Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Podcast by ESKENZI PR
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading

1
Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe 2025 Conversation with Steve Wright | On Location Coverage with Sean Martin and Marco Ciappelli
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57What does it really mean to be crisis-ready? In this conversation from InfoSecurity Europe 2025, Steve Wright—a data privacy and cybersecurity leader with three decades of experience spanning Siemens, Unilever, John Lewis, and the Bank of England—joins Sean Martin and Marco Ciappelli to unpack the heart of effective crisis management. With a career…
…
continue reading

1
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
…
continue reading

1
The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Stick | An Infosecurity Europe 2025 Conversation with Jemma Davis | On Location Coverage with Sean Martin and ...
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much m…
…
continue reading

1
From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe 2025 Conversation with Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33What if the key to cybersecurity isn’t more tech—but more humanity? In this On Location episode of ITSPmagazine, Rob Black—UK Cyber Citizen of the Year and founder of the Global Institute of Cyber Deception—joins hosts Marco Ciappelli and Sean Martin to challenge conventional thinking around cyber defense. With a background spanning military operat…
…
continue reading

1
Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in Cyber Resilience | An Infosecurity Europe 2025 Conversation with Amanda Finch | On Location Coverage with ...
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In this episode, Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, offers a perspective shaped by decades of experience in a field she has grown with and helped shape. She shares how cybersecurity has transformed from an obscure technical pursuit into a formalized profession with recognized pathways, developm…
…
continue reading

1
Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisio…
…
continue reading

1
From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An infosecurity Europe 2025 Conference On Location Brand Story
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President o…
…
continue reading

1
When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An Infosecurity Europe 2025 Conversation with Andrea Isoni | On Location Coverage with Sean Martin and Marco ...
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much m…
…
continue reading

1
The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of Cybercrime | An Infosecurity Europe 2025 Conversation with Geoff White | On Location Coverage with Sean ...
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much m…
…
continue reading

1
Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—Rethinking the Role of Humans in Cyber Defense | An Infosecurity Europe 2025 Conversation with Purvi Kay and Rob Black | On Location Coverage ...
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45Cybersecurity isn’t just about code, controls, or compliance—it’s about people. That’s the core message from Purvi Kay, Head of Cybersecurity for the Future Combat Air System at BAE Systems, and Rob Black, founder of the UK Cyber Leaders Challenge, as they share how genuine collaboration is reshaping security success in high-stakes environments. In…
…
continue reading

1
London: Random and Unscripted – Meditation, Music, Literature and many more reasons why we love this city | Random and Unscripted with Sean Martin and Marco Ciappelli
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15Sometimes, the best conversations happen when there’s no agenda. This is one of those moments. With London as the backdrop — its history, energy, and unpredictable charm — Sean and I sat on the grass in Hyde Park and hit record. No script, no plan. Just two friends talking about music, memories, meditation, and why we still believe in experiencing …
…
continue reading

1
More Than Code: Why Human Skills Matter in AppSec | An OWASP AppSec Global 2025 Conversation with Maria Mora | On Location Coverage with Sean Martin and Marco Ciappelli
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Maria Mora, Staff Application Security Engineer and active OWASP lifetime member, shares how her experience at the OWASP AppSec Global conference in Barcelona has reaffirmed the power of community in security. While many attendees chase back-to-back talks and technical traini…
…
continue reading

1
Reaching Human Equivalency with Agentic AI: A Real-World Look at Security Outcomes | An eSentire Brand Story With Dustin Hillard
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24As Chief Technology Officer at eSentire, Dustin Hillard brings a deeply rooted background in AI and machine learning—going back over 15 years—to the practical challenges of cybersecurity. In this episode, Hillard discusses how his team is using agentic AI not for the sake of hype, but to augment real human workflows and achieve measurable, high-imp…
…
continue reading

1
From Fraud to Fixes: Designing Usable Security for Financial Applications | An OWASP AppSec Global 2025 Conversation with Wojciech Dworakowski | On Location Coverage with Sean Martin and Marco Ciappelli ...
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sean Martin connects with event speaker, Wojciech Dworakowski, to unpack a critical and underexamined issue in today’s financial systems: the vulnerability of mobile-only banking apps when it comes to transaction authorization. Wojciech points out that modern banking has embr…
…
continue reading

1
From Dashboards to Decisions: Why Your Security Metrics Might Be Leading You Astray | An OWASP AppSec Global 2025 Conversation with Aram Hovsepyan | On Location Coverage with Sean Martin and Marco Ciappelli ...
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Aram Hovsepyan, an active contributor to the OWASP SAMM project, brings a critical perspective to how the industry approaches security metrics, especially in vulnerability management. His message is clear: the way we collect and use metrics needs a serious rethink if we want …
…
continue reading

1
Why Global Community-Led Innovation Is Driving Real Application Security Progress | An OWASP AppSec Global 2025 Conversation with Starr Brown | On Location Coverage with Sean Martin and Marco Ciappelli ...
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Starr Brown, Director of Open Source Projects and Programs at OWASP, unpacks the real engine behind the organization’s impact: the projects and the people driving them forward. With over 130 active projects, OWASP continues to expand its open source contributions to improve s…
…
continue reading

1
Holding the Line on Quality in an AI-Driven SDLC | An OWASP AppSec Global 2025 Conversation with Sarah-Jane Madden | On Location Coverage with Sean Martin and Marco Ciappelli
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sarah-Jane Madden brings a unique lens to application security, shaped by her journey from developer to security leader and CSO. Speaking at OWASP AppSec Global, she tackles one of today’s most pressing concerns: how AI is reshaping software engineering—and how we must respon…
…
continue reading

1
When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone. Wilson brings a …
…
continue reading

1
From Cassette Tapes and Phrasebooks to AI Real-Time Translations — Machines Can Now Speak for Us, But We’re Losing the Art of Understanding Each Other | A Musing On Society & Technology Newsletter Written ...
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49From Cassette Tapes and Phrasebooks to AI Real-Time Translations — Machines Can Now Speak for Us, But We’re Losing the Art of Understanding Each Other May 21, 2025 A new transmission from Musing On Society and Technology Newsletter, by Marco Ciappelli There’s this thing I’ve dreamed about since I was a kid. No, it wasn’t flying cars. Or robot butle…
…
continue reading

1
Redefining What Secure Application Development Looks Like: Bringing Application Security into Focus with ASVS v5 | An OWASP AppSec Global 2025 Conversation with Josh Grossman | On Location Coverage with ...
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Josh Grossman, co-leader of the OWASP Application Security Verification Standard (ASVS) project, shares key updates and strategic thinking behind the release of ASVS version 5. This release, years in the making, reflects a renewed focus on making the standard more approachabl…
…
continue reading

1
From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Jim Manico’s passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificia…
…
continue reading

1
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
…
continue reading

1
The API That Could Transform Software Transparency | An OWASP AppSec Global 2025 Conversation with Olle E Johansson | On Location Coverage with Sean Martin and Marco Ciappelli
14:29
14:29
Play later
Play later
Lists
Like
Liked
14:29The introduction of the Cyber Resilience Act (CRA) marks a major shift for the software industry: for the first time, manufacturers are being held accountable for the cybersecurity of their products. Olle E. Johansson, a long-time open source developer and contributor to the Asterisk PBX project, explains how this new regulation reshapes the role o…
…
continue reading

1
Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually Want to Use | An OWASP AppSec Global 2025 Conversation with Spyros Gasteratos | On Location Coverage with ...
17:28
17:28
Play later
Play later
Lists
Like
Liked
17:28During the upcoming OWASP Global AppSec EU in Barcelona, Spyros Gasteratos, long-time OWASP contributor and co-founder of Smithy, to explore how automation, collaboration, and community resources are shaping the future of application security. Spyros shares the foundation of his talk at OWASP AppSec Global: building a DevSecOps program from scratch…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
Outside the Ivory Tower: Connecting Practice and Science — Why Human-Centered Cybersecurity Needs Both | OWASP AppSec Global 2025 Pre-Event Keynote Conversation with Kate Labunets | On Location Coverage ...
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39During the upcoming OWASP Global AppSec EU in Barcelona, Kate Labunets, a cybersecurity researcher focused on human factors and usable security, takes the stage to confront a disconnect that too often holds the industry back: the gap between academic research and real-world cybersecurity practice. In her keynote, “Outside the Ivory Tower: Connectin…
…
continue reading

1
What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing…
…
continue reading

1
When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe 2025 Pre-Event Conversation with Peter Garraghan | On Location Coverage with Sean Martin and Marco Ciappelli ...
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45In this episode of our InfoSecurity Europe 2024 On Location coverage, Marco Ciappelli and Sean Martin sit down with Professor Peter Garraghan, Chair in Computer Science at Lancaster University and co-founder of the AI security startup Mindgard. Peter shares a grounded view of the current AI moment—one where attention-grabbing capabilities often dis…
…
continue reading

1
Celebrating 30 Years of Connection, Innovation, and Community at Infosecurity Europe in London | Our Traditional Pre-Event Kick-Off Conversation with Saima Poorghobad | On Location Coverage with Sean Martin ...
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much m…
…
continue reading

1
Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable. During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-…
…
continue reading

1
Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography. More Than a J…
…
continue reading

1
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
…
continue reading

1
Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is …
…
continue reading

1
Why Humanity’s Software Needs an Update in Our Hybrid World — Before the Tech Outpaces Us | Guest: Jeremy Lasman | Redefining Society And Technology Podcast With Marco Ciappelli
42:25
42:25
Play later
Play later
Lists
Like
Liked
42:25Guest: Guest: Jeremy Lasman Website: https://www.jeremylasman.com LinkedIn: https://www.linkedin.com/in/jeremylasman _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcociappelli.com _____________________________ …
…
continue reading

1
The Out of Tune Instruments | A Short Story Written By Lucia & Marco Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50The Out of Tune Instruments On the bank of a stream, where a great many colorful little fish swam, lived a small family: mamma, babbo, and their seven children — four boys and three girls. Their house was a bit far from the town of Strumentopoli, but being close to the stream and next to the Great Forest made it a wonderful place to live. Mamma lov…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
Building, Breaking, Defending: Inside a Global AppSec Movement | OWASP AppSec Global 2025 Pre-Event Conversation with Avi Douglen | On Location Coverage with Sean Martin and Marco Ciappelli
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32At OWASP AppSec Global in Barcelona, the focus is clear: building secure software with and for the community. But it’s not just about code or compliance. As Avi Douglen, OWASP Foundation board member, describes it, this gathering is a “hot tub” experience in contrast to the overwhelming scale of mega conferences. It’s warm, immersive, and welcoming…
…
continue reading

1
Data Backups: The Digital Safety Deposit Box
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
…
continue reading

1
From Isolation to Collaboration: Rethinking Cyber Resilience for the Real World of Small and Medium Enterprise | Infosecurity Europe 2025 Pre-Event Conversation with Steven Furnell | On Location Coverage ...
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07Small and medium-sized enterprises (SMEs) continue to be at a disadvantage when it comes to cybersecurity—not because the risks are unclear, but because the means to address them remain out of reach for many. In this episode, Professor Steven Furnell of the University of Nottingham highlights the real barriers SMEs face and shares the thinking behi…
…
continue reading

1
DDoS Demystified: Understanding the Threat
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
…
continue reading

1
The Future Is a Place We Visit, But Never Stay | A Post RSAC Conference 2025 Reflection | A Musing On Society & Technology Newsletter with Marco Ciappelli and TAPE3 | Read by TAPE3
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31The Future Is a Place We Visit, But Never Stay May 9, 2025 A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other. By Marco Ciappelli | Musing on Society and Technology Here we are — once again, back from RSAC. Back from the future. Or at le…
…
continue reading

1
Why We Can’t Completely Trust the Intern (Even If It’s AI) | An RSAC Conference 2025 Conversation with Alex Kreilein and John Sapp Jr. | On Location Coverage with Sean Martin and Marco Ciappelli
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25When artificial intelligence can generate code, write tests, and even simulate threat models, how do we still ensure security? That’s the question John Sapp Jr. and Alex Kreilein examine in this energizing conversation about trust, risk management, and the future of application security. The conversation opens with a critical concern: not just how …
…
continue reading

1
The Hidden Cost of Closing the Door on Innovation | An RSAC Conference 2025 Conversation with Phillip Miller | On Location Coverage with Sean Martin and Marco Ciappelli
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11In this episode of On Location at RSAC Conference 2025, Phillip Miller—Chief Information Security Officer and founder of Corporal—offers a candid and practical look at the current realities of cybersecurity leadership, innovation ecosystems, and the business-first mindset required to drive effective security outcomes. With a unique background that …
…
continue reading

1
Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity’s detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detect…
…
continue reading

1
Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38In this episode, Subo Guha, Senior Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber’s mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizat…
…
continue reading

1
From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes. ManageEngine…
…
continue reading

1
From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management tog…
…
continue reading

1
Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate softwa…
…
continue reading