Steven Bowcut



In Episode S4E3, our guest is Slava Bronfman, CEO and Co-founder at Cybellum and we talk about product supply chain security. Cybellum provides a product security platform, enabling teams to manage security across the entire product lifecycle – from highly detailed SBOMs to automatic vulnerability management, ongoing incident response, and […]

Product Supply Chain Security


In Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance – How and Why.Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How […]

Automated Controls for Compliance – How and Why



Secure Communications Sensor Technologies and Cloud Services for the emerging Industrial Internet of Things (IIoT) market for Commercial Buildings, Agriculture, Critical Infrastructure and Residential On February 22, 2022, one of the unique dates this decade—and, yes, you guessed it, at 2:22 AM—iMatrix Systems announced that the company has emerged from stealth. […]

With a Nod to Twosday, iMatrix Systems Launches From Stealth ...







In Episode S3E13, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. […]

Cybersecurity Red Flags



One of the oldest techniques for identifying, mapping, and attributing attack methods is deploying honeypots to lure attackers by creating strategically placed fake computing resources. Patterned after the age-old police sting operation, this technique involves deploying traps that appear to be a legitimate part of the infrastructure and contain information […]

Don’t Let Your Distributed Deception Platform Increase Your Risk


If you’re not familiar with the Federal Risk and Authorization Management Program (FedRAMP) Marketplace, it provides a searchable, sortable database of cloud service offerings (CSOs) that have achieved a FedRAMP designation. There are three designations available; FedRAMP Ready, FedRAMP In Process, and FedRAMP Authorized.  The FedRAMP Ready designation indicates a […]

Distributed and Autonomous Deception Techniques Coming to a Federal Agency ...


Episode S3E12 features an informative conversation with Slava Bronfman, the Co-founder and CEO at Cybellum. Cybellum is a global leader providing integrated cyber solutions for leading device manufactures, including automobiles. We discuss the cybersecurity risks associated with the automotive industry and what can be done to mitigate those risks. In […]

Automotive Cybersecurity Risks