TechSpective Podcast cover art

All Episodes

TechSpective Podcast — 181 episodes

#
Title
1

The Attack Surface Changed but the Fundamentals Didn’t

2

The Agentic AI Reckoning Nobody Saw Coming

3

The Microsoft Enterprise Recovery Problem AI Can’t Fix

4

Algorithms, Thought Leadership, and the Future of Digital Influence

5

Shadow AI, Cybersecurity, and the Evolving Threat Landscape

6

Agentic AI and the Art of Asking Better Questions

7

Building Security for a World That’s Already Changed

8

Cybersecurity’s Quiet Revolution: What We’re Missing While Chasing the Hype

9

The Identity Problem No One Saw Coming—Until AI Exposed It

10

Exploring the Future of Identity Security and Agentic AI

11

From Polymorphic Attacks to Deepfakes: The Shifting Threat Landscape

12

Why AI Agents Need Guardrails — And Why Everyone’s Talking About It

13

From Alert Fatigue to Cyber Resilience: Rethinking the Future of the SOC with AI

14

Fighting Machines with Machines: How AI Is Redefining the SOC

15

When the Phish Leaves the Inbox

16

When Security Automation Meets Agentic AI

17

Rethinking Cybersecurity in the Age of AI and Digital Twins

18

The Evolving Face of Ransomware — and How We Can Stay Ahead of It

19

Why Data Must Be the Heart of Cybersecurity

20

Retail Under Fire: Why Hackers Love Shopping Season

21

Navigating Cybersecurity Complexity

22

Rethinking Cloud Security for the Evolving Threat Landscape

23

Why Data Security Is the Real AI Risk

24

Why Being Bold Matters in Cybersecurity—and Branding

25

A New Reality for Cybersecurity Collaboration

26

Cybersecurity, Trust, and the Shifting Landscape of Government Oversight

27

Breach Ready: Rethinking Zero Trust and Lateral Movement Defense

28

Navigating the Future of AI and Cybersecurity

29

AI Disruption, Cyber Risk, and Doing the Right Thing

30

A Pragmatic Approach to Effective Security

31

Building Community and Making Cybersecurity Accessible

32

Where Ransomware and Geopolitical Tensions Intersect

33

Why the SOC of Tomorrow Won’t Look Like Today’s

34

The Rising Cost of Ransomware

35

How Romance Scammers Prey on Vulnerability

36

Navigating the Cybersecurity Tightrope

37

Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity

38

Exploring the Evolution of Cybersecurity Marketing

39

Tackling Swivel Chair Syndrome

40

Unlocking Proactive Compliance with Adobe’s Common Controls Framework

41

Unlocking the Power of Continuous Threat Exposure Management

42

Unlocking the Power of AI in Threat Hunting

43

Exploring the Future of Cloud Security

44

How AI is Transforming Cybersecurity

45

Unlocking the Secrets of Non-Human Identities

46

Exploring the Future of Cybersecurity in a SaaS-Driven World

47

Extending Modern Identity Protection for Comprehensive Security

48

Enhancing Enterprise Browser Security

49

Exploring the Intersection of AI and Security

50

Streamline Security with AI and Dynamic Detection Analysis

51

Ransomware-Proof Your Data Backups with Immutability

52

Future of Tech and Cybersecurity Looks Bright Thanks to AI

53

Basic Understanding of Code Is a Fundamental Life Skill

54

How Generative AI is Redefining Creativity and Opportunities

55

Detecting Anomalies with ‘Project Caspian’

56

Strategic Decision-Making: Balancing Budgets and Security

57

Cybersecurity Insights from a VC Perspective

58

Harnessing AI for a Better Customer Experience

59

Using LLMs to Automate and Streamline Cyber Threat Analysis

60

SBOMs: The Hidden Ingredient in Secure Software Recipes

61

Changing Advertising with Innovation, Creativity, and AI

62

Crowdsourced Security-as-a-Service

63

Visibility Without Context Is Just Noise

64

Driving Security Culture and Best Practices

65

Real World Impact of Medical Device Security

66

Bug Bounty Programs and Responsible Vulnerability Disclosure

67

Protecting Kids from Bullying and Predators in Online Games

68

Reducing Risk and Building Trust with Data Privacy

69

Shifting Left and Automating Code Review

70

Granting the Right Access at the Right Time to Get the Job Done Securely

71

Managing and Securing Apple Devices in the Enterprise

72

Improving Customer Experience with Generative AI

73

Fight Fire with Fire: Using Generative AI for Proactive Defense

74

Streamlining Incident Detection with UEBA (User and Entity Behavior Analytics)

75

John Gillis Talks about Automating the SOC with Browser Extensions

76

Cenk Ozdemir Chats about Effective Cloud Strategy

77

Ammar Alim Shares Insight on ‘Adversary Aware’ Applications

78

Igor Volovich Chats about Cybersecurity Compliance and Accountability

79

Julie Smith Shares Identity Security Guidance for 2023

80

Mark Thomas Talks about Threat Hunting

81

Malcom Harkins Talks about Ethical and Legal Obligations of the CISO

82

Maggie MacAlpine Chats about Collaborative Threat Intel Initiative

83

Astrid Bailey Discusses Security Enablement and Empowering Security Champions

84

Ahmed Masud Chats about Innovative Ways to Combat Ransomware and Protect Data

85

Sam Curry Talks about Misinformation Online and ‘Doing Your Own Research’

86

Raj Samani Discusses Cybersecurity Trends and Strategies

87

Richard Stiennon Talks about Security Yearbook 2022

88

Tarun Desikan Chats about Zero Trust and Democratizing Security

89

Bill Mann Chats about DevSecOps and Balancing Speed and Security

90

Tim Ip Talks about Automating Incident Response Forensic Investigation

91

Ian McShane Chats about Mental Health and Job Burnout

92

Rajiv Kulkarni Talks about the Malware Analysis Pipeline

93

Julie Smith Chats about Identity Management Day

94

Barak Hadad Shares Details of TLStorm Flaws in APC UPS Devices

95

Connecteam Leadership Talks about Removing Complexity so Businesses Can Thrive

96

Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics

97

Prabath Karanth Chats about Cybersecurity at a Startup During a Pandemic

98

Den Jones Talks about Zero Trust

99

Anton Chuvakin Talks about XDR (Extended Detection and Response)

100

Michael Farnum Chats about Cloud Security and Acronym Overload

101

Bharat Jogi Talks About Vulnerability Management and Threat Research

102

Kevin Robinson Chats about Wi-Fi Security

103

Helen Lee Bouygues Discusses ‘Fake News’ and Critical Thinking

104

Jeff Man Talks about PCI-DSS and the State of Security Compliance

105

Malcolm Harkins Discusses the Biden Cybersecurity Summit and Effective Security

106

Alan Shimel Chats about Media and Cybersecurity Trends During COVID

107

Marcus Carey Shares Insight on Getting Started in a Tech or Cybersecurity Career

108

Mickey Boodaei Talks about The Mission to End Passwords

109

Jake Kouns Discusses Why Better Vulnerability Data Matters for Effective Cybersecurity

110

John Sawyer Chats about Value of Red and Purple Team Engagements

111

Jack Fischer – Space Exploration and Getting (Back) to the Moon

112

Adam Philpott – Zero Trust and ZTNA in a Post-Pandemic World

113

Katie Moussouris – Coordinated Vulnerability Disclosure and the Problem with Bug Bounty Platforms

114

Jack Daniel – Emerging from the Quarantine Cocoon

115

Ron Gula – Innovation and Emerging Trends in Cybersecurity

116

Søren Pedersen – DevOps Culture and Principles and Value of Maturity Assessments

117

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers

118

Wolf Goerlich – Benefits of Diverse Interests and Perspectives for Cybersecurity

119

Dr. Eric Cole – The Value of the CISO Role and How to Get it Right

120

Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense

121

Richard Stiennon Talks about Security Yearbook 2021 and Getting Through the Pandemic

122

Andy Ellis Shares Insights on Leadership (and DC Comics)

123

Sam Curry Discusses Privacy, Data Ownership, and Business Continuity

124

Frank Duff Chats about Latest MITRE ATT&CK Evaluation

125

David Marcus Talks about the Blurred Lines in Cybersecurity

126

Shashi Prakash Chats about Cryptocurrency and NFT Fraud

127

Adobe Shares Creative Approach to Managing GRC

128

Sheela Sarva Offers Insight on Being a Woman in Technology and Cybersecurity

129

Suzy Greenberg Discusses the Importance of Transparency and Security Assurance

130

Ben Carr Chats about 2021 and the Evolving Role of the CISO

131

Chris Eng Talks about the State of Software Security Report

132

Tom Garrison Discusses Preventing Exploits with Intel CET

133

DJ Sampath Chats about the COVID-19 Pandemic and Business Email Compromise

134

Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

135

Mike Beckley Discusses Low-Code Programming and Robotic Process Automation

136

Tim Keeler Talks about Value of Just-in-Time Privileged Access Management

137

Adam & Danielle from ‘Marriage and Martinis’ Chat about Starting a Podcast

138

Mike Elgan Discusses Tech Journalism and the Joys of Being a Nomad

139

Evan Kirstel Talks about Online Influence and the Pros and Cons of Social Media

140

Ryan Berg Chats about How to Keep ‘Gum’ Off of Your Cybersecurity ‘Shoe’

141

Lakshmi Hanspal Talks about the Challenges of Being a CISO

142

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles

143

Raj Samani Talks about Managing Risk and Protecting Data Integrity

144

Michael Farnum Chats about ICS Security

145

Alan Shimel Talks about Evolving Role for Security in a DevOps World

146

Georgia Weidman Discusses Penetration Testing and Running a Successful Cybersecurity Business

147

Wolf Goerlich Chats about Cybersecurity and the Value of Local Groups and Events

148

Jeremiah Grossman Talks Asset Discovery and the Importance of the Right Team

149

Phil Dunkelberger Discusses FIDO and Secure Authentication

150

Andrew Hay Talks about ‘Fractional Executives’ and the Value of Remote Workers

151

Jamil Jaffer Chats about the Value of Sharing Threat Intelligence for Better Cybersecurity

152

DJ Sampath Chats about Raising the Bar for Cybersecurity with AI and NLU

153

Brook Schoenfield Discusses Threat Modeling and Secure Design

154

Ron Gula Talks about the Importance of Getting Out of the Cybersecurity Bubble

155

Jack Danahy Shares Insight on Endpoint Protection and Simplifying Cybersecurity

156

Jeff Man Chats about His NSA Origin Story and the State of Cybersecurity Today

157

Jack Daniel Talks about RSA, BSides, Tiki Bars and Standup Comedy

158

Richard Stiennon Discusses His New Book 'Secure Cloud Transformation'

159

Marcus Carey Chats about ‘Tribe of Hackers’

160

Wendy Nather Talks about the Value of Zero Trust Security

161

Ivan Novikov Chats about Fuzzing in Testing

162

Kamal Shah Talks about Cybersecurity across the Container Lifecycle

163

Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

164

Andy Smith Discusses Zero Trust Privilege in the Modern Threatscape

165

John Kinsella Chats about the Challenges of Securing Containers

166

Dr. Galina Datskovsky Talks about Secure Messaging

167

John Sawyer Discusses the Value of Red Team Assessments

168

Den Jones Explains Project ZEN

169

Chris Bray Talks about Cylance Smart Antivirus

170

Mike Armistead Discusses Why We Shouldn’t Fear Our New AI Overlords

171

Bill Mann Talks DevOps and Election Security

172

Scott Scheferman Explains Predictive Advantage

173

Matt Alderman Talks about Container Security

174

Daniel Miessler Demystifies Machine Learning

175

Corey Williams Discusses Next-Gen Access and Zero Trust Security

176

Chad Skipper Talks about Anti-Malware Testing

177

Cesar Cerrudo Cautions about Ransomware and Robots

178

Brandon Board Talks about the GDPR

179

Christer Edwards Discusses HubbleStack

180

Malcolm Harkins Talks about #ThinkBeyond

181

Orchestrating Cyber Ranges: A Proactive Approach to Cyber Security