Steven Bowcut


Senhasegura, a highly acclaimed Privileged Access Management (PAM) provider, has made an impressive foray into the rapidly growing PAM market by combining cutting-edge technology with key new hires and strengthened marketing tactics both from a technical and channel standpoint. This move has garnered notable feedback from leading industry experts and […]

Senhasegura Positioned for Growth in Privileged Access Management (PAM)



Our guest for Episode S4E19 is Dr. Carmit Yadin, the Founder & CEO at DeviceTotal—the industry’s first universal repository platform providing security data for devices enabling companies to assess current risks that deployed devices post and potential future risks arising from adding new devices to their networks. The topic for […]

How you can Identify the Security Posture of Your Devices ...



In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you’ll learn how LiveAction’s AI-driven anomaly detection and predictive threat intelligence can […]

AI-driven Anomaly Detection and Predictive Threat Intelligence



In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. The topic Steve Bowcut and Abhay discuss is The Application […]

The Application Security Skills Gap



Passwords are a pain. We all know we should use different passwords for every account, but remembering them is nearly impossible. Like most people, you probably have a few favorite passwords you repeatedly use to access dozens or even hundreds of online accounts because you can’t remember more than that. […]

Password Manager and Privileged Access Management in a Single Platform


In today’s world, online security is more important than ever. In order to keep customers’ personal information safe, businesses need to use a passwordless authentication system that is phishing-resistant. Veridium and Tec360 have teamed up to provide just such a solution. In recent industry news, Veridium announced that it and […]

Phishing-Resistant Passwordless Authentication From Veridium and Tec360 to Protect Top ...


In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption. István explains why staying in control of your data is important when collaborating with others and shares how Tresorit’s end-to-end encryption technology protects email and documents. He […]

Encrypted Collaboration



Protecting critical infrastructure is vital to the safety and security of our nation. Without adequate security measures and systems, threat actors would undoubtedly, severely impact essential services such as water, energy, and transportation. If any sector requires the very best in cybersecurity technology, it is critical infrastructure.  Dispersive Holdings Inc. […]

Sustainable Power Infrastructure Gets Military-grade Security Technology



Adversarial emulation (AE) mimics an attacker’s behavior to identify and measure the effectiveness of security controls. It can help reduce detection and response rates, validate controls, and optimize resources by allowing teams to prioritize vulnerabilities and concentrate on the highest risk issues to the business. This article will explore how […]

Automated Adversarial Emulation Helps Security Teams Reduce Detection and Response ...