article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Popular Episodes by Topic This is simply a post that categorizes our podcast episodes by topic and then by download/listen count.

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Security Boulevard

Zero Trust: Fast Forward from 2010 to 2021“. The Mysteries of Detection Engineering: Revealed! “. The Mysteries of Detection Engineering: Revealed! “. Zero Trust: Fast Forward from 2010 to 2021“. Preparing for Cloud Migrations from a CISO Perspective, Part 1”. Top 5 overall. Confidentially Speaking“. Zero trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q3 2023

Anton on Security

Changes in 2022 and Beyond in Cloud Security” EP8 Zero Trust: Fast Forward from 2010 to 2021 Now, fun posts by topic. How CISOs need to adapt their mental models for cloud security” [GCP blog] “How to think about threat detection in the cloud” [GCP blog] “Who Does What In Cloud Threat Detection?” Use Cloud Securely?

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. He retired as a colonel in 2010. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

Stuxnet in 2010 was the first the most recent was CosmicEnergy in 2023. Deryck Mitchelson, EMEA field CISO for Check Point, chimed in on this point. Any AI-based behavioural engine would have spotted it, said it wasn’t normal, and blocked it,” he said.

article thumbnail

Fact check: Quantum computing may transform cybersecurity eventually – but not yet

SC Magazine

A variety of factors — including confidence in security and performance, interoperability, systems engineering, budgeting, procurement, and other requirements — could affect such decisions.”. It’s the method that was used by the White House to protect communications for their direct line to Moscow during the Cold War.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Beyond Identity Identity management 2020 Private Expel Managed security service 2016 Private Tigera Zero trust for K8s 2016 Private Intrinsic Application security 2016 Acquired: VMware HackerOne Penetration testing 2015 Private Virtru Data encryption 2014 Private Cloudflare Cloud infrastructure 2010 NYSE: NET.