Rephonic
Artwork for Security You Should Know

Security You Should Know

CISO Series
Cybersecurity
Threatlocker
Risk Management
Security Solutions
Insider Threats
Security Operations
Alert Fatigue
Patch Management
Vulnerability Management
Stellar Cyber
Pentera
ITDR
Compromised Credentials
Identity Threat Detection and Response
Dropzone AI
Artificial Intelligence
Kasada
Data Loss Prevention
Automation
Endpoint Protection

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your C... more

PublishesWeeklyEpisodes39Founded10 months ago
Number of ListenersCategories
NewsTech NewsTechnology

Listen to this Podcast

Artwork for Security You Should Know

Latest Episodes

All links and images can be found on CISO Series.

Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, th... more

YouTube

All links and images can be found on CISO Series.

Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were ... more

YouTube

Watch our demo with Imprivata on our site.

In this episode, Chip Hughes, chief product officer at Imprivata, explains how the company addresses shared access management challenges with specialized solutions that prioritize both security and user ex... more

YouTube

All links and images can be found on CISO Series.

Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, an... more

YouTube

All links and images can be found on CISO Series.

Earning and maintaining customer trust has become increasingly complex as organizations struggle with manual, repetitive security review processes that frustrate customers and slow revenue cycles. ... more

YouTube

All links and images can be found on CISO Series.

Misconfigurations represent one of cybersecurity's most persistent and damaging vulnerabilities. Organizations often fall into the trap of deploying tools with overly permissive "permit everything"... more

YouTube

All links and images can be found on CISO Series.

Organizations excel at generating massive volumes of unstructured data through recorded meetings. The struggle lies in extracting value from it. The reality is that most of this data is never touch... more

YouTube

All links and images can be found on CISO Series.

In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Storage Control solution addresses these challenges by implementing program-level access restrictions that wor... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap
CyberWire Daily
CyberWire DailyN2K Networks

Recent Guests

Fernanda Sottil
Senior Director of Strategy at Incode Technologies
Incode Technologies
Episode: Verifying Identity with Incode Technologies
Nick Espinosa
Host of the nationally syndicated Deep Dive radio show
Episode: Verifying Identity with Incode Technologies
Bozidar Spirovski
CISO at Blue Dot
Blue Dot
Episode: Verifying Identity with Incode Technologies
Braden Rogers
Chief Customer Officer at Island
Island
Episode: Securing Application Delivery with Island
Nick Ryan
Former BISO at RSM
RSM
Episode: Securing Application Delivery with Island
Janet Heins
CISO at ChenMed
ChenMed
Episode: Securing Application Delivery with Island
Chip Hughes
Chief Product Officer over at Imprivata
Imprivata
Episode: Optimizing Access Management with Imprivata
Kathleen Mullin
Former CISO at MyCareGorithm
MyCareGorithm
Episode: Optimizing Access Management with Imprivata
Howard Holton
CEO at GigaOm
GigaOm
Episode: Optimizing Access Management with Imprivata

Host

Rich Stroffolino
Host of Security You Should Know

Top Technology Podcasts

Acquired
AcquiredBen Gilbert and David Rosenthal
Hard Fork
Hard ForkThe New York Times
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan
Shell Game
Shell GameiHeartPodcasts and Kaleidoscope
Building AI Boston
Building AI BostonBuilding AI Boston

Talking Points

Recent interactions between the hosts and their guests.

Verifying Identity with Incode Technologies
Q: What is Incode's strategy for anticipating new forms of fraud?
Incode employs a multi-prong approach including partnerships with universities, constant testing against vulnerabilities, and failure assessment mechanisms while iterating quickly based on detected fraud patterns.
Verifying Identity with Incode Technologies
Q: How does Incode comply with privacy standards, particularly in Europe?
Incode is GDPR compliant, retains data securely in the EU, encrypts all data, and deletes information once verification is completed, ensuring that consent governs training on any faces.
Verifying Identity with Incode Technologies
Q: How does Incode's solution work?
Incode adds a real-world identity layer by integrating with identity access management systems and verifying identities through automated processes involving biometric checks.
Verifying Identity with Incode Technologies
Q: Why are we still struggling with AI-powered fraud at work?
AI criminals are fast to adopt digital transformation, using it for increasingly sophisticated attacks, making traditional verification methods inadequate.
Optimizing Access Management with Imprivata
Q: What are the challenges seen with access management in healthcare?
Business friction is created by shared access management and the complexities of both human and non-human identities.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Security You Should Know

What is Security You Should Know about and what kind of topics does it cover?

Offering a concise exploration of security solutions, this podcast presents a unique format where security vendors collaborate with industry leaders to address real-world security challenges. Each episode features a focused discussion that aims to clarify complex security topics, including implementation details, pricing models, and the broader implications of security decisions within organizations. The podcast is particularly noteworthy for its commitment to providing direct, actionable insights that cater to a professional audience, enabling listeners to engage critically with the evolving landscape of security technologies.

Where can I find podcast stats for Security You Should Know?

Rephonic provides a wide range of podcast stats for Security You Should Know. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Security You Should Know and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Security You Should Know get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Security You Should Know, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Security You Should Know?

Rephonic provides comprehensive predictive audience data for Security You Should Know, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Security You Should Know have?

To see how many followers or subscribers Security You Should Know has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Security You Should Know?

These podcasts share a similar audience with Security You Should Know:

1. Cyber Security Headlines
2. CISO Series Podcast
3. Cybersecurity Today
4. Defense in Depth
5. CyberWire Daily

How many episodes of Security You Should Know are there?

Security You Should Know launched 10 months ago and published 39 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Security You Should Know?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Security You Should Know?

Rephonic pulls ratings and reviews for Security You Should Know from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Security You Should Know?

Rephonic provides full transcripts for episodes of Security You Should Know. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Security You Should Know?

Recent guests on Security You Should Know include:

1. Fernanda Sottil
2. Nick Espinosa
3. Bozidar Spirovski
4. Braden Rogers
5. Nick Ryan
6. Janet Heins
7. Chip Hughes
8. Kathleen Mullin

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days