Securing Underserved Organizations with Sinan Eren, the VP of Zero Trust Access at Barracuda

Securing Underserved Organizations with Sinan...

Up next

How the Smartest Companies Build Infrastructure That Wins

Most companies don’t realize it yet, but the way they built their technology foundations is quietly becoming a liability.Cloud costs are rising. Platforms change underneath you. AI is reshaping infrastructure from hardware to data to governance. And the strategies that once felt ...  Show more

The Next Internet Is Coming… And It’s Smarter Than Ever

Most people assume the internet is stable, durable, and ready for whatever comes next. The truth is a bit more complicated. Modern networks were never designed for today’s scale, and for the first time we are seeing technology that can make them smarter, simpler, and far more rel ...  Show more

Recommended Episodes

Cyber Security
The Bottom Line

Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ...  Show more

Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
CyberWire Daily

It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ...  Show more

Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.
CyberWire Daily

Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). ...  Show more

2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
Tech Talks Daily

In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ...  Show more