169 Results
Posted:

Authentically Marketing Cybersecurity

Dan sits down with Monica White the CMO of the Enterprise Security Group at Broadcom (and his boss) to talk about the often winding career paths in marketing, early best practices, and understand how authenticity is the key to build durable brands.

Download
Posted:

From Cybersecurity Products to Platforms

Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.

Download
Posted:

AI, Fraud, and the Future of Payments: Inside The Arcot Smart Ruleset

This episode gives a preview of Arcot's upcoming 3DS Summits and explores how AI is reshaping payments security. With fraudsters using it to scale attacks, Arcot leads the charge in payment security in launching an adaptive ruleset. Discover how The Arcot Smart Ruleset -- which leverages decades of vast transaction data from The Arcot Network -- offers issuers a scalable, adaptive, data-rich approach to combat today's sophisticated fraud, reduce false declines, and improve customer experience.

Download
Posted:

Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?

Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry. Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk

Download
Posted:

Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security

Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies. There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com

Download
View More