Podcast


In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you’ll learn how LiveAction’s AI-driven anomaly detection and predictive threat intelligence can […]

AI-driven Anomaly Detection and Predictive Threat Intelligence



In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. The topic Steve Bowcut and Abhay discuss is The Application […]

The Application Security Skills Gap



In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption. István explains why staying in control of your data is important when collaborating with others and shares how Tresorit’s end-to-end encryption technology protects email and documents. He […]

Encrypted Collaboration


In Episode S4E14, Steve Bowcut talks about Zero Trust Network Access with two well-informed guests. On the show are two executives from the cybersecurity firm Syxsense, Mark Reed, CTO, and Dave Taylor, CMO.  The term Zero Trust is sometimes misapplied or misunderstood in the security industry, so our guests thoroughly […]

Zero Trust Network Access





In Episode S4E11, our guest is Ray Steen, Chief Strategy Officer of the IT managed services firm, MainSpring. In a fascinating and informative discussion, BSM’s Steve Bowcut and Ray talk about: The common vulnerabilities threat actors exploit to launch a ransomware attack. The relationship between the size of a business and […]

How Managed Security Service Providers Can Help Protect Against Ransomware






Our topic for Episode S4E7 is Understanding and Communicating Cyber Risk. Our guest is Greg Spicer, CRO and Co-Founder of Ostrich Cyber-Risk. BSM’s editor, Steve Bowcut, asks Greg to: Discuss the importance of prioritizing mitigation and remediation efforts. Explain some crucial elements of risk scoring; what should be considered in […]

Understanding and Communicating Cyber Risk