Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays

Categories:
163 Episodes
-
How Can We Fix Alert Fatigue?
Published: 12/12/2024 -
Vulnerability Management ≠ Vulnerability Discovery
Published: 5/12/2024 -
Are Security Awareness Training Platforms Effective?
Published: 21/11/2024 -
The Argument For More Cybersecurity Startups
Published: 14/11/2024 -
How Are New SEC Rules Impacting CISOs?
Published: 7/11/2024 -
Managing the Risk of GenAI Tools
Published: 31/10/2024 -
Defending Against What Criminals Know About You
Published: 24/10/2024 -
Will We Ever Go Back From Work From Home?
Published: 17/10/2024 -
The Lurking Dangers of Neglected Security Tools
Published: 10/10/2024 -
When You Just Can't Take It Anymore in Cyber
Published: 3/10/2024 -
Is It Possible to Inject Integrity Into AI?
Published: 26/09/2024 -
Are Phishing Tests Helping or Hurting Our Security Program?
Published: 19/09/2024 -
Who Is Responsible for Securing SaaS Tools?
Published: 12/09/2024 -
Hiring Cyber Teenagers with Criminal Records
Published: 5/09/2024 -
What's Working With Third-Party Risk Management?
Published: 29/08/2024 -
What Triggers a CISO?
Published: 22/08/2024 -
Information Security vs. Cybersecurity
Published: 15/08/2024 -
Should Deny By Default Be the Cornerstone of Zero Trust?
Published: 8/08/2024 -
What Is a Field CISO?
Published: 1/08/2024 -
Cybersecurity Is a Communications Problem
Published: 25/07/2024
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.