Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
History
Business
Sports
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/6d/d3/09/6dd30922-62b1-d32a-5879-02da32ab3eef/mza_17278746116602364752.jpg/600x600bb.jpg
The Security Table
Izar Tarandach, Matt Coles, and Chris Romeo
94 episodes
1 month ago
We’re pulling back the curtain on the technology industry to reveal what life looks like when you're constantly aware of what can go wrong. From the loss of childlike wonder when encountering new tech to the ethical dilemmas posed by autonomous vehicles, we discuss the unique burden of seeing technology's darker possibilities. We’re examining how years of witnessing security breaches and system failures shape a professional outlook that balances innovation with caution. FOLLOW OUR SOCIAL MEDI...
Show more...
Technology
RSS
All content for The Security Table is the property of Izar Tarandach, Matt Coles, and Chris Romeo and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
We’re pulling back the curtain on the technology industry to reveal what life looks like when you're constantly aware of what can go wrong. From the loss of childlike wonder when encountering new tech to the ethical dilemmas posed by autonomous vehicles, we discuss the unique burden of seeing technology's darker possibilities. We’re examining how years of witnessing security breaches and system failures shape a professional outlook that balances innovation with caution. FOLLOW OUR SOCIAL MEDI...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/6d/d3/09/6dd30922-62b1-d32a-5879-02da32ab3eef/mza_17278746116602364752.jpg/600x600bb.jpg
Threat Modeling or Threat Intelligence, Are they the Same?
The Security Table
29 minutes
7 months ago
Threat Modeling or Threat Intelligence, Are they the Same?
Listen in as we debate the differences between threat intelligence and threat modeling. What distinguishes these two concepts in cybersecurity, and how do they inform each other? The conversation explores definitions, real-world examples, and the interconnected relationship between proactive threat modeling and reactive threat intelligence. FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @SecTablePodcast ➜LinkedIn: The Security Table Podcast ➜YouTube: The Security Table YouTube Channel Thanks for Listen...
The Security Table
We’re pulling back the curtain on the technology industry to reveal what life looks like when you're constantly aware of what can go wrong. From the loss of childlike wonder when encountering new tech to the ethical dilemmas posed by autonomous vehicles, we discuss the unique burden of seeing technology's darker possibilities. We’re examining how years of witnessing security breaches and system failures shape a professional outlook that balances innovation with caution. FOLLOW OUR SOCIAL MEDI...