Steven Bowcut


Veridium, a top developer of frictionless, passwordless authentication solutions, has been chosen by MTRIX as a solution of choice for trusted digital identities and passwordless authentication, providing MTRIX customers with a uniform, simple, passwordless authentication user experience across platforms and environments.

MTRIX Chooses Veridium for State-of-the-Art Passwordless Authentication: A Partnership for ...



Token is a groundbreaking provider of secure, wearable authentication solutions designed to be the most outstanding user convenience for the ultimate protection against ransomware and data breaches. The company has been making waves in the tech industry for its innovative approach to security. It recently announced a $30 million investment […]

Token Secures $30 Million in Funding To Introduce Its Advanced ...



In this episode, host Steve Bowcut interviews Ben Chappell, CEO, and Roger Neal, Head of Products, at ⁠Apona Security⁠. Ben and Roger share their approach to software security and talk about how their platform is unique. The discussion dives into the importance of organizations prioritizing their security as a core part of their development process.

How to Secure Your Supply Chain and Get Visibility Into ...







In an era of growing cyber threats and increasing data breaches, the need for robust cybersecurity measures has never been greater. Against this backdrop, Larry Clinton’s new book, “Fixing American Cybersecurity: Creating a Strategic Public-Private Partnership,” offers a timely exploration of the challenges and solutions involved in securing our digital […]

A Review of Fixing American Cybersecurity, Edited by Larry Clinton ...





As cybersecurity threats become more sophisticated, organizations must employ new measures to protect their networks, digital assets, and data. By understanding and implementing these concepts, you can help reduce your organization’s risk of a cyberattack. In Episode S5E4, cybersecurity expert Bikash Barai, Co-founder of FireCompass, explains how to manage your […]

External Attack Surface Management and Continuous Automated Red Teaming