The Next Phase of Cybersecurity

The Next Phase of Cybersecurity

The Next Phase of Cybersecurity Podcast, powered by EM360.

Series 4

The Next Phase of Cybersecurity

Episode

Radware: Moving From Responsive Protection to Proactive Protection

Episode

CloudSEK: The Future of Software Supply Chain Security

Episode

Thoropass: Fixing the Broken Audit Process

Episode

Pentera: Automated Security Validation and Empowering Pen Testing Teams

Episode

Qwiet AI: The Intersection of AI and Application Security

Episode

Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO

Episode

Thoropass: Innovating in the Audit Space

Episode

Radware: Why You Need Advanced Threat Intelligence

Episode

Cyera: The Future of Data Security in the Age of Artificial Intelligence

Episode

The Role of Generative AI in Red Canary's Security Evolution

Episode

Palo Alto Networks: The State of SOC Platformization

Episode

Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation

Episode

Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI

Episode

Tackling SOC Analyst Burnout

Episode

Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives

Episode

Trends and Threats: Rapid7's 2024 Cybersecurity Findings

Episode

Guardz: Empower MSPs to Secure & Insure Small Businesses

Episode

Preventing Account Takeovers in Cloud Applications

Series 3

The Next Phase of Cybersecurity

Episode

Ampito: How Can Technology Modernise Working Practices?

Episode

Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction

Episode

Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities

Episode

CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange

Episode

Secureworks: The State of Ransomware Economics

Episode

Secureworks: XDR in a Hybrid World

Episode

Sophos: How to Defend Against Ransomware in 2022

Episode

Sophos: Is Machine Learning Improving AI and Cybersecurity?

Episode

Sophos: The World of Cyber Insurance

Episode

Darktrace: The Fast and Furious Nature of Cybersecurity

Episode

Anomali: Building a Secure Framework with XDR and MITRE ATTACK

Episode

HID Global: Why Authentication is Still Such an Issue

Episode

Omada: The Pitfalls of IGA Deployments

Episode

Censys: The World of Attack Surface Management

Episode

ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation

Episode

ManageEngine: What is Endpoint Security and How Do I Build a Strategy?

Episode

Radware: Bot Mitigation is Key for Application Protection

Episode

Radware: Understanding Supply Chain Attacks and Client Side Protection

Episode

Blumira: Difficulties SMEs Face with Cybersecurity

Episode

HID Global: Physical Identity Challenges in the Healthcare Industry

Episode

BlackFog: DLP is Dead - Long Live Data Exfiltration!

Episode

Rapid7: Scaling Cybersecurity Into a Business Process

Episode

Portworx: Solving Developer Productivity Challenges

Episode

Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

Episode

ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity

Episode

Radware: Swiftly Stopping Web-Based DDoS Attacks

Episode

Salvador Technologies: The Art of Cyber Attack Recovery

Episode

CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence

Episode

Cyera: Revolutionising Data Security for the Cloud Era

Episode

Huntress: The Future of Cybersecurity Leadership

Episode

Zero Networks: We’re Sick of Zero Trust Too!

Episode

Cyera: How Generative AI is Driving Investments in Data Security

Episode

Cyera: Why Data Defence is so Difficult in the TikTok Era

Episode

Savvy: SaaS Identity Discovery and Visibility

Episode

Radware: 360 Application Protection and Why Companies Need It

Episode

Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

Episode

Zero Networks: The Problem with VPNs

Series 2

The Next Phase of Cybersecurity

Episode

Darktrace: The rapid changes in cybersecurity due to advanced AI

Episode

Capsule8: Securing the DevOps Process

Episode

Panaseer: Continuous Controls Monitoring for Cybersecurity

Episode

SafeGuard Cyber: Social and Digital Endpoint

Episode

Sixgill: Automated Protection Against Common Vulnerabilities and Exposures

Episode

Blackberry Cylance: Threat Detection, Prevention, and Response

Episode

Edgescan: Fullstack Vulnerability Management Implementation Benefits and Challenges for the Enterprise

Episode

Pulse Secure: Secure Access in the Age of Zero Trust Networking

Episode

BlackBerry: Can Corporations Use AI for Cybersecurity?

Episode

BlackBerry: The Benefits of Critical Event Management for Business Continuity

Episode

BlackBerry: What Extortion Means for Businesses in the 2020s

Episode

Proofpoint Episode 1: 2020s Biggest and Boldest Insider Threats

Episode

Proofpoint Episode 2: Navigating Insider Risk

Episode

Proofpoint Episode 3: Reducing Insider Risk in the Work-From-Everywhere Economy

Episode

Menlo Security: Emerging Trends in Cloud Security

Episode

Menlo Security: Secure Remote Working Practices

Episode

Menlo Security: What Security Measures Should I Practice in 2021?

Episode

“The next big thing that will destroy your business is some smart folks with an idea,” Palo Alto CIO Jonathan Reichental talks business threats, future cities and big ideas

Episode

Thales: Adopting the Shared Security Management Model

Episode

Thales: Understanding the Data Process with a Security Platform

Episode

Thales: What Encryption Means in Quantum Resistant Networks

Episode

FireMon: IT Security Policy Management and Automation

Episode

IntSights: The Use of External Threat Intelligence for Proactive IT Security

Episode

Cato Networks: What is SASE and how does it support Network transformation?

Episode

Gigamon & Riverbed: Maintaining visibility and security as you move to the cloud

Episode

Synack: Crowdsourced Security Testing and the Role of the CISO

Episode

Digital Transformation and Attack Surface Management

Series 1

The Next Phase of Cybersecurity

Episode

Rapid7 Part 1: Finding Better Methods to Address Application Security

Episode

Rapid7 Part 2: Supporting Technology for Application Security

Episode

Endgame Part 1: How Endpoint Security Got To Now?

Episode

Endgame Part 2: What’s Next for Endpoint Security?

Episode

Endgame Part 3: Mapping Endpoint Security To A Contemporary Security Strategy

Episode

Unitrends: The role backup and recovery tools play in enhancing security

Episode

RSA: New risks arising for businesses through increased digitisation

Episode

SecureData: Cybersecurity Responding to Demand

Join 34,209 IT professionals who already have a head start

Network with the biggest names in IT and gain instant access to all of our exclusive content for free.

Get Started Now