Ranked #1

The Basics of Governance, Risk and Compliance
The Basics of Governance, Risk and Compliance
The goals and needs of IT and Cybersecurity are different. IT is more focused on uptime and keeping systems running. Cyb... Read more
4 Apr 2022
•
33mins
Ranked #2

DoD CMMC and Executive Orders Explored
DoD CMMC and Executive Orders Explored
The US government has made cybersecurity a key focus for national security. As such, different organizations within the ... Read more
28 Feb 2022
•
29mins
Ranked #3

How to Protect Digital Assets in the Metaverse
How to Protect Digital Assets in the Metaverse
The blockchain, cryptocurrency, tokenization, social media, gaming, and the metaverse have created a new class of assets... Read more
14 Feb 2022
•
31mins
Ranked #4

Adversary Emulation: Know Thy Enemy and Know Yourself
Adversary Emulation: Know Thy Enemy and Know Yourself
Organizations should understand what happens when they are breached, in order to measure the value or their tools and un... Read more
24 Jan 2022
•
32mins
Ranked #5

Cybersecurity in 2021 Recapped
Cybersecurity in 2021 Recapped
We covered the top trends and stories from 2021 in the world of cybersecurity and related topics in this episode. Read t... Read more
7 Dec 2021
•
24mins
Ranked #6

Security and the C-Suite
Security and the C-Suite
LogRhythm recently released a report on 'Security and the C-Suite: Making: Security Priorities Business Priorities'. In ... Read more
16 Nov 2021
•
23mins
Ranked #7

The SASE Leader Explains Secure Access Service Edge
The SASE Leader Explains Secure Access Service Edge
The term Secure Access Service Edge (SASE) was coined in 2019 to describe an emerging security and network framework. Si... Read more
2 Nov 2021
•
29mins
Ranked #8

Securing Active Directory
Securing Active Directory
Nearly every computer that runs Windows has Active Directory (AD). This structure helps organizations manage user identi... Read more
19 Oct 2021
•
27mins
Ranked #9

Social Engineering
Social Engineering
The root cause of untold cyber attacks is the age-old technique of social engineering. KnowBe4 Security Awareness Advoca... Read more
4 Oct 2021
•
31mins
Ranked #10

CipherCAST - SASE - Como conciliar rapidez de resposta e proteção de dados.
CipherCAST - SASE - Como conciliar rapidez de resposta e proteção de dados.
Neste episódio, falamos sobre “SASE – Como conciliar rapidez de resposta e proteção de dados”. Para essa conversa, convi... Read more
30 Sep 2021
•
26mins