Afleveringen
-
This week Laurence Pitt is interviewed by Tom Field from Information Security Media Group. They explore how the value of data changes depending on the focus of an organization at a given point in time and how it can move from being your greatest asset to becoming your greatest liability.
-
We commissioned PwC to conduct a global survey to understand the nature of todays enterprise datacenter and cloud landscape. This week Laurence Pitt is joined by Amit Dhir (Principal - Partner - at PwC) to discuss the two things that have pushed total cost of ownership off the top spot of concerns for CIO's. You can download the full report here http://bit.ly/PwCResearch
-
Zijn er afleveringen die ontbreken?
-
By 2025, 60% of all cars will be “connected” and security becomes even more critical when safety features rely on low-latency always-up communications. Moving from a “know what something is” time based approach to one based on behaviors, will better enable the ability to dynamically change the configuration based on policies.
-
The security team won't do it, neither will big data, or artificial intelligence, or automation. But, if the variables in this equation are balanced, your security posture will be far more compelling. Laurence Pitt discusses how to achieve that balance.
-
IOT brings a new dimension to security considerations. The fish tank may look cool in your office but, pretty soon, it will be connected to your network. And then there are toilets - you will need more than a lock on the door to secure them. In this episode, Laurence and Lee discuss a new paradigm for security in an age where everything will become a connected device.
-
A cyber-skills shortage is making it harder to recruit the right people and making it harder to retain the people you already have. Ho can you motivate those you value to stay, and how can you attract new team members? Laurence Pitt shares some thoughts.
-
This week we take another look at GDPR. In a solo effort, Lee Fisher, takes a deeper dive into what GDPR is, and identifies 12 things everyone should have on their GDPR checklist.
You must not rely on the information in this podcast as an alternative to legal advice from your attorney or other professional legal services provider. You should never delay seeking legal advice, disregard legal advice, or commence or discontinue any legal action because of information in this podcast. -
Lee Fisher and Laurence Pitt discuss the EU General Data Protection Regulations, and the role of security tools and professionals in GDPR.
You must not rely on the information in this podcast as an alternative to legal advice from your attorney or other professional legal services provider. You should never delay seeking legal advice, disregard legal advice, or commence or discontinue any legal action because of information in this podcast. -
Can a firewall with hundreds of holes punched in it still be a firewall? And how do you manage it? Laurence Pitt and Lee Fisher discuss . . . firewalls!
There are solutions like Security Director, but what is really needed is greater automation in order to combat threats, detect the ones that do get in, and quarantine them. -
Laurence Pitt and Lee Fisher talk about how to use a SIEM system for much more than just collecting logs or noticing that a port has gone down.
Software like Juniper Secure Analytics plus Policy Enforcer can analyze unusual sequences of events and trigger protective or remedial actions. -
Ransomware is a good example of time-based analysis being able to detect a threat. In this episode, Lee Fisher and Laurence Pitt talk about threat databases.
They conclude it's about more than just correlating data, it is also about noticing unusual patterns, rather than just playing whack-a-mole with threats. -
Security strategists Lee Fisher and Laurence Pitt launch Juniper's Security Straight Talk series with a discussion on the blurring of the corporate network boundary.
Does this make it easier to introduce threats onto the network? And, if so, what is the relevance of the traditional perimeter approach to security?