Left of Boom with Liongard
“Left of Boom” is actually a military term used to describe the moment before an explosion or attack.
Julian discusses with Vincent Tran, COO of...
Cybersecurity Defense Ecosystem Episode 2: Conference Experience Insights
Presenters: Evgeniy Kharam, Cybersecurity Architect | Evangelist | Consultant | Advisor | Podcaster | Visionary | Speaker | Nim Nadarajah, C.CISO, Cyber Security, Compliance...
Cybersecurity in the Dark Web with Searchlight Cyber
Anonymity brings the worst behaviours in people. Most of the malicious activities occur in the dark web. It exposes the fear of the unknown...
Supply Chain Security with Endor Labs
Security veteran and author Chris Hughes recently joined Endor Labs as Chief Security Advisor. He discussed with Julian on several points of supply chain...
Simplifying Networking Management and Monitoring with Auvik
In the growing BYOD environment, there is an urgent need for network automation to proactively identify connectivity or efficiency problems that remote workers may be...
Fortinet: Paris 2024 OIympics Cybersecurity Threats
In this podcast, we discuss with Derek Manky, chief security strategist and VP of global threat intelligence at Fortinet about the recent FortiGuard Labs...
Data & More: AI Requires Data Categorization
Jaap Mantel, VP Sales at Data & More, discussed the practical aspects of implementing AI in businesses, emphasizing the importance of understanding data before...
Come Meet Pinpoint Search Group at IOTSSA Cybersecurity Event on February 16-17th
Mark Sasson from Pinpoint Search Group will be talking about cybersecurity talent recruiting and retaining. Come meet them on February 16-17 at the IOTSSA...
Attestiv: Identifying Deep Fakes
Trump and Biden have had their own images mashed-up. Taylor Swift has had her own deepfake struggles.....
Nicos Vekiarides, founder of Attestiv, a channel-focused organization,...
Channel Expert Mel Reyes Talks about Navigating Headwinds in the MSP and Cybersecurity Community...
Channel Expert Mel Reyes will be addressing the logistical challenges faced by security teams and MSPs in the cybersecurity space, emphasizing the importance of...















