CyberScoop Radio
ਚੈਨਲ ਵਿਸਥਾਰ
CyberScoop Radio
CyberScoop delivers leading cybersecurity news with a devoted audience of information security leaders and power players in the public and private sectors.
ਹਾਲੀਆ ਐਪੀਸੋਡ
17 ਐਪੀਸੋਡ
Cisco's Linda Michels and David Gormley on defending against insider threats
Cisco security experts argue that the solution to rising internal cyber risks isn't just about blocking bad actors but enabling unwitting employees wi...
Optiv + ClearShark's Michael Saintcross discusses 'zero standing privilege'
As identity sprawl grows, Optiv + ClearShark SVP of Revenue Michael Saintcross says cybersecurity leaders must pivot from traditional ICAM strategies...
Trinity Cyber's Mike Denning on the power of Full Content Inspection technology
As AI-driven assaults add a new dimension to the escalating volume of cyberattacks, chief information security officers— and the traditional cybersecu...
Lenovo’s Nima Baiati and SentinelOne’s Melissa K. Smith on the necessity of endpoint security
As AI-enabled workloads introduce complex and unseen security vulnerabilities, Lenovo’s Nima Baiati and SentinelOne’s Melissa K. Smith say securing th...
The evolving landscape of detection in a zero-trust environment | ThreatLocker's Danny Jenkins
Episode 5 of 5: Behavior-based detection and dynamic threat intelligence are essential to enhancing security operations and reducing cyber threat resp...
Managing the risks of local administrator privileges | ThreatLocker's Danny Jenkins
ThreatLocker CEO Danny Jenkins emphasizes the importance of limiting local administrator privileges. He also advocates for Enterprise Privilege Manage...
How do you find a ransomware gang on the dark web?
In this episode, Greg Otto talks with Adam Darrah, director of intelligence at Vigilante, about hacker gangs on the dark web, how they run their ranso...
What happened with the Vault 7 trial?
Right before the world drastically changed due to the COVID-19 pandemic, the craziest story in cybersecurity was the Vault 7 trial. With that ending i...
How to embrace zero trust into network security with John Kindervag from Palo Alto Networks
The creator behind the zero-trust network model, John Kindervag, talks about why “trust” has become a vulnerability that needs to be mitigated like ot...
Episode 2 - Upguard's Chris Vickery and Mike Baukes
One of the bigger stipulations in GDPR is that third-party service providers, including companies who run the ever-ubiquitous cloud, will also be resp...
How Identity Can Control Shadow IT with Okta's Chris Niggel
In the latest CyberScoop Radio podcast, Chris Niggel, Okta's director of security and compliance talks about how identity management can be the cataly...
Episode 1 - Thomas Fischer
Global Security Advocate Thomas Fischer talks with CyberScoop's Greg Otto about the mind shift companies are going to have to embrace if they want to...
Open source's security scalability and flexibility with Hortonworks' Henry Sowell
Henry Sowell, Technical Director for Hortonworks spoke with CyberScoop on how open source systems allow for that flexibility and scalability, especial...
How to make threat intelligence actionable, explains Alaska Airlines' security architecture director
With millions of indicators contained in threat intelligence data, it's important for analysts to stay focused on worthwhile information that could in...
Security strategies that merge with modernization
With massive networks at federal government agencies, a workforce clamoring for the ability to work collaboratively and pushes from Congress to move a...
How threat intelligence leads to counterintelligence, explains Anomali's Travis Farral
Travis Farral, director of security strategy for Anomali, talks about the many benefits of threat intelligence and what is being done to disrupt adver...
The Value of Threat Intelligence
Larry Ponemon, chairman and founder of the Ponemon Institute, talks with Wyatt Kash about the growing need for enterprises to leverage the right kind...