Discover
Cyber Defense Radio

Cyber Defense Radio
Author: Cyber Defense Magazine
Subscribed: 15Played: 114Subscribe
Share
© 2023. Cyber Defense Media Group
Description
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/
Hosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Ausha. See ausha.co/privacy-policy for more information.
139 Episodes
Reverse
🚨 New Episode of Cyber Defense Radio is LIVE!🎙️ Hosted by @Miliefsky, Publisher of @CyberDefenseMagIn this insightful conversation, Dr. Tina Srivastava, MIT PhD, inventor, and Co-Founder of @BadgeInc, shares how credentialless authentication is transforming identity security across enterprise and government sectors.🔐 We cover critical innovations powering the future of access control:✅ Eliminating passwords and stored secrets✅ Frictionless, phishing-resistant authentication✅ Seamless login across devices — no re-registration✅ Deep integration with IAM platforms✅ Real-world MIT-born cybersecurity innovation💡 “To protect identity, we must remove the weakest link — secrets.” – Dr. Tina Srivastava🛡️ Want to learn how BadgeInc is building identity for a post-password world, visit: https://www.badgeinc.com/#CyberDefenseRadio #HotSeatPodcast #BadgeInc #ZeroTrust #Credentialless #CyberInnovation #WomenInCyber #MIT #CISO #IAM #CyberDefenseMagazineHosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 New Episode of Cyber Defense Radio is LIVE!🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMagIn this focused deep-dive, Greg Hoffer, CEO of Coviant Software, spotlights the latest release of Diplomat MFT—Version 9.4—and explains why it’s the go-to no-code managed file transfer solution for regulated enterprises worldwide.Discover how v9.4 empowers your organization with:✅ Best-value MFT backed by 20+ years of battle-tested reliability✅ True no-code installation and point-&-click workflow design✅ End-to-end SFTP and PGP automation—no scripts required✅ Out-of-the-box support for HIPAA, GDPR, GLBA compliance✅ Simple integration with existing systems and IAM platforms💡 “With Diplomat MFT 9.4, secure file transfer becomes invisible—yet unbreakable.” – Greg Hoffer🛡️ Ready to automate your most critical data flows without writing a line of code?🔗 Listen now & learn more: https://www.coviantsoftware.com/#CyberDefenseRadio #CoviantSoftware #DiplomatMFT #NoCode #MFT #HIPAA #GDPR #GLBA #SecureAutomation #HotseatPodcastHosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 New Episode of Cyber Defense Radio is LIVE!🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMagIn this exclusive conversation, Jana Moore, Global CISO at Belron®, pulls back the curtain on securing a Fortune 500 leader in vehicle glass repair and replacement. She shares how she built a risk-based security program across 34 countries, balanced cutting-edge innovation with stringent compliance, and cultivated a culture where every employee feels empowered to speak up about cyber threats.We unpack key insights and innovations driving enterprise resilience:✅ Designing and scaling a risk-aligned security framework across 34 countries✅ Balancing rapid innovation with rigorous regulatory compliance✅ Fostering a security-first culture where every employee becomes a defender✅ Embedding security into product development and the customer journey✅ Mentorship and career acceleration tips for aspiring women in cybersecurity💡 "Resilience isn’t a checkbox—it’s the backbone of every global operation." – Jana Moore#CyberDefenseRadio #Belron #HotseatPodcast #CISO #GlobalSecurity #WomenInCyber #CyberLeadershipHosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 Secure File Transfer Just Got a Major Upgrade!🎙️ Meet Greg Hoffer, CEO of Coviant Software, the company behind the award-winning Diplomat MFT platform — trusted by enterprises in healthcare, finance, and government.In this spotlight, we explore how Coviant is solving one of the biggest pain points in regulated industries: automating secure file exchanges without relying on risky, patchwork scripts.Key innovations powering Diplomat MFT:✅ No-code, point-and-click workflows – no more fragile scripts✅ Seamless support for cloud services and industry protocols✅ Strong encryption and compliance with HIPAA, HITECH, PCI/DSS✅ Effortless deployment in complex, highly regulated environments✅ Built for IT teams who need reliability, visibility, and control💡 “Diplomat MFT makes secure file transfer so easy, you’ll never go back to your old ways.” – Greg Hoffer🛡️ Whether you’re in healthcare, finance, or critical infrastructure — it’s time to modernize your file exchange strategy.🔗 Learn more: https://www.coviantsoftware.com/#CoviantSoftware #DiplomatMFT #SecureFileTransfer #HIPAACompliance #PCIDSS #NoCodeAutomation #Cybersecurity #DataProtection #Encryption #HealthcareSecurity #CyberDefenseSpotlight Hosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 New Episode of Cyber Defense Radio is LIVE!🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMagIn this exclusive conversation, Kyle Kilcoyne, Global Head of Partnerships & Technology at Badge Inc, shares how their secret-less authentication platform is reshaping identity security for enterprises, governments, and critical infrastructure.We unpack key insights and innovations driving the next era of access control:✅ Eliminating passwords and secrets from the equation✅ Enabling frictionless, phishing-resistant authentication✅ Portable identity across any device — no re-registration✅ Seamless integration with IAM leaders like Okta, Duo, CyberArk✅ Why secret-less login is the future of Zero Trust architecture💡 "Identity without secrets isn't just more secure — it's inevitable." – Kyle Kilcoyne🛡️ Learn how modern identity security is being rebuilt from the ground up#CyberDefenseRadio #BadgeInc #SecretlessAuthentication #ZeroTrust #CybersecurityInnovation #IAM #MFA #PhishingResistance #CDM #CISO #IdentitySecurity #HotseatPodcastHosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 New Episode Just Dropped!🎙️ Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMagMirek Kren, CEO of Safetica, steps into the hotseat to discuss how his company is transforming Data Loss Prevention (DLP) and Insider Risk Management (IRM) through contextual defense and AI-driven insight.🔐 Key Highlights:✅ Intelligent data protection through behavioral signals✅ Real-time risk detection without disrupting business operations✅ DLP built for cloud workflows, remote teams, and hybrid IT✅ Deep visibility into user behavior, file usage, apps, time of day, and destination✅ Seamless integration with existing ecosystems💡 “We’re not just blocking threats — we’re understanding them.” – Mirek Kren🛡️ Want to stay ahead of insider threats and data leaks?🔗 Learn more: https://www.safetica.com#CyberDefenseRadio #Safetica #DLP #IRM #InsiderRisk #CyberDefense #AIinCybersecurity #DataProtection #CybersecurityLeadership #CISO #CDM #ContextualSecurity #HotseatPodcastHosted by Ausha. See ausha.co/privacy-policy for more information.
🎙️ New Episode of Cyber Defense Radio is LIVE!🎥 Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMagIn this powerful interview, Namrata Barpanda, Staff InfoSecurity Engineer at ServiceNow and an award-winning Women in Cyber, shares her personal journey into cybersecurity and her frontline insights from the threat landscape.We explore vital cybersecurity themes and advice for the next generation:✅ What inspired Namrata to enter cybersecurity✅ Today’s biggest risks — from zero-day exploits to advanced threat actors✅ How the Cyber Kill Chain framework can help stop attacks early✅ Career advice for aspiring women in cyber and how to thrive💡 “Representation and resilience go hand in hand. Every challenge in cybersecurity is an opportunity to lead and inspire.” – Namrata Barpanda🔗 Connect with Namrata: https://www.linkedin.com/in/namrata-barpanda-0a9750a9#CyberDefenseRadio #NamrataBarpanda #ServiceNow #WomenInCyber #ZeroDay #CyberKillChain #Infosec #CybersecurityLeadership #WICyber #CDM #CISO #DiversityInTech #WomenInSTEMHosted by Ausha. See ausha.co/privacy-policy for more information.
🚨 New Episode of Cyber Defense Radio is LIVE!🎙️ Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMagIn this deep-dive conversation, Roy Kikuchi, Global Partner Alliance Manager of Safous @Safous_TYA, shares how their remote privileged access management (PAM) solution is redefining secure access — even across legacy OT environments.We explore critical cybersecurity challenges and solutions:✅ How Safous ensures device trust and posture assessment✅ The scalable, redundant architecture behind their remote PAM✅ Seamless integration with existing IAM systems✅ Who Safous is built for — and how their pricing model works✅ What sets their support and training apart from the rest💡 “In today’s hybrid environments, trust must be earned with every connection — especially across OT and legacy systems.” – Roy Kikuchi🛡️ Looking to stop ransomware and secure remote access across IT and OT?🔗 Learn more at: https://www.safous.com/#CyberDefenseRadio #Safous #RemoteAccess #PrivilegedAccess #PAM #RansomwareProtection #OTSecurity #IAMintegration #CyberDefense #CDM #CISO #CybersecurityLeadership #PodcastHosted by Ausha. See ausha.co/privacy-policy for more information.
🎙️ Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode of Cyber Defense Radio features Varun Kohli, Chief Marketing Officer of Cequence — a leading force in API security and application protection, safeguarding billions of API calls daily from abuse, fraud, and advanced threats.In this power-packed conversation, Varun shares how Cequence is solving some of the most critical challenges in modern cybersecurity, from bot defense to AI-driven attacks.💡 “The application is the business — and protecting it means securing every API, every call, every time.”🔍 Interview Highlights:✅ What Cequence does and how it's redefining API and bot security for modern enterprises✅ How the threat landscape has evolved, and why APIs are the new frontline✅ The rise of agentic AI — and how it’s changing attacker behavior and defense strategy✅ Cequence’s differentiated approach: Unified discovery, compliance, and protection✅ What the Skyfire partnership means for proactive, intelligent threat detection✅ Balancing AI innovation with security readiness✅ Where API and app security is headed in a world of automation, scale, and evolving logic abuse🔐 Cequence delivers a complete platform to discover every API, enforce compliance, and protect against fraud and abuse — all in one place.💡 If you want to stop business logic attacks, secure your apps and APIs, and stay ahead of threats in an AI-driven world, Cequence is the name to know.📺 Learn more at: https://cequence.ai📰 Subscribe: https://www.cyberdefensemagazine.com/free-subscription/📢 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CyberDefenseRadio #CDM #APIsecurity #BotDefense #AgenticAI #Cybersecurity #ApplicationSecurity #Cequence #InfoSec #FraudPrevention #CyberDefense #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this high-impact episode of Cyber Defense Radio features Brian Stone, Chief Revenue Officer at Pondurance — a trusted leader in Risk-Based Managed Detection and Response (MDR) backed by human intelligence.In this candid conversation, Brian shares why relying solely on automation and AI won’t cut it in today’s threat landscape. Behind every breach is a human attacker — and it takes human expertise to stop them.💡 “AI is powerful — but attackers aren’t machines. They’re people. You need brilliant people defending your business, 24/7.”🔍 Interview Highlights:✅ Risk-Based MDR – prioritize what matters most to your business✅ Centralized Portal – unified view of vulnerabilities, SIEM, incident response & more✅ 24/7 Security Operations Center (SOC) – real-time protection across all assets✅ Endpoint, network, identity, apps, cloud & IoT coverage✅ Human-led threat hunting with expert analysis layered over cutting-edge tech🔐 Pondurance delivers full-spectrum cyber defense services, including:Risk-Based Vulnerability ManagementManaged Detection & ResponseIncident Response & ForensicsCompliance Readiness (HIPAA, PCI, NIST, etc.)Breach Readiness & Recovery Playbooks📘 Get the Free Resource: Guide to Reducing Breach Risks in 2025📥 Download now at Pondurance.com🎧 Don’t miss this episode as Brian Stone reveals why Pondurance blends the power of automation with the genius of human analysts to deliver truly effective cybersecurity.📰 More from Cyber Defense Magazine:📩 Subscribe: https://www.cyberdefensemagazine.com/free-subscription/📢 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CyberDefenseRadio #CDM #Pondurance #MDR #RiskBasedSecurity #HumanIntelligence #CyberResilience #SIEM #SOC #IncidentResponse #CyberDefense #BrianStone #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
🎙️ Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this thought-provoking episode of Cyber Defense Radio features Héctor Guillermo Martínez, President of GM Sectec — a global leader in payment security, critical infrastructure defense, and PCI-led managed services with operations in 50+ countries and over 50 years of cybersecurity excellence.In this exclusive interview, Héctor shares how GM Sectec is redefining modern cyber defense by bringing advanced technologies like tokenization, threat intelligence, and IoT security into a single, cloud-native service model.💡 “Security is no longer optional — and compliance alone isn’t enough. It’s about visibility, response, and resilience at every level.”Interview Highlights:✅ FirsToken™ – Cloud-native Tokenization as a Service to reduce PCI DSS scope and accelerate PCI 4.0 compliance✅ FirstFire™ – Predictive vulnerability management and threat intel across the entire payment ecosystem✅ How CIRRCs (Critical Incident Response & Replication Centers) power rapid global recovery✅ End-to-end visibility across OT, IoT, and enterprise environments✅ What it means to be one of the Top 10 PCI-Led Managed Services Providers🔐 GM Sectec provides a full suite of managed security services, including:PCI Compliance & Risk ManagementVulnerability AssessmentsCloud-First Cybersecurity ArchitecturesOT & IoT Security as a Service24/7 Critical Threat Monitoring & Incident Response🏆 Industry Recognition:Global InfoSec Award Winner – 2024Top 10 Global PCI-Led MSSPs50+ years serving the cybersecurity communityTrusted by major financial institutions and governments worldwide🎧 Don’t miss this powerful episode as Héctor Guillermo Martínez outlines what it takes to stay ahead of today’s evolving threat landscape — and why GM Sectec continues to lead in securing the future of digital payments.🔗 https://www.gmsectec.com/📰 More insights from Cyber Defense Magazine:📩 Subscribe: https://www.cyberdefensemagazine.com/free-subscription/📢 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CyberDefenseRadio #CDM #CyberSecurity #PaymentSecurity #PCI #Tokenization #XDR #IoTSecurity #OTSecurity #ManagedSecurity #ThreatIntelligence #GMSectec #FirstFire #FirsToken #CyberResilience #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this power-packed episode of Cyber Defense Radio features Adam Bennett, Founder & CEO of Red Piranha — Australia’s award-winning cybersecurity company behind the groundbreaking Crystal Eye XDR platform.In this exclusive interview, Adam shares the origin story of Red Piranha and how his vision to simplify and unify cybersecurity led to the creation of an end-to-end, single-pane-of-glass platform that spans cloud, network, and endpoint.💡 “Our mission has always been to consolidate, innovate, and empower — enabling MSPs to deliver world-class security without the complexity.”Interview Highlights: ✅ What inspired the creation of Crystal Eye XDR and how it stands out in a crowded market✅ How 14 new global Points of Presence (PoPs) are scaling protection through the Single Vendor SASE model✅ A preview of emerging threats Red Piranha is preparing for — including AI-driven and nation-state attacks✅ Why SOC-as-a-Service is crucial for 24/7 defense against APTs✅ The importance of operationalized threat intel through the Cyber Threat Alliance🔐 Crystal Eye XDR integrates threat detection, investigation, and response into a unified platform — empowering MSPs with scalable, compliant, and efficient cyber defense.🛡️ With services like VAPT, security risk assessments, GRC compliance, and MDR, Red Piranha is redefining managed cybersecurity for critical industries.🏆 Industry Recognition:Australian Technology Company of the Year – 2024Global InfoSec Award Winner @ RSAC 2024 for Next Gen XDR and APT DetectionISO/IEC 27001 CertifiedTop Contributor – Cyber Threat Alliance🎧 Don’t miss this insightful episode with one of the leading voices in cyber innovation. Learn how Red Piranha is transforming the global cybersecurity landscape from Australia to the world.🔗 https://redpiranha.net📰 More insights from Cyber Defense Magazine:📩 Subscribe: https://www.cyberdefensemagazine.com/free-subscription/📢 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CyberDefenseRadio #CDM #CyberSecurity #XDR #SASE #MSP #InfoSec #SOCaaS #GRC #APT #CyberThreatIntelligence #RedPiranha #Leadership #CrystalEye #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this dynamic episode of Cyber Defense Radio features Dasha Davies, U.S. Veteran and President & Founder of Stealth-ISS Group® Inc. — a woman-led cybersecurity powerhouse delivering excellence in GRC, ISO readiness, CMMC 2.0, and full-spectrum cybersecurity operations. See: 🔗 https://stealth-iss.com/In this engaging discussion, Dasha shares how her military background shaped her leadership philosophy and why she believes:“Cybersecurity isn’t all about technology — it’s about people, process, and accountability.”Highlights from the Interview:✅ New and emerging risks including AI, compliance audits, and supply chain transparency✅ Partnering with MSPs to reduce human risk through proactive training✅ Ethical concerns in cybersecurity and artificial intelligence — previewing her book:📘 Beyond Binary – Cybersecurity and AI✅ Why GRC must guide every AI adoption effort✅ Practical, real-world advice on staying ahead of frameworks like NIST and CMMC 2.0Dasha also gives empowering advice to women and veterans seeking careers in cybersecurity, emphasizing the need for diverse leadership in cyber resilience.🎧 Don’t miss this powerful Cyber Defense Radio interview — learn how Stealth-ISS Group® Inc. helps organizations achieve security, efficiency, and compliance in today’s high-stakes threat landscape.🔗 https://stealth-iss.com/📰 Get more insights from Cyber Defense Magazine:📩 Subscribe: https://www.cyberdefensemagazine.com/free-subscription/📢 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CyberDefenseRadio #CDM #CyberSecurity #GRC #AI #CMMC #WomenInCyber #VeteransInTech #InfoSec #EthicalAI #Leadership #Compliance #CDMG #StealthISSHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this engaging episode features Aviv Mussinger, CEO & Co-founder of Kodem Security, a groundbreaking platform revolutionizing application security for the modern development lifecycle. Learn more at www.kodemsecurity.com.Kodem is on a mission to make security a core part of application development, empowering developers with the tools they need to build secure software from the start.Their AI-powered AppSec agent delivers next-generation code-level visibility and protection:✅ Code-level security analysis – Identify and fix vulnerabilities early, before reaching production✅ Runtime protection – Detect and mitigate threats in real time as the application runs✅ Automated security workflows – Embed security checks directly into CI/CD pipelines for seamless DevSecOps integrationBuilt to support DevSecOps, Kodem ensures that security is no longer a bottleneck but a seamless part of the development process—accelerating delivery while reducing risk.📰 Stay ahead with our monthly InfoSec insights:🔗 Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/🎯 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CDM #CyberDefense #ApplicationSecurity #AppSec #DevSecOps #AI #SecureCode #RuntimeSecurity #KodemSecurity #AvivMussinger #CyberSecurity #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this episode features Ravid Circus, CPO of Seemplicity, https://seemplicity.io/, the Remediation Operations Leader transforming how security teams drive remediation and reduce noise in vulnerability and exposure management. Seemplicity acts as a Security Operations Accelerator, helping teams fix risks faster by turning findings from tools like Tenable, Wiz, and Snyk into one unified workflow.✅ Centralizes all security findings✅ Automates ticket creation and routing✅ Tracks progress across remediation✅ Prioritizes what matters most✅ Cuts manual coordinationBy connecting security findings directly to remediation action, Seemplicity empowers IT and DevOps to close the loop faster and more efficiently.📰 Subscribe to our always free InfoSec publication:🔗 https://www.cyberdefensemagazine.com/free-subscription/🎯 Promote with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CDM #CyberDefense #Infosec #VulnMgmt #RemediationOps #DevSecOps #SecurityAutomation #Seemplicity #CyberResilience #CDMG #CISOHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode features Balaji Yelamanchili, CEO of ThreatConnect — a powerful platform unifying Threat Intelligence, Risk Quantification, and Security Automation for today’s advanced cyber defense teams. ThreatConnect offers a sophisticated TIP + SOAR solution that empowers cybersecurity leaders to aggregate and operationalize threat intelligence, reduce MTTD/MTTR, and make faster, more defensible decisions using real-time analytics and FAIR-based risk quantification. With ThreatConnect, security teams can streamline workflows, improve decision-making, and strengthen cyber resilience across the board. 📰 Get more insights from our free monthly InfoSec publication: https://www.cyberdefensemagazine.com/free-subscription/, 🎯 Market with us: https://www.cyberdefensemagazine.com/cybersecurity-marketing/#CDM #CyberDefense #Infosec #ThreatIntel #SOAR #RiskQuantification #TIP #ThreatConnect #CISO #Automation #CyberSecurity #CDMGHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this powerful episode features Chandra Pandey, visionary leader and CEO of Seceon Inc. — found online at https://www.seceon.com/, a pioneer in AI-driven, platform-based cybersecurity that protects across cloud, on-prem, and remote access environments. Gain new insights into cybersecurity from our always free monthly publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ and market with us at https://www.cyberdefensemagazine.com/cybersecurity-marketing/ #CDM #CyberDefense #Infosec #AI #SIEM #XDR #Cybersecurity #Automation #ThreatDetection #Seceon #CyberResilience #CDMG #CISOHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this episode features Jim DeHaven, CRO of Jericho Security — a cutting-edge platform using AI to fight AI by building dynamic, autonomous defenses against today’s most advanced threats. Jericho https://www.jerichosecurity.com empowers security teams with an AI red team and AI blue team to simulate and defend against modern social engineering tactics like vishing, smishing, and phishing. Moving beyond old-school templates, Jericho delivers real-time, adaptive training built on tactics, techniques, and threats as they evolve. Gain new insights into cybersecurity from our always free monthly publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ and market with us at https://www.cyberdefensemagazine.com/cybersecurity-marketing/ #CDM #CyberDefense #Infosec #AI #Phishing #SocialEngineering #JerichoSecurity #CyberTrainingHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Art Gilliland, CEO of Delinea, https://delinea.com/, who makes you more secure by centralizing authorization to govern identity-based interactions seamlessly. Delinea is pioneering how organizations apply context and intelligence throughout the identity lifecycle across cloud and traditional infrastructure, data, and SaaS applications to eliminate identity-related threats. Gain new insights into cybersecurity from our always free monthly publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ and market with us at https://www.cyberdefensemagazine.com/cybersecurity-marketing/ #CDM #CyberDefense #Infosec #Delinea #AI #Identity #LifecycleHosted by Ausha. See ausha.co/privacy-policy for more information.
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Hom Bahmanyar, Global Enablement Officer of Ridge Security found online at https://ridgesecurity.ai/ discussing how Ridge Security empowers CISOs with AI-driven, automated exposure management, continuous threat validation, and comprehensive cloud security, enhancing efficiency while reducing risk through an award winning AI Powered Security Validation Platform. Gain new insights into cybersecurity from our always free monthly publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ and market with us at https://www.cyberdefensemagazine.com/cybersecurity-marketing/ #CDM #CyberDefense #Infosec #RidgeSecurity #AI #CTEM #Security #ValidationHosted by Ausha. See ausha.co/privacy-policy for more information.
Comments