Cybersecurity and IoT: New Risks and How To Minimize Them

Cybersecurity and IoT: New Risks and How To M...

Up next

The New Reality of the CISO Role

David Gee, a veteran CISO, CIO, board advisor, and author, joins Ann Johnson, CVP of Cybersecurity, Microsoft, on this week’s episode of Afternoon Cyber Tea. Drawing on decades of experience and insights from his books, Gee explores the gap between theory and reality for security ...  Show more

The Best of Afternoon Cyber Tea 2025

On this special best of episode of Afternoon Cyber Tea, Ann revisits six standout conversations from the past year with Amy Edmondson, Christina Morillo, Frank X. Shaw, Hugh Thompson, Troy Hunt, and Jack Rhysider. Together, these moments highlight the evolving human and technical ...  Show more

Recommended Episodes

Transforming security with MagicCube co-founders Hisham Shawki and Nancy Zayed
Making It

Hisham Shawki and Nancy Zayed launched MagicCube in 2014 with the intention of eliminating the redundancy of hardware-based security currently used in mobile and IoT devices. The primary target of their technology is the USD 48 bn POS hardware market, a strategy that attracted in ...  Show more

Turing Award Special: A Conversation with Martin Hellman
Software Engineering Daily

Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation fo ...

  Show more

Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
Threat Vector by Palo Alto Networks

In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration ...  Show more

Balancing Security with Usability in Cybersecurity
Threat Vector by Palo Alto Networks

In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ...  Show more