he recaps what credential stuffing is and why it is still prevalent to this day. Then, he discusses the impact it has on companies and the best ways for them to mitigate the risks.</p>]]></description><content:encoded><![CDATA[<p>Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generation of threats that they need to worry about. Organisations must also consider the threats that have stood the test of time. In particular, credential stuffing is one that has persisted over the years. Unfortunately, the misunderstandings surrounding it makes it all-the-more difficult to mitigate.</p><p>In this podcast,&nbsp;<a href="https://www.linkedin.com/in/shumans/" rel="noopener noreferrer" target="_blank">Shuman Ghosemajumder</a>, CTO at <a href="https://www.shapesecurity.com/" rel="noopener noreferrer" target="_blank">Shape Security</a>, lends his expertise on the matter of credential stuffing. Firstly, he recaps what credential stuffing is and why it is still prevalent to this day. Then, he discusses the impact it has on companies and the best ways for them to mitigate the risks.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">5cc3aac7-799b-4285-9bba-c00eb8cab342</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:35:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/91cb53f9-3dc5-450f-bb43-07a9e8b77695/shape-security-podcast.mp3" length="29545290" type="audio/mpeg"/><itunes:duration>20:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Balancing Privacy and IT Security with Zscaler</title><itunes:title>Balancing Privacy and IT Security with Zscaler</itunes:title><description><![CDATA[<p>Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – all of which are significantly advantageous for business. However, as organisations begin to heavily rely on these innovations, it begs the question: how should businesses strike the balance between delivering useful, available IT services and protecting the privacy of employees and customers?</p><p>In this podcast, <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with <a href="https://www.linkedin.com/in/nbhowe/" rel="noopener noreferrer" target="_blank">Nathan Howe</a>, Director of Transformation Strategy at <a href="https://www.zscaler.com/" rel="noopener noreferrer" target="_blank">Zscaler</a>. Firstly, Nathan delves into how cloud, mobility, and crypto make up the 'unholy trinity' in cybersecurity. Then, he explores the effect of an increasingly millennial workplace, before revisiting crypto. In particular, he discusses the impact of companies not inspecting SSL and TLS and its effect on the threat landscape. Furthermore, Nathan outlines what traffic businesses have the right to inspect. He also demonstrates why Zscaler's origins in email security is still relevant today.</p>]]></description><content:encoded><![CDATA[<p>Technology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – all of which are significantly advantageous for business. However, as organisations begin to heavily rely on these innovations, it begs the question: how should businesses strike the balance between delivering useful, available IT services and protecting the privacy of employees and customers?</p><p>In this podcast, <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a>&nbsp;speaks with <a href="https://www.linkedin.com/in/nbhowe/" rel="noopener noreferrer" target="_blank">Nathan Howe</a>, Director of Transformation Strategy at <a href="https://www.zscaler.com/" rel="noopener noreferrer" target="_blank">Zscaler</a>. Firstly, Nathan delves into how cloud, mobility, and crypto make up the 'unholy trinity' in cybersecurity. Then, he explores the effect of an increasingly millennial workplace, before revisiting crypto. In particular, he discusses the impact of companies not inspecting SSL and TLS and its effect on the threat landscape. Furthermore, Nathan outlines what traffic businesses have the right to inspect. He also demonstrates why Zscaler's origins in email security is still relevant today.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">93f9337c-e060-4b19-9051-fc1ee5287caf</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:30:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/4acdec78-2b1d-4922-a67f-fed4a4e0ebf4/zscaler-podcast-nov.mp3" length="36391232" type="audio/mpeg"/><itunes:duration>25:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Secure Access in the Age of Zero Trust Networking with Pulse Secure</title><itunes:title>Secure Access in the Age of Zero Trust Networking with Pulse Secure</itunes:title><description><![CDATA[<p>Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees to work how and when they wish. However, this introduces new security considerations that many businesses have not had to address before.</p><p>Here to lend his expertise on the matter is&nbsp;<a href="https://www.linkedin.com/in/sudhakar-ramakrishna-a58223/" rel="noopener noreferrer" target="_blank">Sudhakar Ramakrishna</a>, CEO at <a href="https://www.pulsesecure.net/" rel="noopener noreferrer" target="_blank">Pulse Secure</a>. Sudhakar walks us through the findings of an IDG global survey sponsored by Pulse Secure, investigating the state of enterprise secure access. Then, he delves into how secure access is an enabler of digital transformation, while heightening security too. Furthermore, Sudhakar shares his guidance on what organisations need to do to drive secure access and zero trust capabilities.</p>]]></description><content:encoded><![CDATA[<p>Digital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees to work how and when they wish. However, this introduces new security considerations that many businesses have not had to address before.</p><p>Here to lend his expertise on the matter is&nbsp;<a href="https://www.linkedin.com/in/sudhakar-ramakrishna-a58223/" rel="noopener noreferrer" target="_blank">Sudhakar Ramakrishna</a>, CEO at <a href="https://www.pulsesecure.net/" rel="noopener noreferrer" target="_blank">Pulse Secure</a>. Sudhakar walks us through the findings of an IDG global survey sponsored by Pulse Secure, investigating the state of enterprise secure access. Then, he delves into how secure access is an enabler of digital transformation, while heightening security too. Furthermore, Sudhakar shares his guidance on what organisations need to do to drive secure access and zero trust capabilities.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a69bea32-a5d7-46e3-b2b6-793e94c6c34e</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:25:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/3a024a8e-29c1-4dd5-aeeb-78743492ea46/pulse-secure-podcast-1.mp3" length="36833586" type="audio/mpeg"/><itunes:duration>25:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan</title><itunes:title>Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan</itunes:title><description><![CDATA[<p>Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and frequency necessary for today's landscape. Businesses should endeavour to automate where possible, although the accuracy of automation isn't always 100%.</p><p>Joining us to lend his expertise on the matter is&nbsp;<a href="https://www.linkedin.com/in/eoinkeary/" rel="noopener noreferrer" target="_blank">Eoin Keary</a>, CEO and Founder at <a href="https://www.edgescan.com/" rel="noopener noreferrer" target="_blank">Edgescan</a>. Firstly, Eoin outlines the findings of a recent survey by Edgescan, which investigated validating false positives among cybersecurity professionals. Then, he explores the current challenges that cybersecurity professionals are facing today. Eoin also shares his guidance on overcoming these obstacles.</p>]]></description><content:encoded><![CDATA[<p>Vulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and frequency necessary for today's landscape. Businesses should endeavour to automate where possible, although the accuracy of automation isn't always 100%.</p><p>Joining us to lend his expertise on the matter is&nbsp;<a href="https://www.linkedin.com/in/eoinkeary/" rel="noopener noreferrer" target="_blank">Eoin Keary</a>, CEO and Founder at <a href="https://www.edgescan.com/" rel="noopener noreferrer" target="_blank">Edgescan</a>. Firstly, Eoin outlines the findings of a recent survey by Edgescan, which investigated validating false positives among cybersecurity professionals. Then, he explores the current challenges that cybersecurity professionals are facing today. Eoin also shares his guidance on overcoming these obstacles.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">e5d1db1a-37f5-447b-a4af-8c2328ffecda</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:20:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/62943c3f-62be-46e8-bcac-2ba0437c8fc5/edgescan-podcast.mp3" length="38713797" type="audio/mpeg"/><itunes:duration>26:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Threat Detection, Prevention, and Response with Blackberry Cylance</title><itunes:title>Threat Detection, Prevention, and Response with Blackberry Cylance</itunes:title><description><![CDATA[<p>Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to business is an increasing concern for IT departments and senior management alike. Thus, it is becoming increasingly important to consider how best to mitigate these risks.</p><p>In this podcast,&nbsp;freelance IT industry analyst <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a> speaks with&nbsp;<a href="https://www.linkedin.com/in/brianrobison1/" rel="noopener noreferrer" target="_blank">Brian Robison</a>, Chief Evangelist at <a href="https://www.cylance.com/en-us/index.html" rel="noopener noreferrer" target="_blank">Blackberry Cylance</a>. Brian begins by sharing his thoughts on how to prevent cyber attacks. In particular, he details Blackberry Cylance's approach of utilising computing power and AI to build a predictive model. Also, Brian outlines the role that data plays in cyber defence. Finally, Brian explains why he believes that investing in cybersecurity can provide a return for businesses.</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to business is an increasing concern for IT departments and senior management alike. Thus, it is becoming increasingly important to consider how best to mitigate these risks.</p><p>In this podcast,&nbsp;freelance IT industry analyst <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a> speaks with&nbsp;<a href="https://www.linkedin.com/in/brianrobison1/" rel="noopener noreferrer" target="_blank">Brian Robison</a>, Chief Evangelist at <a href="https://www.cylance.com/en-us/index.html" rel="noopener noreferrer" target="_blank">Blackberry Cylance</a>. Brian begins by sharing his thoughts on how to prevent cyber attacks. In particular, he details Blackberry Cylance's approach of utilising computing power and AI to build a predictive model. Also, Brian outlines the role that data plays in cyber defence. Finally, Brian explains why he believes that investing in cybersecurity can provide a return for businesses.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">3436168c-90a6-4c0a-8bc3-9be4377cf7fb</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:15:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/1d5bdd89-01ed-4985-b2d6-3cf7f304f8a6/cylance-cs-podcast.mp3" length="37042882" type="audio/mpeg"/><itunes:duration>25:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Automated Protection Against Common Vulnerabilities and Exposures with Sixgill</title><itunes:title>Automated Protection Against Common Vulnerabilities and Exposures with Sixgill</itunes:title><description><![CDATA[<p>Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks.&nbsp;Therefore, companies may benefit from using tools to increase automation and reduce manual procedures.</p><p>In this podcast,&nbsp;freelance IT industry analyst <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a> speaks with <a href="https://www.linkedin.com/in/benjipreminger/" rel="noopener noreferrer" target="_blank">Benjamin Preminger</a>,&nbsp;Senior Cyber Threat Intelligence Specialist at <a href="https://www.cybersixgill.com/" rel="noopener noreferrer" target="_blank">Sixgill</a>. Benjamin begins by outlining the differences between common vulnerabilities and exposures, and demonstrates the rate at which they are reported. He also shares his thoughts on the MITRE database and the inadequacies in their scoring. As well as this, Benjamin explores why a dynamic CVE scoring will make the patching process more manageable for security professionals.</p>]]></description><content:encoded><![CDATA[<p>Attacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks.&nbsp;Therefore, companies may benefit from using tools to increase automation and reduce manual procedures.</p><p>In this podcast,&nbsp;freelance IT industry analyst <a href="https://www.linkedin.com/in/bob-tarzey/" rel="noopener noreferrer" target="_blank">Bob Tarzey</a> speaks with <a href="https://www.linkedin.com/in/benjipreminger/" rel="noopener noreferrer" target="_blank">Benjamin Preminger</a>,&nbsp;Senior Cyber Threat Intelligence Specialist at <a href="https://www.cybersixgill.com/" rel="noopener noreferrer" target="_blank">Sixgill</a>. Benjamin begins by outlining the differences between common vulnerabilities and exposures, and demonstrates the rate at which they are reported. He also shares his thoughts on the MITRE database and the inadequacies in their scoring. As well as this, Benjamin explores why a dynamic CVE scoring will make the patching process more manageable for security professionals.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">24c525f6-bb0b-4689-9e36-3e22cacbe7b0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:10:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/01ab33a1-bd5d-4234-b02d-fd6205a2cd4d/sixgill-podcast.mp3" length="28234452" type="audio/mpeg"/><itunes:duration>19:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Social and Digital Endpoint with SafeGuard Cyber</title><itunes:title>Social and Digital Endpoint with SafeGuard Cyber</itunes:title><description><![CDATA[<p>Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. However, the current network security infrastructure was established before their creation. As a result, third-party apps have introduced security risks that the current structure cannot account for. Thus, businesses must take extra care to ensure their channels are secure.</p><p><a href="https://twitter.com/otaviofreire" rel="noopener noreferrer" target="_blank">Otavio Freire</a>,&nbsp;President, CTO, and Co-Founder at <a href="https://www.safeguardcyber.com/" rel="noopener noreferrer" target="_blank">SafeGuard Cyber</a>, joins us on this podcast to discuss the matter. Firstly, Otavio details the shortfalls of the current infrastructure and how this impacts companies' social and digital channels. Of course, these channels do have their in-app security and privacy settings, but Otavio outlines why these are not enough to rely on. He then goes on to explain the threats associated with social media channels. In light of these obstacles, Otavio shares his thoughts on how companies can get around the risks and make the most out of their social and digital channels.</p>]]></description><content:encoded><![CDATA[<p>Businesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. However, the current network security infrastructure was established before their creation. As a result, third-party apps have introduced security risks that the current structure cannot account for. Thus, businesses must take extra care to ensure their channels are secure.</p><p><a href="https://twitter.com/otaviofreire" rel="noopener noreferrer" target="_blank">Otavio Freire</a>,&nbsp;President, CTO, and Co-Founder at <a href="https://www.safeguardcyber.com/" rel="noopener noreferrer" target="_blank">SafeGuard Cyber</a>, joins us on this podcast to discuss the matter. Firstly, Otavio details the shortfalls of the current infrastructure and how this impacts companies' social and digital channels. Of course, these channels do have their in-app security and privacy settings, but Otavio outlines why these are not enough to rely on. He then goes on to explain the threats associated with social media channels. In light of these obstacles, Otavio shares his thoughts on how companies can get around the risks and make the most out of their social and digital channels.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6fd40d17-783e-44e1-adab-df3333f069c9</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:05:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/2898fb24-1072-442d-b42f-52f043d85c2f/safeguard-cyber-podcast.mp3" length="19357887" type="audio/mpeg"/><itunes:duration>13:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Continuous Controls Monitoring for Cybersecurity with Panaseer</title><itunes:title>Continuous Controls Monitoring for Cybersecurity with Panaseer</itunes:title><description><![CDATA[<p>The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor to this. This includes more technologies, more people, more data sets, and so on. However, the threat landscape has also changed and become more complex. This has ultimately led to cybersecurity having to be at the forefront of enterprise risk agendas.</p><p>In this podcast, <a href="https://www.linkedin.com/in/ajaken/" rel="noopener noreferrer" target="_blank">Dr Andrew Aken</a>&nbsp;speaks with <a href="https://www.linkedin.com/in/nikwhitfield/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">Nik Whitfield</a>, CEO and Founder at <a href="https://panaseer.com/" rel="noopener noreferrer" target="_blank">Panaseer</a>. Nik lends his expertise on establishing a cyber infrastructure. As well as this, Nik delves into the challenges that often confront organisations when&nbsp;trying to gain visibility into their cybersecurity controls and metrics. Finally, he discusses the pressing issue that is the cybersecurity skills gap.</p>]]></description><content:encoded><![CDATA[<p>The cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor to this. This includes more technologies, more people, more data sets, and so on. However, the threat landscape has also changed and become more complex. This has ultimately led to cybersecurity having to be at the forefront of enterprise risk agendas.</p><p>In this podcast, <a href="https://www.linkedin.com/in/ajaken/" rel="noopener noreferrer" target="_blank">Dr Andrew Aken</a>&nbsp;speaks with <a href="https://www.linkedin.com/in/nikwhitfield/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">Nik Whitfield</a>, CEO and Founder at <a href="https://panaseer.com/" rel="noopener noreferrer" target="_blank">Panaseer</a>. Nik lends his expertise on establishing a cyber infrastructure. As well as this, Nik delves into the challenges that often confront organisations when&nbsp;trying to gain visibility into their cybersecurity controls and metrics. Finally, he discusses the pressing issue that is the cybersecurity skills gap.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">6c2a2003-7a49-4896-b71b-e7956d1346c8</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 10:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/2033733a-01e1-4133-a989-e4c6dd067ba8/panaseer-podcast.mp3" length="64617056" type="audio/mpeg"/><itunes:duration>44:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Securing the DevOps Process with Capsule8</title><itunes:title>Securing the DevOps Process with Capsule8</itunes:title><description><![CDATA[<p>The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications and better accountability of developers were among the many advantages of DevOps. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for DevOps teams.</p><p>In this podcast, freelance IT industry analyst Bob Tarzey speaks with&nbsp;<a href="https://www.linkedin.com/in/kellyshortridge/" rel="noopener noreferrer" target="_blank">Kelly Shortridge</a>, VP of Product Strategy at <a href="https://capsule8.com/" rel="noopener noreferrer" target="_blank">Capsule8</a>. Kelly outlines the DevOps process and how it affects IT security. As well as this, she advises on the tools that DevOps teams can benefit from. She also demonstrates how&nbsp;the ‘DevSecOps’ approach can help organisations meet compliance obligations. Finally, Kelly delves into Linux deployment and filling the gaps it comes with.</p>]]></description><content:encoded><![CDATA[<p>The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications and better accountability of developers were among the many advantages of DevOps. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for DevOps teams.</p><p>In this podcast, freelance IT industry analyst Bob Tarzey speaks with&nbsp;<a href="https://www.linkedin.com/in/kellyshortridge/" rel="noopener noreferrer" target="_blank">Kelly Shortridge</a>, VP of Product Strategy at <a href="https://capsule8.com/" rel="noopener noreferrer" target="_blank">Capsule8</a>. Kelly outlines the DevOps process and how it affects IT security. As well as this, she advises on the tools that DevOps teams can benefit from. She also demonstrates how&nbsp;the ‘DevSecOps’ approach can help organisations meet compliance obligations. Finally, Kelly delves into Linux deployment and filling the gaps it comes with.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">a13d2d74-0df6-4767-977b-49fb3dbe10c3</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:50:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/699665c0-574e-42de-8287-8128783cf401/capsule-8-podcast.mp3" length="33706956" type="audio/mpeg"/><itunes:duration>23:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace</title><itunes:title>The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace</itunes:title><description><![CDATA[<p>Cybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous growing threats. A different approach is necessary to detect threats that signature technologies may have missed. Advanced end-to-end AI, allows security officers to transform their strategies from the classic reactionary cycles.</p><p>In this podcast, Industry Analyst at <a href="https://451research.com/" rel="noopener noreferrer" target="_blank">451 research</a>, Eric Ogren speaks to <a href="https://www.linkedin.com/in/nicole-eagan-4377b81/" rel="noopener noreferrer" target="_blank">Nicole Eagan</a>, CEO of <a href="https://www.darktrace.com/en/" rel="noopener noreferrer" target="_blank">Darktrace</a> and&nbsp;<a href="https://www.linkedin.com/in/jrtietsort/" rel="noopener noreferrer" target="_blank">JR Tietsort</a>, Visionary Security Executive at <a href="https://www.corescientific.com" rel="noopener noreferrer" target="_blank">CoreScientifc</a>. They speak about the impact AI is having across all aspects of cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous growing threats. A different approach is necessary to detect threats that signature technologies may have missed. Advanced end-to-end AI, allows security officers to transform their strategies from the classic reactionary cycles.</p><p>In this podcast, Industry Analyst at <a href="https://451research.com/" rel="noopener noreferrer" target="_blank">451 research</a>, Eric Ogren speaks to <a href="https://www.linkedin.com/in/nicole-eagan-4377b81/" rel="noopener noreferrer" target="_blank">Nicole Eagan</a>, CEO of <a href="https://www.darktrace.com/en/" rel="noopener noreferrer" target="_blank">Darktrace</a> and&nbsp;<a href="https://www.linkedin.com/in/jrtietsort/" rel="noopener noreferrer" target="_blank">JR Tietsort</a>, Visionary Security Executive at <a href="https://www.corescientific.com" rel="noopener noreferrer" target="_blank">CoreScientifc</a>. They speak about the impact AI is having across all aspects of cybersecurity.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ce006f59-0df2-4ab0-86ea-41f14626f3c0</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:45:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/10f685f8-fb5c-40e0-b989-019a2d2f7ae7/podcast-export-me.mp3" length="24561232" type="audio/mpeg"/><itunes:duration>25:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Cybersecurity Responding to Demand with SecureData</title><itunes:title>Cybersecurity Responding to Demand with SecureData</itunes:title><description><![CDATA[<p>Assessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more challenging endeavor. More specifically, companies must be ahead of the changing nature of the threats and act at speed once encountered.&nbsp;Businesses today must have the necessary&nbsp;skills, agility, and underlying platforms to help them mitigate these risks.</p><p>In this podcast, hosted by freelance analyst Bob Tarzey, <a href="https://www.secdata.com/" rel="noopener noreferrer" target="_blank">SecureData's</a> Chief Strategy Officer,&nbsp;<a href="https://www.linkedin.com/in/charl-van-der-walt/" rel="noopener noreferrer" target="_blank">Charl van der Walt</a>&nbsp;lends his expertise on the matter. Firstly, he discusses how organisations should prioritise their plan of action. Then, he outlines a basic strategy that businesses should be following. Finally, he offers his guidance on how to keep ahead of the changing landscape.</p>]]></description><content:encoded><![CDATA[<p>Assessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more challenging endeavor. More specifically, companies must be ahead of the changing nature of the threats and act at speed once encountered.&nbsp;Businesses today must have the necessary&nbsp;skills, agility, and underlying platforms to help them mitigate these risks.</p><p>In this podcast, hosted by freelance analyst Bob Tarzey, <a href="https://www.secdata.com/" rel="noopener noreferrer" target="_blank">SecureData's</a> Chief Strategy Officer,&nbsp;<a href="https://www.linkedin.com/in/charl-van-der-walt/" rel="noopener noreferrer" target="_blank">Charl van der Walt</a>&nbsp;lends his expertise on the matter. Firstly, he discusses how organisations should prioritise their plan of action. Then, he outlines a basic strategy that businesses should be following. Finally, he offers his guidance on how to keep ahead of the changing landscape.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">07360983-6723-44f4-9023-419256e047e6</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:40:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/84ab7fd5-cc3e-44de-85fd-ba831cf297fe/secure-data-podcast.mp3" length="29002539" type="audio/mpeg"/><itunes:duration>20:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>New Risks Arising for Businesses Through Increased Digitisation with RSA</title><itunes:title>New Risks Arising for Businesses Through Increased Digitisation with RSA</itunes:title><description><![CDATA[<p>The scope of digitisation and the speed of adoption has increased rapidly in the last few decades. Virtually every aspect of any business operation feels this impact from supply chains to customer relationships. This pervasive aspect has changed the risk profile for every business.</p><p>Therefore, businesses have had to transform the way they assess risk.&nbsp;Managing digital risk requires the tools to assess where the risks lie, how to mitigate them and to measure the effectiveness of the protections put in place.</p><p>Freelance IT industry analyst Bob Tarzey speaks to Peter Beardmore, Director of Marketing for Digital Risk Management Solutions at RSA. They speak about what tools are effective to assess and plan for digital risk and when to implement these ideas.</p>]]></description><content:encoded><![CDATA[<p>The scope of digitisation and the speed of adoption has increased rapidly in the last few decades. Virtually every aspect of any business operation feels this impact from supply chains to customer relationships. This pervasive aspect has changed the risk profile for every business.</p><p>Therefore, businesses have had to transform the way they assess risk.&nbsp;Managing digital risk requires the tools to assess where the risks lie, how to mitigate them and to measure the effectiveness of the protections put in place.</p><p>Freelance IT industry analyst Bob Tarzey speaks to Peter Beardmore, Director of Marketing for Digital Risk Management Solutions at RSA. They speak about what tools are effective to assess and plan for digital risk and when to implement these ideas.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">f7b5a698-a932-47eb-8ab4-fe787b77b2f6</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:35:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f818acd5-9c97-47c8-b80e-8af98e5d9727/rsa-podcast-with-peter-beardmore.mp3" length="36009353" type="audio/mpeg"/><itunes:duration>25:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The role backup and recovery tools can play in enhancing IT security with Unitrends</title><itunes:title>The role backup and recovery tools can play in enhancing IT security with Unitrends</itunes:title><description><![CDATA[<p>Security covers every aspect of IT infrastructure and usage, to ensure the protection of users, data and business processes. Backup and recovery tools are a way to restore lost data after any number of issues. However, security attacks can often aim to mimic such incidents for ransomware purposes. Adapting backup and recovery tools to try and provide backstops against these threats is something organizations need to be implementing.</p><p>Freelance IT industry analyst Bob Tarzey speaks to <a href="https://www.linkedin.com/in/josephnoonan/" rel="noopener noreferrer" target="_blank">Joe Noonan</a>, VP of Product Management and Marketing at <a href="https://www.unitrends.com/" rel="noopener noreferrer" target="_blank">Unitrends</a>.&nbsp;They speak about how backup tools can adapt to prevent ransomware attacks.&nbsp;Also, making sure backup-sets assist any size business and different methods to make sure they do not become compromised.</p>]]></description><content:encoded><![CDATA[<p>Security covers every aspect of IT infrastructure and usage, to ensure the protection of users, data and business processes. Backup and recovery tools are a way to restore lost data after any number of issues. However, security attacks can often aim to mimic such incidents for ransomware purposes. Adapting backup and recovery tools to try and provide backstops against these threats is something organizations need to be implementing.</p><p>Freelance IT industry analyst Bob Tarzey speaks to <a href="https://www.linkedin.com/in/josephnoonan/" rel="noopener noreferrer" target="_blank">Joe Noonan</a>, VP of Product Management and Marketing at <a href="https://www.unitrends.com/" rel="noopener noreferrer" target="_blank">Unitrends</a>.&nbsp;They speak about how backup tools can adapt to prevent ransomware attacks.&nbsp;Also, making sure backup-sets assist any size business and different methods to make sure they do not become compromised.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">b74021d1-48b5-4a95-9cdd-619dd7dac06b</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:30:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a88df0b-344d-4bd1-a526-73e15c6c84a6/unitrends-podcast-with-joe-noonan.mp3" length="30205145" type="audio/mpeg"/><itunes:duration>20:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame</title><itunes:title>Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame</itunes:title><description><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?</p><p>In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 3 - How To Map Endpoint Security To A Contemporary Security Strategy?</h4><p>In the previous two episodes, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane. They discussed the history of endpoint security and how to progress moving forward.</p><p>In this final part of the podcast, Ian explains various aspects of how to implement endpoint security most effectively. Furthermore, making sure these security controls are kept up to standard and improve over time.</p>]]></description><content:encoded><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?</p><p>In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 3 - How To Map Endpoint Security To A Contemporary Security Strategy?</h4><p>In the previous two episodes, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane. They discussed the history of endpoint security and how to progress moving forward.</p><p>In this final part of the podcast, Ian explains various aspects of how to implement endpoint security most effectively. Furthermore, making sure these security controls are kept up to standard and improve over time.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">ddcbfc85-55d5-4ae4-a3c4-f06f0249a0e7</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:25:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/c9f1a893-5aec-40ec-b671-770a0d68372b/em360-endgame-podcast-3-1-1.mp3" length="22041420" type="audio/mpeg"/><itunes:duration>15:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Part 2: What’s Next for Endpoint Security? with Endgame</title><itunes:title>Part 2: What’s Next for Endpoint Security? with Endgame</itunes:title><description><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? </p><p>In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 2 - What’s Next for Endpoint Security?</h4><p>In the previous episode, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane, about the history of endpoint security and why it needs to play an integral role for companies.</p><p>In this second podcast, Bob and Ian look at the future of endpoint security and the next steps that need to be taken. This involves looking at whether security teams will have to learn new skills and also the importance of the MITRE ATT&amp;CK framework.</p>]]></description><content:encoded><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? </p><p>In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 2 - What’s Next for Endpoint Security?</h4><p>In the previous episode, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane, about the history of endpoint security and why it needs to play an integral role for companies.</p><p>In this second podcast, Bob and Ian look at the future of endpoint security and the next steps that need to be taken. This involves looking at whether security teams will have to learn new skills and also the importance of the MITRE ATT&amp;CK framework.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4dc7a202-83b2-42dc-af35-538073409474</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:20:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/ce21c0e2-a227-4ce6-8e39-683e0b61905a/em360-endgame-podcast-2-1.mp3" length="22230463" type="audio/mpeg"/><itunes:duration>15:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Part 1:  How Endpoint Security Got To Now? with Endgame</title><itunes:title>Part 1:  How Endpoint Security Got To Now? with Endgame</itunes:title><description><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? </p><p>In this three-part podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 1 - How Endpoint Security Got To Now</h4><h4><br></h4><p>In this podcast, Bob Tarzey talks to VP and endpoint security expert from Endgame, Ian McShane. They discuss the history of endpoint security, the failings of signature-based anti-virus and how it is integral for all organizations.</p>]]></description><content:encoded><![CDATA[<p>With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? </p><p>In this three-part podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.</p><h4>Part 1 - How Endpoint Security Got To Now</h4><h4><br></h4><p>In this podcast, Bob Tarzey talks to VP and endpoint security expert from Endgame, Ian McShane. They discuss the history of endpoint security, the failings of signature-based anti-virus and how it is integral for all organizations.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">eae5825a-c1f8-4d59-80a6-a114b5467f7c</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:15:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/f363fa99-2e6e-46cb-bbec-5d8cc324f089/em360-endgame-podcast-1-1.mp3" length="21423558" type="audio/mpeg"/><itunes:duration>14:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Supporting Technology for Application Security with Rapid7</title><itunes:title>Supporting Technology for Application Security with Rapid7</itunes:title><description><![CDATA[<p>New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable places online, as these are exposed to the online world and easily targeted.</p><p>In the previous episode, Bob Tarzey spoke to Rapid7's Ben Glass and Jay Paz, Manager of Enterprise Security Consulting and Director of Penetration Testing and Consultant Development, respectively, about building better code to stay secure.</p><p>In this second podcast Bob, Jay and Ben look at some of the supporting technology to avoid vulnerability in companies. This includes the testing of code before releasing it, the testing of deployed software, and finding safer guides to build better and stronger software.</p>]]></description><content:encoded><![CDATA[<p>New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable places online, as these are exposed to the online world and easily targeted.</p><p>In the previous episode, Bob Tarzey spoke to Rapid7's Ben Glass and Jay Paz, Manager of Enterprise Security Consulting and Director of Penetration Testing and Consultant Development, respectively, about building better code to stay secure.</p><p>In this second podcast Bob, Jay and Ben look at some of the supporting technology to avoid vulnerability in companies. This includes the testing of code before releasing it, the testing of deployed software, and finding safer guides to build better and stronger software.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">4ecdaeb5-9aa2-4d34-ac00-3029b35a2022</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/55bb82ff-6763-4979-b43b-3fc8f2c52f29/rapid-7-podcast-two.mp3" length="31748169" type="audio/mpeg"/><itunes:duration>22:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Finding Better Methods to Address Application Security with Rapid7</title><itunes:title>Finding Better Methods to Address Application Security with Rapid7</itunes:title><description><![CDATA[<p>New software code is released almost as fast as new ideas are conceived in the tech industry. While this growth is necessary, it makes web applications rather vulnerable places online, as these are exposed to the online world and easily targeted. It's time to find better methods to address application security.</p><p>In this podcast, freelance analyst Bob Tarzey talks to Rapid7's Ben Glass, Manager of Enterprise Security Consulting, and Jay Paz, Director of Penetration Testing and Consultant Development, about finding better methods to address application security and building better code.</p>]]></description><content:encoded><![CDATA[<p>New software code is released almost as fast as new ideas are conceived in the tech industry. While this growth is necessary, it makes web applications rather vulnerable places online, as these are exposed to the online world and easily targeted. It's time to find better methods to address application security.</p><p>In this podcast, freelance analyst Bob Tarzey talks to Rapid7's Ben Glass, Manager of Enterprise Security Consulting, and Jay Paz, Director of Penetration Testing and Consultant Development, about finding better methods to address application security and building better code.</p>]]></content:encoded><link><![CDATA[https://em360tech.com/podcasts/the-security-strategist]]></link><guid isPermaLink="false">fc5e90eb-efbd-428d-baa1-d47c4f028448</guid><itunes:image href="https://artwork.captivate.fm/dc38b074-e306-4324-a7a5-39f1df8d063b/The-Security-Strategist-3000x3000.jpg"/><pubDate>Fri, 03 Apr 2020 09:00:00 +0100</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee321541-4db3-4dcb-84db-7dde9ce6b819/rapid-7-podcast-one.mp3" length="25447339" type="audio/mpeg"/><itunes:duration>17:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item></channel></rss>