Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Endpoint Protection Podcasts

show episodes
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
Cloud Conversations

Azure, Peter, Femke, Ru, and Kat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Loading …
show series
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
60% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
  continue reading
 
Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
  continue reading
 
Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
  continue reading
 
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust in…
  continue reading
 
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
  continue reading
 
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
  continue reading
 
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
  continue reading
 
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
  continue reading
 
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
  continue reading
 
In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection. This lively di…
  continue reading
 
In a digital era where endpoints are the frontline defence against cyber threats, this first episode of our podcast series, "Insider Insight: Navigating Endpoint Security, Carl Leonard, Proofpoint’s Cybersecurity Strategist for EMEA, explores the transformative power of people-centric protection in the realm of endpoint data security. Join us as we…
  continue reading
 
Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker?…
  continue reading
 
Michelle McGough makes a triumphant return to the BigFix team, talks about her path to BigFix, what she loves about the BigFix community and what her current focus is with respect to customer events and other things BigFix! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
  continue reading
 
We've released a brand new product - BigFix User Workspace! In this episode, we're speaking with Mike Gare, BigFix Product Manager for BigFix Lifecycle and Workspace, and Jason Cordell, BigFix Technical Advisor to learn all about this exciting new offering. This digital workspace management solution improves employees experience, reduces helpdesk c…
  continue reading
 
The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the third episode of our BigFix Best Practices series on Client Settings, Client Settings 301. In this episode, we’re going to outline some business use cases we’ve encountered in the real worl…
  continue reading
 
The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the second of our BigFix Best Practices series on Client Settings, Client Settings 201. We talk about the actual practices you’ll need to understand to effectively manage client settings across…
  continue reading
 
The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This episode is focused on a key piece of the BigFix capability – client settings. Client settings sit at the heart of how the BigFix agent behaves and the actions that are taken on the endpoint, relay…
  continue reading
 
Iain Smith is a 9 time Microsoft MVP and a much respected figure in the field of Unified Communications. Iain joins Azure and Peter on the show this week where we discuss:• The history of UC, from MSN Messenger & Sync, to MS Teams• The current state of play with Teams from a UC viewpoint• His thoughts on what's next• AI, is the current pace of prog…
  continue reading
 
Katie McMillan joins Kat and Peter on the show this week. Katie is a rising star in the tech community and specialises in Information Security across all platforms but with a more recent focus on Microsoft. In addition to being an inspiring mentor, Katie is also a passionate advocate for women in the tech industry and is a TechWomen100 Winner - 202…
  continue reading
 
Fabian Bader MVP joins Ru Campbell MVP to talk about… • Changing tactics to protect domain controllers and on premises Active Directory • Defender for Identity as part of your hybrid identity security • Why FIDO2 is critical and a level up compared to traditional MFA • The intricacies of Defender for Endpoint exclusions and tamper protection Connec…
  continue reading
 
Paul Huijbregts, Justen Graves, and returning guest Joe Anich join Ru Campbell MVP to talk about Microsoft Defender for Endpoint (MDE) In-Depth, their new book, which offers a comprehensive guide to building a deeper understanding of Defender for Endpoint, its capabilities, and successful implementation. We talk about • Defender for Endpoint produc…
  continue reading
 
In this weeks episode, Microsoft MVP, and Senior Cloud Architect at Cloudway, Merethe Stave joins Femke and Peter to discuss: • ChatGPT • Viva Explorers • Working at Cloudway • Tech Community events in Norway • And much more Connect with Merethe online: LinkedIn: https://www.linkedin.com/in/merethest... Twitter: https://twitter.com/MeretheStave…
  continue reading
 
In this weeks episode, Microsoft MVP Dwayne Natwick returns to the show. Dwayne joins Ru and Peter to discuss: • Working with multi-cloud solutions • His new SC-100: Microsoft Cybersecurity Architect exam guide • Changing to the new Microsoft MVP security category • And much more Connect with Dwayne online: LinkedIn: https://www.linkedin.com/in/dna…
  continue reading
 
Join us for some exciting news for you #BigFixers out there - the BigFix Certifications Program has returned! Join James and Rhonda as they speak with Kathy Nguyen, lead for BigFix Technical Enablement, as she discusses the process we've followed to get here and all the things YOU need to know in order to prepare and sign up for the newly released …
  continue reading
 
James Stewart, or JGStew as he's known on the BigFix Forum, Endpoint Management Today podcast co-host and overall jack of all trades details his journey to BigFix, how a game called Arctic Mud helped him with his typing skills, and tells us what House Robots are. Some links from this episode... Browser, Flash, Java Analysis for Windows Arctic Mud W…
  continue reading
 
Tom Arbuthnot is a Microsoft MVP, a Microsoft Certified Master, and Co-Founder of Empowering.Cloud. Tom joins Peter on the show this week to discuss: • Unified Communications • The evolution to Teams from Lync and Skype for Business • His career journey • Co-Founding Empowering.Cloud • The importance of community • Work/life balance • Education • A…
  continue reading
 
Eswar Prakash is a Technical Development Lead in Power Platform at Resonate. Eswar joins us on the show this week to chat with Azure and Peter to discuss: • Unified Communications • Power Platform • Early computers • Mathematics • Internet of Things • His passion for Science Fiction • His love of food • And more Connect with Eswar online: LinkedIn:…
  continue reading
 
Femke de Vroome is a Productivity Engineer at Wortell. Femke joins us on the show this week to chat with our very own Femke Cornelissen - also now of Wortell (The Femke's of Wortell), and Kat Beedim to discuss: • Women in tech • Unconscious bias • Simplifying the Teams governance customer journey • Governance vs control • Should Teams Premium be in…
  continue reading
 
Incident response is something we hope you don’t have to deal with very often, but for those responsible for securing industrial and critical infrastructure, it’s a critical component of their cybersecurity strategy. In fact it’s key to ensuring that your business, systems and personnel are well prepared to act swiftly and efficiently when an incid…
  continue reading
 
Malware and ransomware are of course some of the biggest and most widely known threats that businesses face today. However, having a basic understanding of the bigger picture will enable you to prepare your business for a whole range of threats that you may come across, and secure your business further. Learn more with Nozomi Networks Cybersecurity…
  continue reading
 
Cyber risk management involves identifying all the OT and IoT assets on your operational network, assessing their vulnerabilities, and outlining risk management processes to close security gaps. Learn more with Nozomi Networks Cybersecurity and Privacy Director Bruce Snell, and Technical Sales Director Shan Zhou. Visit Our Website Follow Us on Link…
  continue reading
 
The rise of remote working, hybrid cloud environments and use of mobile and IoT devices has casued the security perimeter approach to become obsolete. It’s quickly being replaced by the zero trust model which denies access to all applications and data by default. Zero trust is less a technology than it is a security policy objective and design appr…
  continue reading
 
Rhonda Studnick Kaiser, Director of Customer Experience for BigFix, talks about nearly every topic under the sun, what it's like to be a native Oregonian, and why she came to BigFix and why she loves to advocate for BigFix customers so much! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
  continue reading
 
Will Rowe is a well known figure in the Microsoft community and is Director at MS Talent, which he has built to work with and place people with the right skills in fantastic roles working for amazing companies, usually industry-leading Microsoft Gold Partners. Will joins us on the show this week to chat with Femke and Peter to discuss: • Launching …
  continue reading
 
Ana Inés Urrutia joins us this week to chat with Azure and Peter about travel, and her career with Dynamics 365 and Human Resources. We also chat about: • Fashion • Flying planes • The Viva Explorers • And much more! Connect with Ana online: https://twitter.com/AnaInesUrrutia https://www.linkedin.com/in/anainesurrutia/ https://www.anainesurrutia.co…
  continue reading
 
John Golembiewski, Director of Engineering and Tech Services for BigFix, joins us in this episode to tell us how he ended up at BigFix, what he thinks is the greatest feature of the tool, and shares his special apple pie recipe! Resources Episode 2 - What is BigFix Again? John's Apple Pie store bought pie crust - don't mess around with this... 1/3 …
  continue reading
 
Meron Gebremedhin joins us this week to chat with Azure and Peter about her journey into tech, working across the Power Platform and Cyber Security. We also chat about: • Mentorship • Certifications • The Pathfinders Power Platform Community • And much more! Connect with Meron online: https://twitter.com/Blacklionm1 https://www.linkedin.com/in/mero…
  continue reading
 
After a bit of a break, Cloud Conversations is back with new content and a brand-new member of our hosting team, Femke Cornelissen. We are absolutely thrilled that Femke has agreed to join us and hope you will join us in giving her a very warm welcome. In this episode, we also chat about: • What we've all been up to • The importance of taking time …
  continue reading
 
There's an exciting new feature that was launched in December 2021 which has been flying a bit under the radar. We've added a whole new suite of extended software patching content for Windows devices. In this episode, James Stewart, John Golembiewski and Rhonda Studnick Kaiser discuss how this new content came about, what it offers, how to get it a…
  continue reading
 
In our latest episode, the Cloud Conversations team attend the South Coast Summit in Southampton, UK, and Ru and Peter actually meet in person for the first time. We discuss our conference highlights and also dive into the Ignite Book of News for a bit of a review and pick out some of our favourites. Follow us on Twitter: Azure: https://twitter.com…
  continue reading
 
Dan Wolff, Director of Product Marketing for BigFix, joins us to describe his journey from a role as a mechanical engineer, developing computing hardware to his role with BigFix, the value of BigFix in an organization, the intersection between IT Operations and Security, and why he'd rather be backpacking rather than doing tech things when not focu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play