Listen Up, These Are Brand Stories!
A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. A Promotional Brand Story Podcast or Webcast on ITSPmagazine is designed to accomplish these same things; connecting businesses to customers — and, more importantly, the other way around. An old saying in advertising goes something like this: A brand is not what the company thinks it is, it is what the customers think it is.
Every company has a story to tell—from the small start-up to the large enterprise and everything in between.
All content for Brand Stories Podcasts is the property of ITSPmagazine and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Listen Up, These Are Brand Stories!
A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. A Promotional Brand Story Podcast or Webcast on ITSPmagazine is designed to accomplish these same things; connecting businesses to customers — and, more importantly, the other way around. An old saying in advertising goes something like this: A brand is not what the company thinks it is, it is what the customers think it is.
Every company has a story to tell—from the small start-up to the large enterprise and everything in between.
Security teams are overusing general purpose AI models for decisions they were never designed to make. This conversation explains why predictive security requires purpose built models, continuous retraining, and disciplined data science.
AI does not fix messy environments, it amplifies them. This episode explores what real AI readiness looks like when data, security, and architecture are treated as prerequisites rather than afterthoughts.
Digital risk now blends technology, regulation, geopolitics, and business strategy into a single leadership challenge. This episode explores how organizations can manage that reality with proportion, clarity, and confidence rather than fear.
A routine bug bounty submission triggered a deep investigation at a digital signage company and revealed how strong processes guide fast, measured incident response. The discussion highlights what transparency looks like in practice and why passwordless authentication is becoming central to reducing credential driven risks.
The Solar Car That Charges Itself While You Live Your Life
Growing up, I always wondered: why can't cars just recharge themselves as we drive? Turns out, someone finally built exactly that.
This Brand Story episode explores how security operations can move past the limits of data normalization and enable every analyst to perform like an entire team. Monzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to show how AI-driven collaboration reshapes what’s possible in the SOC.
This episode explores how Crogl’s patented approach removes the need for data normalization, allowing security teams to query unstructured data directly across systems. Director of Product Marketing Cory Wallace joins Sean Martin to discuss how this innovation empowers analysts, reduces schema drift, and restores visibility across complex environments.
The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.
Cyber risk touches legal obligations, operational priorities, and even geopolitical decisions. This episode explores a consulting model that puts business understanding first—and builds security around it.
This episode explores how dynamic, context-aware access controls can eliminate the friction between security and productivity. Learn how a Zero Standing Privilege approach protects both human and AI identities while enabling organizations to operate at full speed without compromising safety.
ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.
Ransomware groups are increasingly abandoning file encryption in favor of high-value data theft, using extortion to extract massive payouts while avoiding the spotlight. This conversation reveals who they target, how they operate, and what organizations can do to shut down their most exploitable weaknesses.
The corridors of Black Hat 2025 in Las Vegas buzzed with conversations about AI and emerging threats, but one of the most compelling discussions centered on something decidedly human: how we actually manage our cybersecurity teams. Marco Ciappelli, Co-Founder and CMO of ITSPmagazine, connected with longtime industry colleague Deidre Diamond, who brought along Carraig Stanwyck—a seasoned cybersecurity leader who recently transitioned from Fortune 200 CISO to CEO.
AI-powered micro agents are enabling organizations to automate targeted tasks quickly and reliably, reducing manual work and accelerating response times in security and beyond. This conversation reveals how a platform approach can extend automation benefits from SOCs to every corner of the enterprise.
Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.
Crogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.
This episode explores why the most dangerous vulnerabilities are often the ones organizations don’t even know exist. HD Moore shares how attacker-grade discovery techniques can expose hidden assets, broken segmentation, and overlooked weaknesses before they become breach points.
Stellar Cyber unveiled their human-augmented autonomous SOC platform at Black Hat 2025, transforming security operations by reducing thousands of alerts to manageable dozens while empowering analysts through AI-driven automation.
CyberSecurity doesn’t have to be complicated to be effective. This conversation reveals how practical controls, simplified processes, and continuous customer engagement are helping organizations achieve strong security without slowing down business.
High-profile corporate leaders face digital risks that extend far beyond company networks, from personal email compromises to deepfake attacks. This episode explores how combining advanced technology, privacy safeguards, and concierge-level service creates an always-on shield for executives and their families.
Listen Up, These Are Brand Stories!
A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. A Promotional Brand Story Podcast or Webcast on ITSPmagazine is designed to accomplish these same things; connecting businesses to customers — and, more importantly, the other way around. An old saying in advertising goes something like this: A brand is not what the company thinks it is, it is what the customers think it is.
Every company has a story to tell—from the small start-up to the large enterprise and everything in between.