SecurityWeek podcast series gets up close with cybersecurity leaders and visionaries to discuss trends, technologies, and threats facing enterprise cyberdefenders.
On this special edition of SecurityWeek's spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how Zero Trust can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface.By SecurityWeek
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict.By Security Conversations
Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders.By Security Conversations
Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks.By Security Conversations
Director of Kaspersky Lab Global Research & Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign. Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data.Disclosure: Ryan Naraine is also a Kaspersky Lab employee.…
Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app.By Security Conversations
Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues.By Security Conversations