Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Endpoint Protection Podcasts

show episodes
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
  continue reading
 
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
Cloud Conversations

Azure, Peter, Femke, Ru, and Kat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Loading …
show series
 
Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
  continue reading
 
Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert, with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this second episode, Tom Fox and Alyssa DeSimone review the opt-in and opt-out requirements …
  continue reading
 
Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this first episode, we break down the essentials of ADS/ADMT, focusing on who is covered, the…
  continue reading
 
Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
  continue reading
 
Tom Fox takes a solo turn as Jonathan Armstrong is on assignment. Today, Tom visits with Inge Zwick, Executive Director, Head of Europe, and ESG Lead at Emapta Global, a global outsourcing company. They discuss the company’s operations, with a particular focus on managing GDPR compliance within the outsourcing framework. They also discuss common mi…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned cybersecurity experts, co-host the award-winning Life with GDPR. This episode explores the complex intersection of AI and recruitment, focusing on compliance challenges under GDPR and potential risks. Jonathan highlights that AI is often more prevalent in recruitment processes than many compliance officers r…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss Cookie Compliance Under GDPR. Their discussion highlights the increasing enforcement actions surrounding website cookies, emphasizing that this is a data protection issue and a broader compliance challenge. Spe…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
60% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
  continue reading
 
Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. This episode discusses the complex topic of liability for the Chief Compliance Officer (CCO) and Chief Information Security Officer (CISO). Tom and Jonathan begin by examining notable cases like Joe Sullivan, the former CISO at Uber, who fa…
  continue reading
 
Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss a pressing deadline for compliance officers: the February 2nd enforcement of the EU AI Act’s prohibitions on unacceptable AI risk. Tom and Jonathan look at the phased implementation of this complex legislation, …
  continue reading
 
In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
  continue reading
 
In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust in…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. This episode delves into the UK’s Failure to Prevent Fraud guidance. The podcast spans the initial implications and conflicts these new provisions present, especially in the context of GDPR and compliance with bribery investigations. Jonatha…
  continue reading
 
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
  continue reading
 
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
  continue reading
 
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, we delve into the complex provisions of the new EU AI Act, exploring its global effects and extraterritorial implications similar to the GDPR. Tom, Jonathan and a few friends discuss the multifaceted regulatory framework, wh…
  continue reading
 
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
  continue reading
 
Tom Fox and Jonathan Armstrong, a renowned expert in cybersecurity, co-host the award-winning “Life with GDPR.” Jonathan has returned from his hiatus, and in this episode, we examine the UK election results and their potential impact on compliance. The recent UK election has significant implications for compliance, particularly concerning the dynam…
  continue reading
 
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. Jonathan is on a short hiatus and in this episode, we have a special guest, Karen Moore who discusses the EU’s Corporate Sustainability-Due Diligence Directive. Karen Moore is a well-versed professional in the area of impact assessments and …
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Today we consider the NIS2 Directive, which is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU. Cybersecurity regulations are reshaping the landscape, demanding swif…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at the continued fallout from the Solar Winds data breach. In the complex world of data protection, the General Data Protection Regulation (GDPR) has placed a spotlight on the importance of transparency, honesty, …
  continue reading
 
In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection. This lively di…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at a breach of a big law. In the wake of a recent spearphishing attack and data breach at a UK law firm, the legal community is abuzz with discussions on the responsibility of lawyers to prevent such attacks. Tom …
  continue reading
 
In a digital era where endpoints are the frontline defence against cyber threats, this first episode of our podcast series, "Insider Insight: Navigating Endpoint Security, Carl Leonard, Proofpoint’s Cybersecurity Strategist for EMEA, explores the transformative power of people-centric protection in the realm of endpoint data security. Join us as we…
  continue reading
 
Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker?…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at litigation over a data breach against Singtel Opus in Australia and the fallout from an investigation report. The recent data breach at Intel Optus, affecting 1.2 million individuals, has brought to light the c…
  continue reading
 
Michelle McGough makes a triumphant return to the BigFix team, talks about her path to BigFix, what she loves about the BigFix community and what her current focus is with respect to customer events and other things BigFix! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. We take things in a different direction today as we discuss the somewhat lurid allegations around former Abercrombie & Fitch CEO Mike Jeffries. This matter illustrates the need for robust background checks and support of those who bring for…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. The recent controversy surrounding Nigel Farage’s banking situation highlights the risks and compliance challenges faced by the banking industry in relation to data protection. In this episode, Tom and Jonathan discuss a data breach in a Sc…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, Tom and Jonathan discuss a troubling inadvertent data release by the Police Service of Northern Ireland (PSNI). The release occurred when a document containing sensitive information about PSNI employees was mistakenly upload…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. The recent controversy surrounding Nigel Farage's banking situation highlights the risks and compliance challenges faced by the banking industry in relation to data protection. In this episode, Tom and Jonathan discuss the closure of Farage'…
  continue reading
 
We've released a brand new product - BigFix User Workspace! In this episode, we're speaking with Mike Gare, BigFix Product Manager for BigFix Lifecycle and Workspace, and Jason Cordell, BigFix Technical Advisor to learn all about this exciting new offering. This digital workspace management solution improves employees experience, reduces helpdesk c…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. Matt Kelly and Jonathan Marks join Tom and Jonathan Armstrong on this episode, as they explore the case of former Uber CISO Joe Sullivan and the lessons compliance officers can learn from his lenient sentence. From growing trends of personal…
  continue reading
 
The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the third episode of our BigFix Best Practices series on Client Settings, Client Settings 301. In this episode, we’re going to outline some business use cases we’ve encountered in the real worl…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss the recent billion-dollar fine imposed on Meta (formerly Facebook) for violating data protection laws. They break down the significance of this ruling which limits the use of standard contractual clauses and req…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Join them in this episode as they discuss the recent court decision in the Austrian case and its implications on GDPR claims. Discover the guidelines for GDPR damage compensation, assessment of damages, liability provisions, and how busines…
  continue reading
 
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Join them in this episode as they delve into the hot-button issue of data transfers from the EU to the US. With potential new rulings looming, the replacement for privacy shield is said to be doomed to fail. The European data protection boa…
  continue reading
 
The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the second of our BigFix Best Practices series on Client Settings, Client Settings 201. We talk about the actual practices you’ll need to understand to effectively manage client settings across…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play