Rephonic
Artwork for Security You Should Know

Security You Should Know

CISO Series
Cybersecurity
Threatlocker
Risk Management
Security Solutions
Insider Threats
Security Operations
Alert Fatigue
Patch Management
Vulnerability Management
Stellar Cyber
Pentera
Compromised Credentials
ITDR
Identity Threat Detection and Response
Dropzone AI
Artificial Intelligence
Kasada
Data Loss Prevention
Automation
Endpoint Protection

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your C... more

PublishesWeeklyEpisodes42Foundeda year ago
Number of ListenersCategories
Tech NewsTechnologyNews

Listen to this Podcast

Artwork for Security You Should Know

Latest Episodes

In this episode, Peter Worth, founder, president, and CEO at Athena Security, explains how their security operations platform addresses these challenges through unified detection and response. Joining him are Jason Taule, CISO at Luminous Health, and... more

In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integrat... more

YouTube

All links and images can be found on CISO Series.

In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around ever... more

YouTube

All links and images can be found on CISO Series.

Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, th... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap
CyberWire Daily
CyberWire DailyN2K Networks

Recent Guests

Benny Lakunishok
CEO at Zero Networks
Zero Networks
Episode: Stopping Lateral Movement with Zero Networks
Fernanda Sottil
Senior Director of Strategy at Incode Technologies
Incode Technologies
Episode: Verifying Identity with Incode Technologies
Nick Espinosa
Host of the nationally syndicated Deep Dive radio show
Episode: Verifying Identity with Incode Technologies
Bozidar Spirovski
CISO at Blue Dot
Blue Dot
Episode: Verifying Identity with Incode Technologies
Braden Rogers
Chief Customer Officer at Island
Island
Episode: Securing Application Delivery with Island
Nick Ryan
Former BISO at RSM
RSM
Episode: Securing Application Delivery with Island
Janet Heins
CISO at ChenMed
ChenMed
Episode: Securing Application Delivery with Island
Chip Hughes
Chief Product Officer over at Imprivata
Imprivata
Episode: Optimizing Access Management with Imprivata
Kathleen Mullin
Former CISO at MyCareGorithm
MyCareGorithm
Episode: Optimizing Access Management with Imprivata

Host

Rich Stroffolino
Host of Security You Should Know

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#231
Australia/Technology
Apple Podcasts
#67
Russia/Technology
Apple Podcasts
#193
Sweden/Technology
Apple Podcasts
#222
Finland/Technology

Talking Points

Recent interactions between the hosts and their guests.

Bridging the Cloud Security Gap with Trend Micro
Q: Whenever you have someone that's apprehensive about going to the cloud, how would you convince them?
We need to understand their current secured frameworks on-premise and validate their assets while addressing fears like data control and compliance with regulations like GDPR.
Bridging the Cloud Security Gap with Trend Micro
Q: Franz, how do you explain the value of your solution to a CEO? What does it do? What does it not do? What is the pricing model?
Trend Micro consolidates multiple cloud security tools, streamlining management and risk, automating controls, and reducing integration overhead. The pricing is per seat, based on the assets protected.
Stopping Lateral Movement with Zero Networks
Q: How do you know that Benny cannot access this host on port 22, but Doug can?
We set default policies that require Multi-Factor Authentication for privileged ports, they have to prove their identity before accessing.
Stopping Lateral Movement with Zero Networks
Q: What other questions do you have about Zero Networks?
I'm interested in understanding how they're handling MFA and Privilege Access Management in existing environments.
Verifying Identity with Incode Technologies
Q: What is Incode's strategy for anticipating new forms of fraud?
Incode employs a multi-prong approach including partnerships with universities, constant testing against vulnerabilities, and failure assessment mechanisms while iterating quickly based on detected fraud patterns.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Security You Should Know

What is Security You Should Know about and what kind of topics does it cover?

Offering a concise exploration of security solutions, this podcast presents a unique format where security vendors collaborate with industry leaders to address real-world security challenges. Each episode features a focused discussion that aims to clarify complex security topics, including implementation details, pricing models, and the broader implications of security decisions within organizations. The podcast is particularly noteworthy for its commitment to providing direct, actionable insights that cater to a professional audience, enabling listeners to engage critically with the evolving landscape of security technologies.

Where can I find podcast stats for Security You Should Know?

Rephonic provides a wide range of podcast stats for Security You Should Know. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Security You Should Know and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Security You Should Know get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Security You Should Know, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Security You Should Know?

Rephonic provides comprehensive predictive audience data for Security You Should Know, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Security You Should Know have?

To see how many followers or subscribers Security You Should Know has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Security You Should Know?

These podcasts share a similar audience with Security You Should Know:

1. Cybersecurity Headlines
2. CISO Series Podcast
3. Cybersecurity Today
4. Defense in Depth
5. CyberWire Daily

How many episodes of Security You Should Know are there?

Security You Should Know launched a year ago and published 42 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Security You Should Know?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Security You Should Know?

Rephonic pulls ratings and reviews for Security You Should Know from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Security You Should Know?

Rephonic provides full transcripts for episodes of Security You Should Know. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Security You Should Know?

Recent guests on Security You Should Know include:

1. Benny Lakunishok
2. Fernanda Sottil
3. Nick Espinosa
4. Bozidar Spirovski
5. Braden Rogers
6. Nick Ryan
7. Janet Heins
8. Chip Hughes

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days