Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
TV & Film
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/dd/d2/8c/ddd28cd2-7e5a-e877-00c7-b0c02e95c2d3/mza_11026119591996922205.jpg/600x600bb.jpg
Security All In
Cybereason
31 episodes
1 day ago
With each major data breach, the role of the Chief Information Security Officer becomes more complex and more crucial. Ditch whatever preconception you may have- these individuals manage risk on a daily basis, with one foot in the world of business and another in the world of cybersecurity. Who are these people, and how do they think? Conversations flow between personal and professional- the books we read, the music we listen to, our hobbies all tell a story about who we are as practitioners. Learn what makes CISOs tick, and how they’ve gone all in on security.
Show more...
Technology
RSS
All content for Security All In is the property of Cybereason and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
With each major data breach, the role of the Chief Information Security Officer becomes more complex and more crucial. Ditch whatever preconception you may have- these individuals manage risk on a daily basis, with one foot in the world of business and another in the world of cybersecurity. Who are these people, and how do they think? Conversations flow between personal and professional- the books we read, the music we listen to, our hobbies all tell a story about who we are as practitioners. Learn what makes CISOs tick, and how they’ve gone all in on security.
Show more...
Technology
https://malicious.life/wp-content/uploads/powerpress/Cyberason_All-In_Logo.jpg
Tatu Ylonen- Founder of SSH Communications Security
Security All In
17 minutes 35 seconds
5 years ago
Tatu Ylonen- Founder of SSH Communications Security
Tatu and Sam discuss how the SSH protocol became “viral” when Tatu first created it in the mid-’90s. What led Tatu to dive, head first, into a field he knew little about when he first created SSH. What is the link between security and communication, and what fascinates Tatu so much about language and the […]
Security All In
With each major data breach, the role of the Chief Information Security Officer becomes more complex and more crucial. Ditch whatever preconception you may have- these individuals manage risk on a daily basis, with one foot in the world of business and another in the world of cybersecurity. Who are these people, and how do they think? Conversations flow between personal and professional- the books we read, the music we listen to, our hobbies all tell a story about who we are as practitioners. Learn what makes CISOs tick, and how they’ve gone all in on security.