Podcast What’s the big deal about zero trust?

Our theme this week is “zero trust” – what is it and how can you implement it in your organisation. …

Podcast Is it time for the cyber security industry to grow up?

Is it time for the cyber security industry to grow up? That’s the question we’ll be tackling on this episode …

Podcast Security training: should we give humans a break?

Cryptographer Bruce Schneier once said, "only amateurs attack machines, professionals target people" and yet how far should we be blaming …

Podcast #Web30: Has the internet been a force for good?

March 12 2019 marked the 30 year anniversary of the World Wide Web and it was around this time that …

Podcast Are CISOs suffering from an image crisis?

Are CISOs suffering from an image crisis? Do they need a rebranding of sorts? How can they be taken seriously …

Podcast Cybercrime in the mobile space

This week on the show we have ESET’S Malware Analyst and Researcher, Lukáš Štefanko and Head of Automated Threat Detection …

Podcast Could #QueueForTheLoo solve our diversity problem?

When it comes to movers and shakers in the tech world, our guest this week is certainly making some noise …

Podcast The role of the threat hunter: what is it and why it matters

On this podcast we talk with Naaman Haart, a UK-based threat hunter for the cyber security company, Digital Guardian. The …

Podcast Are we investing too much in cyber security?

On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, …

Podcast How is the Met tackling international cybercrime?

On this week’s teissPodcast I speak with Detective Superintendent Andrew Gould, Head of the Metropolitan Police Cyber Crime Unit. We …

Podcast Is password security really that important?

Did you know that the most popular password at the end of 2018 was "123456", followed by “password” in second …

Podcast Inside the mind of a hacker

This week Joe Carson, chief security scientist at Thycotic, guides us through the mind of a hacker. What reconnaissance does …