We retired this podcast, because we couldn't parse it for 10 consecutive times.
Date | Title & Description | Contributors |
---|---|---|
2022-10-04 |
Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX Security analysts must fight both attackers and the products and services they rely on to drive their detection and response capabilities because of a lack of usability of security tools and processes. This podcast explains an emerging cybersecurity te... |
|
2022-09-27 | Back in 2017 New America and The Christian Science Monitor hosted then 14-year-old and CEO of VannTechCyber LLC, Paul Vann. He was indeed a rising star in the field, but where is Vann now? Join this RSAC 365 podcast as we shine a spotlight on the maki... |
|
2022-09-27 | When it comes to defending critical infrastructure from cyber threats, understanding the threat landscape is critical to assessing risk and implementing a robust security strategy. Threat intelligence enables organizations to identify and react to thre... |
|
2022-09-06 |
What Could a U.S. Federal Data Privacy and Security Law Look Like? Congress has tried for years to pass a comprehensive federal data privacy and security law without success, which impacts consumers, industry, and security. Meanwhile, other countries and multiple U.S. states have moved forward with laws. However, the ... |
|
2022-08-19 | While there seems to be a growing awareness of the threats to the cyber-physical world with cybercriminals increasingly targeting industrial organizations within critical infrastructure, are current investments, regulations, and actions enough to stop ... |
|
2022-08-11 |
"Anatomy of Smart Living” - Limit Cyber Exposure by Embracing Mobility and IoT We live very “smart” lives equipped to stay connected anywhere, any time. Getting connected is easy, securing it may be a fool’s errand if not approached properly. Say goodbye to the days of signature-based detection and say hello to IoT data anomaly a... |
|
2022-07-14 |
Incentivizing Collaboration and Promoting Zero Trust Adoption Our world is becoming increasingly interconnected and more interdependent than ever before. We continue to see an increase in cybercrime, which brings us to an inflection point - who's responsible for addressing security in our integrated digital world... |
|
2022-07-05 |
Effective or Confusing: New Structures and Regulations in Cybersecurity Over the course of the last two years, cybersecurity planning and thought leadership have picked up with a parallel increase in regulation, Congressional action, and government reorganization. The Cyberspace Solarium Commission recommended and got a Na... |
|
2022-06-17 | Integrating security into the development lifecycle can be a challenge, especially for those who don’t understand why security matters to development and operations. What’s the ROI of DevSecOps? What are the key KPIs? Join us for an insightful conversa... |
|
2022-06-02 |
Affirming LGBTQ Populations in Virtual Health through DevSecOps & Software Integrity Virtual health providers create favorable conditions for the LGBTQ population's access to healthcare, an influx of electronic personal health information, and massive increases in cyber threats. Using software flaws, bad actors increasingly target heal... |
|