All Episodes
TechSpective Podcast — 181 episodes
The Attack Surface Changed but the Fundamentals Didn’t
The Agentic AI Reckoning Nobody Saw Coming
The Microsoft Enterprise Recovery Problem AI Can’t Fix
Algorithms, Thought Leadership, and the Future of Digital Influence
Shadow AI, Cybersecurity, and the Evolving Threat Landscape
Agentic AI and the Art of Asking Better Questions
Building Security for a World That’s Already Changed
Cybersecurity’s Quiet Revolution: What We’re Missing While Chasing the Hype
The Identity Problem No One Saw Coming—Until AI Exposed It
Exploring the Future of Identity Security and Agentic AI
From Polymorphic Attacks to Deepfakes: The Shifting Threat Landscape
Why AI Agents Need Guardrails — And Why Everyone’s Talking About It
From Alert Fatigue to Cyber Resilience: Rethinking the Future of the SOC with AI
Fighting Machines with Machines: How AI Is Redefining the SOC
When the Phish Leaves the Inbox
When Security Automation Meets Agentic AI
Rethinking Cybersecurity in the Age of AI and Digital Twins
The Evolving Face of Ransomware — and How We Can Stay Ahead of It
Why Data Must Be the Heart of Cybersecurity
Retail Under Fire: Why Hackers Love Shopping Season
Navigating Cybersecurity Complexity
Rethinking Cloud Security for the Evolving Threat Landscape
Why Data Security Is the Real AI Risk
Why Being Bold Matters in Cybersecurity—and Branding
A New Reality for Cybersecurity Collaboration
Cybersecurity, Trust, and the Shifting Landscape of Government Oversight
Breach Ready: Rethinking Zero Trust and Lateral Movement Defense
Navigating the Future of AI and Cybersecurity
AI Disruption, Cyber Risk, and Doing the Right Thing
A Pragmatic Approach to Effective Security
Building Community and Making Cybersecurity Accessible
Where Ransomware and Geopolitical Tensions Intersect
Why the SOC of Tomorrow Won’t Look Like Today’s
The Rising Cost of Ransomware
How Romance Scammers Prey on Vulnerability
Navigating the Cybersecurity Tightrope
Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity
Exploring the Evolution of Cybersecurity Marketing
Tackling Swivel Chair Syndrome
Unlocking Proactive Compliance with Adobe’s Common Controls Framework
Unlocking the Power of Continuous Threat Exposure Management
Unlocking the Power of AI in Threat Hunting
Exploring the Future of Cloud Security
How AI is Transforming Cybersecurity
Unlocking the Secrets of Non-Human Identities
Exploring the Future of Cybersecurity in a SaaS-Driven World
Extending Modern Identity Protection for Comprehensive Security
Enhancing Enterprise Browser Security
Exploring the Intersection of AI and Security
Streamline Security with AI and Dynamic Detection Analysis
Ransomware-Proof Your Data Backups with Immutability
Future of Tech and Cybersecurity Looks Bright Thanks to AI
Basic Understanding of Code Is a Fundamental Life Skill
How Generative AI is Redefining Creativity and Opportunities
Detecting Anomalies with ‘Project Caspian’
Strategic Decision-Making: Balancing Budgets and Security
Cybersecurity Insights from a VC Perspective
Harnessing AI for a Better Customer Experience
Using LLMs to Automate and Streamline Cyber Threat Analysis
SBOMs: The Hidden Ingredient in Secure Software Recipes
Changing Advertising with Innovation, Creativity, and AI
Crowdsourced Security-as-a-Service
Visibility Without Context Is Just Noise
Driving Security Culture and Best Practices
Real World Impact of Medical Device Security
Bug Bounty Programs and Responsible Vulnerability Disclosure
Protecting Kids from Bullying and Predators in Online Games
Reducing Risk and Building Trust with Data Privacy
Shifting Left and Automating Code Review
Granting the Right Access at the Right Time to Get the Job Done Securely
Managing and Securing Apple Devices in the Enterprise
Improving Customer Experience with Generative AI
Fight Fire with Fire: Using Generative AI for Proactive Defense
Streamlining Incident Detection with UEBA (User and Entity Behavior Analytics)
John Gillis Talks about Automating the SOC with Browser Extensions
Cenk Ozdemir Chats about Effective Cloud Strategy
Ammar Alim Shares Insight on ‘Adversary Aware’ Applications
Igor Volovich Chats about Cybersecurity Compliance and Accountability
Julie Smith Shares Identity Security Guidance for 2023
Mark Thomas Talks about Threat Hunting
Malcom Harkins Talks about Ethical and Legal Obligations of the CISO
Maggie MacAlpine Chats about Collaborative Threat Intel Initiative
Astrid Bailey Discusses Security Enablement and Empowering Security Champions
Ahmed Masud Chats about Innovative Ways to Combat Ransomware and Protect Data
Sam Curry Talks about Misinformation Online and ‘Doing Your Own Research’
Raj Samani Discusses Cybersecurity Trends and Strategies
Richard Stiennon Talks about Security Yearbook 2022
Tarun Desikan Chats about Zero Trust and Democratizing Security
Bill Mann Chats about DevSecOps and Balancing Speed and Security
Tim Ip Talks about Automating Incident Response Forensic Investigation
Ian McShane Chats about Mental Health and Job Burnout
Rajiv Kulkarni Talks about the Malware Analysis Pipeline
Julie Smith Chats about Identity Management Day
Barak Hadad Shares Details of TLStorm Flaws in APC UPS Devices
Connecteam Leadership Talks about Removing Complexity so Businesses Can Thrive
Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics
Prabath Karanth Chats about Cybersecurity at a Startup During a Pandemic
Den Jones Talks about Zero Trust
Anton Chuvakin Talks about XDR (Extended Detection and Response)
Michael Farnum Chats about Cloud Security and Acronym Overload
Bharat Jogi Talks About Vulnerability Management and Threat Research
Kevin Robinson Chats about Wi-Fi Security
Helen Lee Bouygues Discusses ‘Fake News’ and Critical Thinking
Jeff Man Talks about PCI-DSS and the State of Security Compliance
Malcolm Harkins Discusses the Biden Cybersecurity Summit and Effective Security
Alan Shimel Chats about Media and Cybersecurity Trends During COVID
Marcus Carey Shares Insight on Getting Started in a Tech or Cybersecurity Career
Mickey Boodaei Talks about The Mission to End Passwords
Jake Kouns Discusses Why Better Vulnerability Data Matters for Effective Cybersecurity
John Sawyer Chats about Value of Red and Purple Team Engagements
Jack Fischer – Space Exploration and Getting (Back) to the Moon
Adam Philpott – Zero Trust and ZTNA in a Post-Pandemic World
Katie Moussouris – Coordinated Vulnerability Disclosure and the Problem with Bug Bounty Platforms
Jack Daniel – Emerging from the Quarantine Cocoon
Ron Gula – Innovation and Emerging Trends in Cybersecurity
Søren Pedersen – DevOps Culture and Principles and Value of Maturity Assessments
Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers
Wolf Goerlich – Benefits of Diverse Interests and Perspectives for Cybersecurity
Dr. Eric Cole – The Value of the CISO Role and How to Get it Right
Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense
Richard Stiennon Talks about Security Yearbook 2021 and Getting Through the Pandemic
Andy Ellis Shares Insights on Leadership (and DC Comics)
Sam Curry Discusses Privacy, Data Ownership, and Business Continuity
Frank Duff Chats about Latest MITRE ATT&CK Evaluation
David Marcus Talks about the Blurred Lines in Cybersecurity
Shashi Prakash Chats about Cryptocurrency and NFT Fraud
Adobe Shares Creative Approach to Managing GRC
Sheela Sarva Offers Insight on Being a Woman in Technology and Cybersecurity
Suzy Greenberg Discusses the Importance of Transparency and Security Assurance
Ben Carr Chats about 2021 and the Evolving Role of the CISO
Chris Eng Talks about the State of Software Security Report
Tom Garrison Discusses Preventing Exploits with Intel CET
DJ Sampath Chats about the COVID-19 Pandemic and Business Email Compromise
Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy
Mike Beckley Discusses Low-Code Programming and Robotic Process Automation
Tim Keeler Talks about Value of Just-in-Time Privileged Access Management
Adam & Danielle from ‘Marriage and Martinis’ Chat about Starting a Podcast
Mike Elgan Discusses Tech Journalism and the Joys of Being a Nomad
Evan Kirstel Talks about Online Influence and the Pros and Cons of Social Media
Ryan Berg Chats about How to Keep ‘Gum’ Off of Your Cybersecurity ‘Shoe’
Lakshmi Hanspal Talks about the Challenges of Being a CISO
Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles
Raj Samani Talks about Managing Risk and Protecting Data Integrity
Michael Farnum Chats about ICS Security
Alan Shimel Talks about Evolving Role for Security in a DevOps World
Georgia Weidman Discusses Penetration Testing and Running a Successful Cybersecurity Business
Wolf Goerlich Chats about Cybersecurity and the Value of Local Groups and Events
Jeremiah Grossman Talks Asset Discovery and the Importance of the Right Team
Phil Dunkelberger Discusses FIDO and Secure Authentication
Andrew Hay Talks about ‘Fractional Executives’ and the Value of Remote Workers
Jamil Jaffer Chats about the Value of Sharing Threat Intelligence for Better Cybersecurity
DJ Sampath Chats about Raising the Bar for Cybersecurity with AI and NLU
Brook Schoenfield Discusses Threat Modeling and Secure Design
Ron Gula Talks about the Importance of Getting Out of the Cybersecurity Bubble
Jack Danahy Shares Insight on Endpoint Protection and Simplifying Cybersecurity
Jeff Man Chats about His NSA Origin Story and the State of Cybersecurity Today
Jack Daniel Talks about RSA, BSides, Tiki Bars and Standup Comedy
Richard Stiennon Discusses His New Book 'Secure Cloud Transformation'
Marcus Carey Chats about ‘Tribe of Hackers’
Wendy Nather Talks about the Value of Zero Trust Security
Ivan Novikov Chats about Fuzzing in Testing
Kamal Shah Talks about Cybersecurity across the Container Lifecycle
Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook
Andy Smith Discusses Zero Trust Privilege in the Modern Threatscape
John Kinsella Chats about the Challenges of Securing Containers
Dr. Galina Datskovsky Talks about Secure Messaging
John Sawyer Discusses the Value of Red Team Assessments
Den Jones Explains Project ZEN
Chris Bray Talks about Cylance Smart Antivirus
Mike Armistead Discusses Why We Shouldn’t Fear Our New AI Overlords
Bill Mann Talks DevOps and Election Security
Scott Scheferman Explains Predictive Advantage
Matt Alderman Talks about Container Security
Daniel Miessler Demystifies Machine Learning
Corey Williams Discusses Next-Gen Access and Zero Trust Security
Chad Skipper Talks about Anti-Malware Testing
Cesar Cerrudo Cautions about Ransomware and Robots
Brandon Board Talks about the GDPR
Christer Edwards Discusses HubbleStack
Malcolm Harkins Talks about #ThinkBeyond
Orchestrating Cyber Ranges: A Proactive Approach to Cyber Security