Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Endpoint Protection Podcasts
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading

1
Endpoint Security and Data Protection: Uncovering the Hidden Compliance Risks in Printer Security with Jim LaRoe
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
…
continue reading

1
A Compliance Roadmap for ADS/ADMT - Part 2: Understanding Opt-In and Opt-Out Requirements
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert, with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this second episode, Tom Fox and Alyssa DeSimone review the opt-in and opt-out requirements …
…
continue reading

1
A Compliance Roadmap for ADS/ADMT - Part 1: Introduction & Jurisdiction
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this first episode, we break down the essentials of ADS/ADMT, focusing on who is covered, the…
…
continue reading

1
From IT to Total Compliance Tracking with Adam Goslin
21:08
21:08
Play later
Play later
Lists
Like
Liked
21:08Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
…
continue reading

1
Navigating GDPR in Global Outsourcing with Inge Zwick
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Tom Fox takes a solo turn as Jonathan Armstrong is on assignment. Today, Tom visits with Inge Zwick, Executive Director, Head of Europe, and ESG Lead at Emapta Global, a global outsourcing company. They discuss the company’s operations, with a particular focus on managing GDPR compliance within the outsourcing framework. They also discuss common mi…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading

1
AI in Recruitment: Navigating GDPR Compliance and Challenges
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32Tom Fox and Jonathan Armstrong, renowned cybersecurity experts, co-host the award-winning Life with GDPR. This episode explores the complex intersection of AI and recruitment, focusing on compliance challenges under GDPR and potential risks. Jonathan highlights that AI is often more prevalent in recruitment processes than many compliance officers r…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss Cookie Compliance Under GDPR. Their discussion highlights the increasing enforcement actions surrounding website cookies, emphasizing that this is a data protection issue and a broader compliance challenge. Spe…
…
continue reading

1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading

1
IT Lifecycle Management: The Foundation of Secure Operations
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:1540% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
…
continue reading

1
From Detection to Action: How SOAR Stops Cyberattacks in Minutes
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
…
continue reading

1
Why SIEM and Threat Detection Are Foundational for SMB Cybersecurity
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
…
continue reading

1
How MXDR Protects SMBs from Cyber Threats
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:2760% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
…
continue reading

1
Zero Trust SaaS Security: Protecting Your Apps, Identities, and Devices
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. This episode discusses the complex topic of liability for the Chief Compliance Officer (CCO) and Chief Information Security Officer (CISO). Tom and Jonathan begin by examining notable cases like Joe Sullivan, the former CISO at Uber, who fa…
…
continue reading

1
How Network as a Service (SASE) Empowers Mid-Market IT Leaders
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
…
continue reading

1
How to Prepare Your Business for the End of Windows 10
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss a pressing deadline for compliance officers: the February 2nd enforcement of the EU AI Act’s prohibitions on unacceptable AI risk. Tom and Jonathan look at the phased implementation of this complex legislation, …
…
continue reading

1
Welcome to Perimeter Perspective: Expanding the Boundaries of Cybersecurity and IT
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
…
continue reading

1
The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including: ▶️ The impact of emerging technologies like AI on cybersecurity ▶️ The latest trends in threat actor tactics targeting operational technology ▶️ How zero trust in…
…
continue reading

1
Understanding the UK’s Failure to Prevent Fraud
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. This episode delves into the UK’s Failure to Prevent Fraud guidance. The podcast spans the initial implications and conflicts these new provisions present, especially in the context of GDPR and compliance with bribery investigations. Jonatha…
…
continue reading

1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading

1
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
…
continue reading

1
The Security Sandbox | Modernizing Cyber Risk Management in OT
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
…
continue reading
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, we delve into the complex provisions of the new EU AI Act, exploring its global effects and extraterritorial implications similar to the GDPR. Tom, Jonathan and a few friends discuss the multifaceted regulatory framework, wh…
…
continue reading

1
The Security Sandbox | Evolving Endpoint Security in OT
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active…
…
continue reading

1
What Does The UK Election Mean for Compliance?
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Tom Fox and Jonathan Armstrong, a renowned expert in cybersecurity, co-host the award-winning “Life with GDPR.” Jonathan has returned from his hiatus, and in this episode, we examine the UK election results and their potential impact on compliance. The recent UK election has significant implications for compliance, particularly concerning the dynam…
…
continue reading

1
The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
…
continue reading

1
Karen Moore on The EU, Corporate Sustainability Due Diligence Directive
20:47
20:47
Play later
Play later
Lists
Like
Liked
20:47Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. Jonathan is on a short hiatus and in this episode, we have a special guest, Karen Moore who discusses the EU’s Corporate Sustainability-Due Diligence Directive. Karen Moore is a well-versed professional in the area of impact assessments and …
…
continue reading

1
NIS2 Balancing Obligations and Challenges for Compliance
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Today we consider the NIS2 Directive, which is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU. Cybersecurity regulations are reshaping the landscape, demanding swif…
…
continue reading

1
Solar Winds and Your Mother - Tell The Truth
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at the continued fallout from the Solar Winds data breach. In the complex world of data protection, the General Data Protection Regulation (GDPR) has placed a spotlight on the importance of transparency, honesty, …
…
continue reading

1
People-Centric Protection Against Evolving Cyber Threats
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection. This lively di…
…
continue reading

1
Critical Perspectives on Big Law Firm Cybersecurity
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at a breach of a big law. In the wake of a recent spearphishing attack and data breach at a UK law firm, the legal community is abuzz with discussions on the responsibility of lawyers to prevent such attacks. Tom …
…
continue reading

1
Transform Endpoint Data Security with People-Centric Protection
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16In a digital era where endpoints are the frontline defence against cyber threats, this first episode of our podcast series, "Insider Insight: Navigating Endpoint Security, Carl Leonard, Proofpoint’s Cybersecurity Strategist for EMEA, explores the transformative power of people-centric protection in the realm of endpoint data security. Join us as we…
…
continue reading

1
Episode 39 - GenAI and guidance to cyber security practitioners
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker?…
…
continue reading

1
Lessons Learned from The Singtel Opus Data Breach
20:28
20:28
Play later
Play later
Lists
Like
Liked
20:28Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. In this episode, they look at litigation over a data breach against Singtel Opus in Australia and the fallout from an investigation report. The recent data breach at Intel Optus, affecting 1.2 million individuals, has brought to light the c…
…
continue reading

1
BigFix Insider Interview: Michelle McGough, BigFix Technical Engagement
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43Michelle McGough makes a triumphant return to the BigFix team, talks about her path to BigFix, what she loves about the BigFix community and what her current focus is with respect to customer events and other things BigFix! BigFix Resources BigFix Website BigFix LinkedIn BigFix Forum BigFix Slack BigFix YouTube…
…
continue reading

1
The Hidden Dangers of CEO Behavior: Patterns and Consequences
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. We take things in a different direction today as we discuss the somewhat lurid allegations around former Abercrombie & Fitch CEO Mike Jeffries. This matter illustrates the need for robust background checks and support of those who bring for…
…
continue reading

1
WhatsApp Breach: Hospital's GDPR Failures Exposed
17:45
17:45
Play later
Play later
Lists
Like
Liked
17:45Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. The recent controversy surrounding Nigel Farage’s banking situation highlights the risks and compliance challenges faced by the banking industry in relation to data protection. In this episode, Tom and Jonathan discuss a data breach in a Sc…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, Tom and Jonathan discuss a troubling inadvertent data release by the Police Service of Northern Ireland (PSNI). The release occurred when a document containing sensitive information about PSNI employees was mistakenly upload…
…
continue reading

1
Farage's Account Closure & the Risks of Data Breach
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. The recent controversy surrounding Nigel Farage's banking situation highlights the risks and compliance challenges faced by the banking industry in relation to data protection. In this episode, Tom and Jonathan discuss the closure of Farage'…
…
continue reading

1
BigFix Product Launch: BigFix User Workspace
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24We've released a brand new product - BigFix User Workspace! In this episode, we're speaking with Mike Gare, BigFix Product Manager for BigFix Lifecycle and Workspace, and Jason Cordell, BigFix Technical Advisor to learn all about this exciting new offering. This digital workspace management solution improves employees experience, reduces helpdesk c…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. Matt Kelly and Jonathan Marks join Tom and Jonathan Armstrong on this episode, as they explore the case of former Uber CISO Joe Sullivan and the lessons compliance officers can learn from his lenient sentence. From growing trends of personal…
…
continue reading

1
BigFix Best Practice Series: Client Settings 301 – Client Settings 301 – Business Use Cases Where You Just Need More
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the third episode of our BigFix Best Practices series on Client Settings, Client Settings 301. In this episode, we’re going to outline some business use cases we’ve encountered in the real worl…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned expert in cyber security, co-host the award-winning Life with GDPR. In this episode, they discuss the recent billion-dollar fine imposed on Meta (formerly Facebook) for violating data protection laws. They break down the significance of this ruling which limits the use of standard contractual clauses and req…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Join them in this episode as they discuss the recent court decision in the Austrian case and its implications on GDPR claims. Discover the guidelines for GDPR damage compensation, assessment of damages, liability provisions, and how busines…
…
continue reading
Tom Fox and Jonathan Armstrong, renowned experts in cyber security, co-host the award-winning Life with GDPR. Join them in this episode as they delve into the hot-button issue of data transfers from the EU to the US. With potential new rulings looming, the replacement for privacy shield is said to be doomed to fail. The European data protection boa…
…
continue reading

1
Episode 38 - RSA Conference Innovation Sandbox 2023
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03The RSA Conference Innovation Sandbox is an annual competition that showcases the latest and most innovative cybersecurity startups and emerging technologies. Cybersecurity professionals can learn a lot from security innovations showcased at events such as the RSA Security Conference.
…
continue reading

1
BigFix Best Practice Series: Client Settings 201 – Managing Client Settings Effectively
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07The BigFix Best Practice podcast series brings the best minds at BigFix to your ears to teach you how to get the most out of your BigFix investment. This is the second of our BigFix Best Practices series on Client Settings, Client Settings 201. We talk about the actual practices you’ll need to understand to effectively manage client settings across…
…
continue reading