Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

My guest for this episode is Fabian Wosar, CTO of Emsisoft. Emsisoft is a New Zealand-based maker of antimalware and endpoint security solutions that has established itself as a leader in the fight against ransomware. This is a really awesome conversat… Continue reading Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

Ryan Berg Chats about How to Keep ‘Gum’ Off of Your Cybersecurity ‘Shoe’

Inner Circle Podcast Episode 041 This Inner Circle podcast episode is overdue. I’ll spare you the reasons and excuses for why there is a delay, but I want to frame the conversation because this episode was actually recorded with Ryan a few weeks … Continue reading Ryan Berg Chats about How to Keep ‘Gum’ Off of Your Cybersecurity ‘Shoe’

Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a cyber response?… Continue reading Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a cyber response?… Continue reading Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Raj Samani Talks about Managing Risk and Protecting Data Integrity

Inner Circle Podcast Episode 038 Raj Samani is my guest for this episode of the Inner Circle podcast. Raj is a McAfee Fellow and Chief Scientist for McAfee, but he stressed when introducing himself that his title does not define him and that he doesn&#… Continue reading Raj Samani Talks about Managing Risk and Protecting Data Integrity

Michael Farnum Chats about ICS Security

Inner Circle Podcast Episode 037 My friend Michael Farnum is my guest for this episode of the Inner Circle podcast for an insightful discussion on increased threats against industrial control systems (ICS) and the need for ICS security. Michael and I h… Continue reading Michael Farnum Chats about ICS Security

Georgia Weidman Discusses Penetration Testing and Running a Successful Cybersecurity Business

Inner Circle Podcast Episode 035 I’ve been a fan of Georgia Weidman for years, so it was an honor and a privilege to have her join me on the Inner Circle podcast. She is the author of Penetration Testing: A Hands-On Introduction to Hacking, and s… Continue reading Georgia Weidman Discusses Penetration Testing and Running a Successful Cybersecurity Business

Wolf Goerlich Chats about Cybersecurity and the Value of Local Groups and Events

Inner Circle Podcast Episode 034 Wolf Goerlich joins me for this episode of the Inner Circle podcast to talk about the state of cybersecurity today and his new role on the CISO Advisory Board for Duo Security. Wolf talks about his focus on zero trust&#… Continue reading Wolf Goerlich Chats about Cybersecurity and the Value of Local Groups and Events

Phil Dunkelberger Discusses FIDO and Secure Authentication

Inner Circle Podcast Episode 032 My guest for this episode of the Inner Circle podcast is Phil Dunkelberger, President and CEO of Nok Nok Labs. We chat about the history and current state of secure authentication and the role the FIDO (Fast ID Online) … Continue reading Phil Dunkelberger Discusses FIDO and Secure Authentication

Jeff Man Chats about His NSA Origin Story and the State of Cybersecurity Today

Inner Circle Podcast Episode 025 This week I have the privilege of speaking with Jeff Man. Jeff and I have known each other for a few years–since our days together at Tenable. Neither of us is at Tenable any longer and we’ve gone our separa… Continue reading Jeff Man Chats about His NSA Origin Story and the State of Cybersecurity Today