Secure Connections Podcast – Hornetsecurity
Julian catches up with Andy Syrewicze, Technical Evangelist at Hornet Security to talk AI threats today and how you can also use this to...
JumpCloud: What are SMBs Really Thinking about Cybersecurity?
JumpCloud Inc. recently released the results of its Q3 2024 SME IT Trends Report, “Detours Ahead: How IT Navigates an Evolving World.” The seventh edition...
Building a Culture of Security Awareness with Fortra
Humans are by far the most neglected link in cybersecurity and threat actors use social engineering attacks to exploit this. They prey on human...
Come Meet VIPRE at IOTSSA Cybersecurity Event on February 16-17th
VIPRE will launch a new Endpoint Detection Response solution. Come and find out how to operationalize this on February 16-17 at the IOTSSA Cybersecurity...
Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...
Cybersecurity Defense Ecosystem Podcast Episode 14: PR Videos
Presenter: Thomas Cross
During this podcast, Julian and Tom Cross discussed various topics related to AI, short form videos, and content strategy. They emphasized the...
Come Meet ThreatLocker at IOTSSA Cybersecurity Event on Oct. 26th-27th
Zero trust is something we hear all the time in cybersecurity. The sweet spot is to find the balance between zero trust and productivity....
Learning Security from a Pro
Featuring Ken Dwight, a cybersecurity expert with extensive experience in the industry. He discussed his evolution in the industry, from mainframe programming to assisting...
Secure Connections Podcast – VIPRE Security Group
Julian catches up with David Corlette, VP of Product Management with Vipre to talk the evolution of EDR and what Vipre are doing to...
Wallarm: API Security Breaches and Vulnerabilities
Wallarm, a global leader in API security, recently released its 2025 API ThreatStats Report, revealing that APIs have emerged as the predominant attack surface...