Featured
One Sector, A Million+ Data Environments
What a nonprofit collects, captures, manages, and is responsible for protecting isn't uniform. And in many cases, the sensitivity of that data maps directly back to their unique mission in ways that should fundamentally shape how we approach security for these organizations.
CYBR.HAK.CAST Episode 14: Tim Medin
In this episode, hosts Michael Farnum and Phillip Wylie sit down with penetration tester and Red Siege founder Tim Medin to talk about turning attacker tactics into practical defensive wins.
CYBR.HAK.CAST Episode 13: Winn Schwartau
Winn Schwartau argues that the biggest threat facing defenders isn’t just technical, but cognitive: overwhelming information flows that push humans into “mental DDoS.” He has introduced the concept of “critical ignoring” as a prerequisite to critical thinking.
CYBR.HAK.CAST Episode 12: Fergus Hay of The Hacking Games
Phil Wylie and Michael Farnum talk with Fergus Hay about how the cybersecurity industry is missing a huge opportunity by overlooking gamers and young, neurodiverse problem-solvers who already have the mindset to become the next generation of ethical hackers.
CYBR.SEC.CAST Episode 66: Wendy Nather
In CYBR.SEC.CAST Episode 66, Wendy Nather explains why cybersecurity’s biggest lessons aren’t coming from breaches, but from the near-misses no one talks about.