Steven Bowcut


In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you’ll learn how LiveAction’s AI-driven anomaly detection and predictive threat intelligence can […]

AI-driven Anomaly Detection and Predictive Threat Intelligence



In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. The topic Steve Bowcut and Abhay discuss is The Application […]

The Application Security Skills Gap



Passwords are a pain. We all know we should use different passwords for every account, but remembering them is nearly impossible. Like most people, you probably have a few favorite passwords you repeatedly use to access dozens or even hundreds of online accounts because you can’t remember more than that. […]

Password Manager and Privileged Access Management in a Single Platform


In today’s world, online security is more important than ever. In order to keep customers’ personal information safe, businesses need to use a passwordless authentication system that is phishing-resistant. Veridium and Tec360 have teamed up to provide just such a solution. In recent industry news, Veridium announced that it and […]

Phishing-Resistant Passwordless Authentication From Veridium and Tec360 to Protect Top ...


In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption. István explains why staying in control of your data is important when collaborating with others and shares how Tresorit’s end-to-end encryption technology protects email and documents. He […]

Encrypted Collaboration



Protecting critical infrastructure is vital to the safety and security of our nation. Without adequate security measures and systems, threat actors would undoubtedly, severely impact essential services such as water, energy, and transportation. If any sector requires the very best in cybersecurity technology, it is critical infrastructure.  Dispersive Holdings Inc. […]

Sustainable Power Infrastructure Gets Military-grade Security Technology



Adversarial emulation (AE) mimics an attacker’s behavior to identify and measure the effectiveness of security controls. It can help reduce detection and response rates, validate controls, and optimize resources by allowing teams to prioritize vulnerabilities and concentrate on the highest risk issues to the business. This article will explore how […]

Automated Adversarial Emulation Helps Security Teams Reduce Detection and Response ...



In Episode S4E14, Steve Bowcut talks about Zero Trust Network Access with two well-informed guests. On the show are two executives from the cybersecurity firm Syxsense, Mark Reed, CTO, and Dave Taylor, CMO.  The term Zero Trust is sometimes misapplied or misunderstood in the security industry, so our guests thoroughly […]

Zero Trust Network Access


Observers of cybersecurity innovation, specifically within Microsoft’s ecosystem, have probably already heard that Tanium, a provider of converged endpoint management (XEM), recently announced the first of several powerful integrations between Microsoft and their Tanium XEM platform. This new integration and the promise of future ones mark the latest expansion in […]

How To Get Rich, Real-time Endpoint Data Directly From the ...


Amazon Web Services (AWS) offers startup accelerator programs that provide resources and mentorship to help new businesses grow. These programs are a great way to help startups succeed. AWS is committed to helping companies grow and succeed, and these accelerator programs are a great way to do that. AWS is […]

Impressive Cohort of Companies Selected To Participate in AWS Accelerator