Podcast



In this episode, host Steve Bowcut interviews Ben Chappell, CEO, and Roger Neal, Head of Products, at ⁠Apona Security⁠. Ben and Roger share their approach to software security and talk about how their platform is unique. The discussion dives into the importance of organizations prioritizing their security as a core part of their development process.

How to Secure Your Supply Chain and Get Visibility Into ...





As cybersecurity threats become more sophisticated, organizations must employ new measures to protect their networks, digital assets, and data. By understanding and implementing these concepts, you can help reduce your organization’s risk of a cyberattack. In Episode S5E4, cybersecurity expert Bikash Barai, Co-founder of FireCompass, explains how to manage your […]

External Attack Surface Management and Continuous Automated Red Teaming


Medical devices are becoming increasingly interconnected and vulnerable to cyber-attacks. As a security professional, it’s crucial that you understand the risks and how to safeguard these devices. Episode S5E3 will provide an overview of the medical IoT landscape and critical considerations for protecting these devices. Listen in as Richard Staynings, […]

What Security Professionals Need to Know About Safeguarding Medical Devices ...







Our guest for Episode S4E19 is Dr. Carmit Yadin, the Founder & CEO at DeviceTotal—the industry’s first universal repository platform providing security data for devices enabling companies to assess current risks that deployed devices post and potential future risks arising from adding new devices to their networks. The topic for […]

How you can Identify the Security Posture of Your Devices ...


In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you’ll learn how LiveAction’s AI-driven anomaly detection and predictive threat intelligence can […]

AI-driven Anomaly Detection and Predictive Threat Intelligence