Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays

Categories:
163 Episodes
-
How to Pitch to a Security Analyst
Published: 2/10/2022 -
Is Your Data Safer in the Cloud?
Published: 2/3/2022 -
What Should We Stop Doing in Cybersecurity?
Published: 1/27/2022 -
DDoS Solutions
Published: 1/20/2022 -
Making Cybersecurity Faster and More Responsive
Published: 1/13/2022 -
Promises of Automation
Published: 1/6/2022 -
When Social Engineering Bypasses Our Cyber Tools
Published: 12/16/2021 -
How Can We Simplify Security?
Published: 12/9/2021 -
Convergence of Physical and Digital Security
Published: 12/2/2021 -
How Do You Measure Cybersecurity Success?
Published: 11/18/2021 -
How Do We Turn Tables Against Adversaries?
Published: 11/11/2021 -
Ageism in Cybersecurity
Published: 11/4/2021 -
Proactive Vulnerability Management
Published: 10/28/2021 -
Why Is Security Recruiting So Broken?
Published: 10/21/2021 -
How to Be a Vendor that CISOs Love
Published: 10/14/2021 -
The "Are We Secure?" Question
Published: 10/7/2021 -
Ransomware Kill Chain
Published: 9/30/2021 -
Can Technology Solve Phishing?
Published: 9/23/2021 -
Convergence of SIEM and SOAR
Published: 9/16/2021 -
Cybersecurity Is Not Easy to Get Into
Published: 9/9/2021
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.